IT disaster recovery, cloud computing and information security news

Network access policies must be updated to address IoT attack risks: Gartner

By 2020, 21 billion of Internet of Things (IoT) devices will be in use worldwide, say Gartner analysts. Of these, close to 6 percent will be in use for industrial IoT applications. However, IT organizations have issues identifying these devices and characterising them as part of current network access policies. Infrastructure and operations leaders must therefore update their network access policy “to seamlessly address the onslaught of IoT devices”.

"Having embraced a bring-your-own-device strategy, organizations must now get employee devices on the enterprise network and start addressing the 21 billion IoT devices that we project will want access to the enterprise network," said Tim Zimmermann, research vice president at Gartner. "Whether a video surveillance camera for a parking lot, a motion detector in a conference room or the HVAC for the entire building, the ability to identify, secure and isolate all IoT devices — and in particular ‘headless’ devices — is more difficult to manage and secure.

"Many IoT devices will use the established bandwidth of the enterprise network provided by the IT organization (wireless 1.3 Gbps of 802.11ac Wave 1 or 1.7 Gbps of 802.11ac Wave 2). However, it is important that the IT organization works directly with facilities management and business units to identify all devices and projects connected to the enterprise infrastructure and attaching to the network.

“Once all of the devices attached to the network are identified, the IT organization must create or modify the network access policy as part of an enterprise policy enforcement strategy. This should determine if and how these devices will be connected, as well as what role they will be assigned that will govern their access.

“In order to monitor access and priority of IoT devices, infrastructure and operations leaders need to consider additional enterprise network best practices. These can be defining a connectivity policy, as many IoT devices will be connected via Wi-Fi; performing spectrum planning — many IoT devices may be using 2.4GHz, but may not be using 802.11 protocols such as Bluetooth, ZigBee or Z-Wave, which may create interference; or considering packet sniffers to identify devices that may do something undesirable on the network.

“While more IoT devices are added to the enterprise network, infrastructure and operations leaders will need to create virtual segments. These will allow network architects to separate all IoT assets from other network traffic, supporting each FM application or BU process from other enterprise applications and users.

“As the concept of virtual segments continues to mature, the capabilities will allow network architects to prioritize the traffic of differing virtual segments as compared with the rest of the traffic on the network. For example, security video traffic and normal enterprise application traffic may have a higher priority than LED lighting.

Gartner analysts will further discuss how organizations need to plan for the digital future during Gartner Symposium/ITxpo 2016.



Want news and features emailed to you?

Signup to our free newsletters and never miss a story.

A website you can trust

The entire Continuity Central website is scanned daily by Sucuri to ensure that no malware exists within the site. This means that you can browse with complete confidence.

Business continuity?

Business continuity can be defined as 'the processes, procedures, decisions and activities to ensure that an organization can continue to function through an operational interruption'. Read more about the basics of business continuity here.

Get the latest news and information sent to you by email

Continuity Central provides a number of free newsletters which are distributed by email. To subscribe click here.