Steps to Implementing Security by Design for IoT

 

IoT security by design might seem like a buzzword in that it’s not well-defined in the consumer landscape, but KORE Wireless’s Chris Francosky said the most effective security measures are put in place well before production even begins.

Host Shelby Skrhak sat down with Francosky on this episode of the Industrial IoT podcast, brought to you by MarketScale.

“I’m evangelizing this idea of a five-step process centered around threat modeling, which is at the heart of security by design,” Francosky said.

5 Step Process for Threat Modeling

  1. Define your assets – not only devices, but the data, as well.
  2. Decompose that application through an architecture diagram so you can see clearly how the application is broken up.
  3. Look at each area of the decomposed application and identify threats.
  4. Document threats.
  5. Rate and prioritize threats

How do you recognize threats? In the late 1990s, Microsoft devised an acronym that summarizes the kinds of threats to look for, and it’s still useful today, Francosky said.

The acronym STRIDE stands for Spoofing, Tampering, Repudiation, Information Disclosure, Denial of Service and Escalation of Privilege. These aspects serve as guideposts to help you identify the types of threats you’re looking for.

KORE Wireless offers tool suites to help make IoT security a part of a consistent process.

For the latest news, videos, and podcasts in the IoT Industry, be sure to subscribe to our industry publication.

Follow us on social media for the latest updates in B2B!
Twitter – @MarketScale
Facebook – facebook.com/marketscale
LinkedIn – linkedin.com/company/marketscale

Follow us on social media for the latest updates in B2B!

Image

Latest

Lisa Bischoff
Through the Storm with Lisa Bischoff, Jewel Thief and Computer Hacker turned World-Changing Leadership Expert
February 21, 2025

In this episode of the Through the Storm podcast, Dr. Travis Hearne speaks with jewel thief, computer hacker, and world-changing leader, Lisa Bischoff. Lisa’s life is a testament to the power of transformation. Her journey has taken her from being an electrical engineer to a hacker, a jewel thief, and now, a transformational coach…

Read More
Ellendale AI Data Center
Applied Digital Ellendale AI Data Center: January 2025 Update
February 20, 2025

The new year brings continued momentum at Applied Digital’s Ellendale AI Data Center, with key milestones reinforcing its role in next-generation AI infrastructure. Construction activities in the west chiller plant are nearing completion, finalizing critical cooling capabilities. Fiber and network rooms have been successfully powered on, enhancing the facility’s connectivity readiness. Electrical terminations are…

Read More
agency
More than An Agency
February 20, 2025

Rogue Marketing sets itself apart from traditional agencies by taking a dynamic, results-driven approach rather than a rigid, transactional one. Unlike conventional agencies that simply execute a pre-planned strategy regardless of its performance, Rogue adapts in real time. If a campaign isn’t working halfway through, they pivot immediately to improve outcomes rather than waiting…

Read More
rogue marketing
Different Drives Results
February 20, 2025

Partnering with Rogue Marketing proved to be a game-changer for our dental practices. When we set out to refine our marketing strategy with a focus on patient growth and revenue generation, Rogue provided a fresh and unconventional approach. Unlike traditional marketing strategies that emphasize heavy spending on social media and paid advertising, Rogue helped…

Read More