New release : CTI Report - Pharmaceutical and drug manufacturing 

                 Download now

Security of connected objects available to the public

Security of connected objects available to the public

With the growing development of the Internet of Things (IoT) and the introduction of numerous connected devices for consumers and professionals, security issues related to these devices are becoming a crucial issue.

Whether deployed in public environments or sold directly to consumers, these devices provide products or services on demand and tailored to your needs. These devices are made smarter by interconnecting several components: connected sensors, mobile devices, embedded PCs, cloud computing…

It is important to ensure that all links in the chain offer an adequate level of security in order to deliver the expected service or product under conditions adapted to the risks for the company and the consumer: unavailability, damage to brand image, theft of industrial secrets… In the event that the system is compromised, the physical integrity of the consumer may also be impacted.

As part of its activities related to the security of IoT and connected industrial systems, Intrinsec has carried out a specific guide to best practices for securing a connected industrial system from its design phase. The objective is to work collaboratively with the business teams on the existing technical specifications.

Hardware and software analysis of a connected toy performed by Intrinsec

The first step is to’identify the main risks considering the various use cases of the system, in agreement with management, the different product managers, and the security team. Secondly, we analyze the specifications and constraints in order to provide appropriate safety recommendations to ensure that robust equipment is made available to the public. Furthermore, we offer to’to support our clients during the implementation or adaptation of recommendations provided within the guide. Finally, we can attest to the successful implementation of the measures put in place, through conducting a validation audit.

Intrinsec also carries out penetration tests However, for these devices, these safety audits often take place once the product is finished, sometimes even before production begins. Working upstream, from the very beginning... product design, This allows for more proactive identification of vulnerabilities, in order to’to make targeted changes in line with the risks. We can thus... anticipate a change at the hardware level particularly in cases where technical choices do not allow for an optimal level of security.

Indeed, choosing components that offer appropriate safety mechanisms, such as robust cryptographic properties or memory protection solutions, is one of the aspects not to be neglected in order to avoid often complex compensatory measures.

With the increasing development of connected objects, the security needs are growing and the multiple risks, Therefore, it is essential to ensure that all links in the chain offer a satisfactory level of security.

Intrinsec supports players in the IoT world, regardless of their level of maturity.

For more information, visit our page Object Security Or Contact us