12
FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS RESEARCH IoT and IIoT Security Survey What More Connected Devices Mean for Industrial Security MARCH 2021

IoT and IIoT Security Survey - tripwire.com

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: IoT and IIoT Security Survey - tripwire.com

FOUNDATIONAL CONTROLS FOR SECURITY, COMPLIANCE & IT OPERATIONS

RESEARCH

IoT and IIoT Security Survey What More Connected Devices Mean for Industrial Security

MARCH 2021

Page 2: IoT and IIoT Security Survey - tripwire.com

2

Research GoalThe primary research goal was to understand current approaches,

challenges, and opinions about security of connected devices in enterprise

environments including ICS, IIoT, and consumer IoT.

MethodologyIndependent sources of security professionals were invited to participate

in an online survey. A variety of questions were asked on topics related to

IoT. Responses were captured between March 3 and March 10, 2021.

ParticipantsA total of 312 qualified individuals completed the survey. All had direct

responsibility for the security of IoT devices at a company in the United

States or Europe with at least 100 employees.

Page 3: IoT and IIoT Security Survey - tripwire.com

3

COMPANIES REPRESENTED

Company Size

44%

33%

100–1,000 employees

More than 5,000 employees

1,000–5,000 employees

23%

Target industries (see next chart)

Other industries

Industry Split

68%

32%

Industries—Target and Other

0 5 10 15 20

ManufacturingEnergy

Food & AgriculturePharmaceutical

ChemicalsWater/Wastewater

NuclearOil & Gas

DamsTechnology

Financial Services & InsuranceServices

TelecommunicationsHealthcare

GovernmentRetail

EducationOther

14%

6%

4%

3%

3%

1%

1%

1%

0%

17%

10%

10%

9%

7%

4%

4%

2%

6%

Page 4: IoT and IIoT Security Survey - tripwire.com

4

INDIVIDUALS REPRESENTED

Job Level

25%

49%

26%

Individual contributor

Executive

Team manager

Region

65%

35%

United States

Europe

Responsibility for IoT Devices

ICS Corporate Consumer IoT devices

0

10

20

30

40

50

60

70

80

41%

Defining IoT

In this study, IoT (Internet of Thing) devices referred to any device that is able to connect to the internet, including:

» Consumer devices such as smart watches, digital health monitors and connected home products (refrigerator, speakers, smart locks, etc.)

» Corporate IoT systems (smart buildings, logistics trackers, etc.)

» Industrial control systems (ICS) such as factory automation, power generation and machinery

In this study, IoT does not include traditional connected devices such as laptops, servers, routers, or mobile phones.

All participants read and agreed to this definition.

52%

79%

Page 5: IoT and IIoT Security Survey - tripwire.com

5

What challenges does your company face with the security of IoT and IIoT devices? Choose all that apply.

5

99% OF SECURITY PROFESSIONALS REPORT CHALLENGES WITH THE SECURITY OF THEIR IoT AND IIoT DEVICES

39%

21%

Very concerned

Not concerned

Somewhat concerned42%

95%

0 10 20 30 40 50 60 70 80

Discovering and remediating vulnerabilities

Tracking inventory of IoT devices on the network

Validating compliance with security policies

Establishing secure configurations

Detecting changes on these devices

Gathering forensic data after an incident

Other

We don’t face any issues with IoT security

66%

60%

58%

56%

55%

37%

1%

1%

How concerned is your company about the security risk of IoT and IIoT devices?

95% ARE CONCERNED ABOUT THE SECURITY RISKS ASSOCIATED WITH THEIR CONNECTED DEVICES

53%

5%

Page 6: IoT and IIoT Security Survey - tripwire.com

6

In your opinion, is your team adequately resourced for the security needs of IoT and IIoT devices across your company?

Which of the following statements best represents your personal security philosophy?

88% REQUIRED (OR STILL REQUIRE) ADDITIONAL HELP FOR IoT AND IIoT SECURITY NEEDS

MORE THAN THREE QUARTERS SAID THAT IOT AND IIOT DEVICES DO NOT EASILY FIT INTO THEIR EXISTING SECURITY APPROACH

52%

12%9%

IoT and IIoT devices easily fit into our existing approach to security

IoT and IIoT devices require a different approach to security

22%

78%

27%

Yes, our existing team is more than capable with existing skillsets

No, but we have a plan to get there

Yes, but we’ve required additional help (training, hiring, consultants, etc.)

No, we don’t and we’re not sure what we need to do

88%

Page 7: IoT and IIoT Security Survey - tripwire.com

7

What security standards or frameworks does your company follow? Choose all that apply.

