Intelligent CIO Europe Issue 45 | Page 45

FEATURE : IOT firewalls can ensure that only authorised protocols and applications are allowed , and intrusion prevention can detect and block any attempts to scan for vulnerabilities or security holes and prevent any attempt to exploit those vulnerabilities . The next-generation firewall provides all of these security tools and many more , and should include an Industrial package that understands all of the protocols and applications that are commonly used in industrial networks . For the IoT infrastructure and ecosystem , most communication is via REST APIs , so a dedicated tool here is required to ensure that any attempts to gain access or exploit these APIs is detected and stopped .
• Real-time detection and mitigation – Despite best efforts to block an attack , we must always assume that one day the attack will succeed . Following a successful exploit , there is a period where the attacker will try to get as much information as possible about the environment , try to determine where the high-valued assets are , and how best to monetise the breach . This means that there is a short window of opportunity to detect the breach , identify the compromised devices and remove them from the network , to ensure that the breach is contained and the attack blocked . Here , a full range of solutions for Anti-botnet , Compromise Detection , User & Endpoint Behaviour Analysis , designed to detect infection as soon as it happens , is necessary .
In conclusion , the steps to securing IoT in a 5G era won ’ t be any different than what we see in other ecosystems : an integrated and holistic security architecture is necessary to provide not only the visibility required to see and identify these devices , but also deliver the prevention and detection components needed to mitigate the effects of an attack . p
www . intelligentcio . com INTELLIGENTCIO EUROPE 45