{"id":99531,"date":"2021-11-02T08:00:04","date_gmt":"2021-11-02T15:00:04","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/?p=99531"},"modified":"2024-09-12T13:50:37","modified_gmt":"2024-09-12T20:50:37","slug":"how-microsoft-defender-for-iot-can-secure-your-iot-devices","status":"publish","type":"post","link":"https:\/\/www.microsoft.com\/en-us\/security\/blog\/2021\/11\/02\/how-microsoft-defender-for-iot-can-secure-your-iot-devices\/","title":{"rendered":"How Microsoft Defender for IoT can secure your IoT devices"},"content":{"rendered":"

Cybersecurity threats are always evolving, and today we\u2019re seeing a new wave of advanced attacks specifically targeting IoT devices used in enterprise environments as well as operational technology (OT) devices used in industrial systems and critical infrastructure (like ICS\/SCADA). It\u2019s not surprising since 60 percent of security practitioners believe IoT and OT security is one of the least secured aspects of their organization and less than 50 percent of organizations have deployed solutions designed specifically to secure their IoT and OT devices. Customers recognize that these types of devices are often unpatched, misconfigured, and unmonitored, making them the ideal targets for attackers.<\/p>\n

To address these risks, we\u2019re excited to announce Microsoft Defender for IoT<\/a>, formerly Azure Defender for IoT, is adding agentless monitoring capabilities to secure enterprise IoT devices connected to IT networks [like Voice over Internet Protocol (VoIP), printers, and smart TVs], so organizations can take advantage of a single integrated solution that can secure all of their IoT and OT infrastructure. Access to the public preview of these new capabilities will be available on November 30, 2021.<\/p>\n

Threats and customer challenges<\/h2>\n

In the past, attacks on IoT and OT devices for many organizations seemed like a hypothetical threat but in recent years organizations have learned otherwise. We’ve seen attacks on cameras and VoIP devices,1<\/sup> smart building automation,2<\/sup> service providers providing IoT services, and then there have been ransomware attacks\u2014like the ones that shut down a major gas pipeline3<\/sup> and global food processor. All of these highlight the challenge of securing IoT and OT devices.<\/p>\n

There are many ways attackers will attempt to compromise and take advantage of enterprise IoT devices. They can be used as a point of entry, for lateral movement, or evasion just to name a few examples. The following chart below depicts a cyber kill chain<\/a> involving two IoT devices. One is used as a point of entry, and another is used for lateral movement that inevitably leads to the exfiltration of sensitive information.<\/p>\n

\"Within<\/p>\n

Figure 1: Attackers scan the internet for vulnerable internet-facing IoT devices and then use them as a point of entry. Next, they will perform reconnaissance and lateral movement to achieve their goals.<\/em><\/p>\n

While most organizations recognize IoT and OT security as the least secured aspects of their organization, they continue to deploy devices at high rates and with little hesitation due to the demand for digital transformation and to remain competitive. Due to this, Chief Information Security Officers will soon be responsible for an attack surface area that is many times larger than what they are used to today and a vast majority of that new surface area will be unmanaged IoT and OT devices.<\/p>\n

When it comes to IoT and OT security, organizations face a long list of challenges. Some of the top challenges include:<\/p>\n