Is your company audited for compliance with these security standards?

88% FOLLOW SOME KIND OF SECURITY STANDARD OR FRAMEWORK

AND MOST OF THOSE THAT FOLLOW SECURITY STANDARDS ARE AUDITED FOR THEM

OtherMost common: ISOAlso HIPAA; HITRUST; CSA; native Dutch

0 10 20 30 40 50

Yes

No

28%

72%

By Company Size (# of employees)

66% 71%

34% 29%

PCI

NIST

CIS

MITRE

ENISA

NERC CIP

Other

We don’t follow specific security standards or frameworks

50%

50%

37%

19%

10%

8%

3%

12%

17%

83%

100–1,000 Employees More than 5,000 Employees1,000–5,000 Employees

Page 8: IoT and IIoT Security Survey - tripwire.com

8

What types of devices do you think would benefit most from expanded security standards? Choose the one answer that most closely applies.

Consumer IoT devices

Industrial control systems (ICS)

Corporate IoT systems

There is no difference30%

37%

23%11%

Other industries

33%17%

39%

12%

INDUSTRIAL PROFESSIONALS ACROSS TARGET INDUSTRIES* BELIEVE THEY WOULD BENEFIT FROM EXPANDED ICS SECURITY STANDARDS

Target industries*

Consumer IoT devices

Industrial control systems (ICS)

Corporate IoT systems

There is no difference

*Manufacturing, energy, farm & agriculture, oil & gas, pharmaceutical, chemical, nuclear, and water/wastewater

Page 9: IoT and IIoT Security Survey - tripwire.com

9

97% OF ALL RESPONDENTS HAVE CONCERNS ABOUT SUPPLY CHAIN SECURITY

What concerns do you have about security risks within your supply chain? Choose all that apply.

0 10 20 30 40 50 60 70 80

Limited visibility into changes in the security of vendors in the supply chain

Unable to fully monitor connected items entering our controlled environments

Process for evaluating new vendors is bureaucratic and ineffective

Partners have too much access to our systems

Other

We don’t have any concerns about risk in our supply chain

68%

59%

39% 34% 37%

34%

1%

3%

Other“Vendor is compromised but not aware they’ve been breached, à la SolarWinds.”

61%

53%

35%

40%

2%

4%

Target industries

All respondents

Page 10: IoT and IIoT Security Survey - tripwire.com

10

87% AGREE THAT EXISTING IOT SECURITY GUIDELINES PUT THEIR SUPPLY CHAIN SECURITY AT RISK

Please indicate your agreement with each of the following statements.

11%

29%

58%

2%

Strongly Agree

Disagree somewhat

Agree somewhat

Strongly disagree

I worry about security risk to our supply chain based on existing IIoT security guidelines

The government needs to step up and deliver consistent security guidelines for connected devices

18% 30%

44%

8%

It feels like our business leaders want us to connect everything to the internet

21%

17%

53%

8%

Page 11: IoT and IIoT Security Survey - tripwire.com

11

No change

Decreased somewhat

Decreased dramatically

Increased dramatically

Increased somewhat

59% REPORT THAT BUDGET FOR MANAGING SUPPLY CHAIN SECURITY INCREASED IN THE PAST YEARIn the past year, how has your security team’s budget for managing the security of your company’s supply chain changed?

36%

51%

8%

99% REPORT THAT THEIR SECURITY TEAMS DO REFUSE REQUESTS TO CONNECT DEVICES; 43% SAY THEY OFTEN DO

How often does your security team refuse a request from an employee to connect a device to your corporate network?

3%1%

Occasionally

Frequently

Constantly

Never

Rarely

59%

39%

36%

7%17%

1%

Page 12: IoT and IIoT Security Survey - tripwire.com

Tripwire is the trusted leader for establishing a strong cybersecurity foundation. We protect the world’s leading organizations against the most damaging cyberattacks, keeping pace with rapidly changing tech complexities to defend against ever-evolving threats for more than 20 years. On-site and in the cloud, our diverse portfolio of solutions find, monitor and mitigate risks to organizations’ digital infrastructure—all without disrupting day-to-day operations or productivity. Think of us as the invisible line that keeps systems safe. Learn more at tripwire.com

The State of Security: News, trends and insights at tripwire.com/blog Connect with us on LinkedIn, Twitter and Facebook

©2021 Tripwire, Inc. Tripwire, Log Center/LogCenter, IP360, Tripwire Axon and others are trademarks or registered trademarks of Tripwire, Inc. All other product and company names are property of their respective owners. All rights reserved. BRDRCDS1a 2103