Steps to Implementing Security by Design for IoT

 

IoT security by design might seem like a buzzword in that it’s not well-defined in the consumer landscape, but KORE Wireless’s Chris Francosky said the most effective security measures are put in place well before production even begins.

Host Shelby Skrhak sat down with Francosky on this episode of the Industrial IoT podcast, brought to you by MarketScale.

“I’m evangelizing this idea of a five-step process centered around threat modeling, which is at the heart of security by design,” Francosky said.

5 Step Process for Threat Modeling

  1. Define your assets – not only devices, but the data, as well.
  2. Decompose that application through an architecture diagram so you can see clearly how the application is broken up.
  3. Look at each area of the decomposed application and identify threats.
  4. Document threats.
  5. Rate and prioritize threats

How do you recognize threats? In the late 1990s, Microsoft devised an acronym that summarizes the kinds of threats to look for, and it’s still useful today, Francosky said.

The acronym STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Escalation of Privilege. These aspects serve as guideposts to help you identify the types of threats you’re looking for.

KORE Wireless offers tool suites to help make IoT security a part of a consistent process.

For the latest news, videos, and podcasts in the IoT Industry, be sure to subscribe to our industry publication.

Follow us on social media for the latest updates in B2B!
Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

student visibility
Why Student Visibility Matters in Today’s Schools
March 3, 2026

School Safety Today podcast, presented by Raptor Technologies. In this episode of School Safety Today by Raptor Technologies, host Dr. Amy Grosso interviews SRO Todd Brendel of Dayton Independent Schools (KY), who shares frontline insights on the importance of knowing where students and staff are throughout the school day. He explains how they manage…

Read More
skilled trades mentorship
Why the Trades Need a Cultural Reset to Attract and Retain the Next Generation
March 3, 2026

The skilled trades are at a critical crossroads. According to an August 2025 report from the Institute for Women’s Policy Research (IWPR), the number of women working in construction and extraction occupations rose to 366,360 in 2024, the highest level ever recorded. Yet despite that growth, women still account for only about 4.3% of construction…

Read More
virtual physical therapy
Virtual Physical Therapy and the Changing Landscape of Athlete Care
March 3, 2026

Virtual care is no longer an experiment—it’s a structural shift in healthcare. Telehealth usage remains significantly higher than pre-2020 levels, and providers across disciplines are rethinking how to deliver higher-quality outcomes without the overhead and insurance constraints of traditional clinics. Meanwhile, recreational and endurance sports participation continues to rise, with millions of Americans registering…

Read More
employer
Why Institution-Wide Employer Alignment Will Define the Next Era of Higher Ed
March 2, 2026

Higher education is at an inflection point. Institutions are facing a demographic cliff in traditional-age enrollment, softening international pipelines, and increasing scrutiny around the return on investment of a degree. At the same time, the World Economic Forum reports that 59 out of every 100 workers globally are projected to require reskilling or upskilling…

Read More