Securing the future: Embedded security vs cybersecurity in IoT devices

As the Internet of Things (IoT) continues to expand, the focus on securing these devices has shifted significantly. Traditional cybersecurity, which typically protects networks and data from attacks, must now extend into the very fabric of IoT devices through embedded security. This necessity is underscored by new regulations like the UK’s Product Security and Telecommunications Infrastructure (PSTI) Act, the European Union’s Cyber Reliance Act, the US IoT Cybersecurity Improvement Act, as well as Singapore’s Cybersecurity Labelling Scheme, all of which mandate a security-by-design approach for IoT devices to one degree or another.

The evolution from cybersecurity to embedded security

These regulations represent a significant shift towards more regulated and secure IoT ecosystems. Manufacturers need to ensure that their devices are compliant with these new rules to avoid penalties and to maintain consumer trust. These measures are expected to improve the overall security of IoT devices, making them safer for users and less prone to cyber threats. But they also require a fundamental shift in perspective compared to some of the lax security measures in place in many devices today. Namely, they require a fundamental shift from a cybersecurity paradigm to an embedded security paradigm.

Understanding regulatory requirements

Though there are regional variations, the good news for device designers and developers is that these regulations have a lot in common. These requirements reflect a global consensus on key principles for securing IoT devices and will help companies effectively design their devices for compliance across many different markets. These include:

These commonalities reflect a growing recognition of the critical importance of cybersecurity in the IoT space, with an emphasis on making devices secure by design, ensuring they remain secure over their operational life, and providing clear information to consumers about their security practices.

Implementing Embedded security: 4 practical steps

Conclusion

Embedded security represents a shift towards integrating security at the foundational level of IoT devices, which is critical in today’s environment of sophisticated cyber threats and stringent regulations. By adopting a security-by-design approach, manufacturers not only comply with laws PSTI, CRA, US-CIA and CLS, but also protect their devices and customers from emerging threats. Following the steps above not only ensures regulatory requirements are met, but also positions manufacturers at the forefront of IoT security, turning a compliance necessity into a long-term competitive advantage.

Author: Christopher Schouten, Senior Director, IoT Security, Kudelski IoT

There’s plenty of other editorial on our sister site, Electronic Specifier! Or you can always join in the conversation by commenting below or visiting our LinkedIn page.

Exit mobile version