Thursday, May 30 2024

Microsoft is taking action to fortify IoT devices against threats and support the U.S. National Cybersecurity strategy, according to a company blog post.

“Microsoft remains committed to supporting the U.S. National Cybersecurity Strategy and helping partners effectively deliver and maintain more secure IoT solutions using powerful technology, tools, and programs designed to improve security outcomes. It is vitally important that partners focus on IoT security by prioritizing security through smart design and development practices and carefully selecting platforms and security defaults that are secure as possible to lower the cost of maintaining the security of products,” the post said.

The U.S. National Cybersecurity Strategy, published in March, called for significant pivots in how the U.S. assigns duties, obligations, and assets within the cybersecurity industry. It sought to transfer the responsibility of cybersecurity to well-positioned, larger organizations and outlined a vision to foster long-term investments. According to the strategy, too many IoT devices lack adequate security, and are hard or impossible to upgrade. An implementation plan for the strategy was published in July that provided 65 directives for federal agencies, with 18 agencies and the Office of the National Cyber Director leading the plan.

The blog post outlined Microsoft’s application of the Zero Trust model to IoT. “Zero Trust is a proactive, integrated approach to security across all layers of the digital estate that explicitly and continuously verifies every transaction, asserts least privilege, and relies on intelligence, advanced detection, and real-time response to threats,” a Microsoft white paper noted.

To mitigate IoT cybersecurity threats, the Zero Trust approach necessitates secure endpoints, applications, APIs, data, infrastructure, and networks. Identities, whether that be people or IoT, must also be defended. Not only does the Zero Trust model align with the National Cybersecurity Strategy, but it also meets the needs of companies with a mobile workforce, ensuring greater security even outside of the physical workplace.

Companies can integrate the Zero Trust principles into their IoT and OT devices with Microsoft Defender for IoT.

The post also discussed Microsoft’s Edge Secured-core, a special certification for IoT devices running a complete operation system. These products meet security requirements such as a hardware-based service identity or built in security agent and hardening. The program is similar to an FCC proposal to create a cybersecurity labeling program. Starting as soon as 2024, consumers would see a “U.S. Cyber Trust Mark” shield logo applied to smart products that meet guidelines set by the National Institute of Standards and Technology (NIST).

It further highlighted the Windows IoT platform, which offers essential features to protect devices and data against the numerous threats commonly found in the modern digital environment. Among those features are exploit mitigations and device attestations. Similarly, Microsoft Azure Sphere is a cloud-based solution which secures IoT devices.

The blog post comes as lawmakers devote increasing attention to IoT devices. A letter from the House Select Committee on the Chinese Communist Party to Federal Communications chairwoman Jessica Rosenworcel asked for information about threats posed by Chinese cellular modules infiltrating IoT devices. “Does the FCC require or desire further statutory authorities to combat the threat that PRC cellular IoT modules pose?” they asked.


Osano Raises $25M in Funding to Enhance Data Privacy Platform 


N.Y. Gov. Debuts Premier State Cybersecurity Strategy

Check Also


Don’t Miss

Best Cloud Security Posture Management (CSPM) Software

Ellie Buscemi

What is Cloud Security Posture Management and how does it work? Cloud Security Posture Management (CSPM) is a product, service or platform that allows a business to protect their cloud infrastructure through the prevention, detection and response of cyber risks. A CSPM offering uses known and effective frameworks, regulatory standards and company policies to confirm […]

Best Privileged Access Management (PAM) Products

Lara Oporto

What is Privileged Access Management and how does it work? Privileged Access Management (PAM) products stand as a crucial fortress in fortifying your company’s digital landscape. Functioning as a meticulous guardian, PAM offerings orchestrate the establishment of access protocols, meticulously determining who holds privileged access to critical data and the specific circumstances under which such […]

Best Automated Moving Target Defense (AMTD) Offerings

Ellie Buscemi

What is Automated Moving Target Defense and how does it work? Automated Moving Target Defense (AMTD) is a recent innovation in cybersecurity that focuses on flexibility, deception and attack prevention. AMTD has four main components: it provides proactive cyber defense mechanisms, contains automation to change the attack surface, utilizes deception technology and can execute preplanned […]

Third-Party Risk Management Solutions

Lara Oporto

What is Third-Party Risk Management? Third-Party Risk Management (TPRM) software assists organizations in managing risks associated with their relationships with suppliers, vendors and service providers. The products offer a range of features to automate and streamline various aspects of third-party risk management. They typically include tools for risk assessment, due diligence, contract management and ongoing […]

Best Industrial Internet of Things (IIoT) Platforms

Lara Oporto

Industrial Internet of Things (IIoT) offerings are technological solutions empowering businesses to connect, manage and analyze data from a multitude of devices and systems within industrial settings, such as manufacturing, energy, transportation, logistics and healthcare. What are Industrial Internet of Things (IIoT) platforms and how do they work? Industrial Internet of Things (IIoT) platforms are […]

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]