Defeating your Network Security by plugging in your intercom
As the IoT landscape continues to grow, providing valuable scalable centralized management and business intelligence; we're seeing the lack of device controls is leading to an unprecedented increase in cyber incidents from operational technology and industrial not traditionally managed by IT
Are you ready for a riveting conversation about 802.1x? Well, I for one am all over this. Having problems implementing 802.1x? Have you purchased hardware that claims to be 802.1x capable only to find out it is not capable? Or on a different version of 802.1x and can't support your needs? I'm pretty sure I'm not the only one frustrated.
What are secure certificates and why should we even care? I asked Chat GPT about this and it had a lot to say about the topic you can read it below if you have the time. Here's a summary:
TLDR: 802.1x good for security bad for hackers. What problem does this solve? It prevents a hacker from physically plugging into the network using the port your device is plugged in to.
802.1x secure certificates are good for us but very difficult to implement and maintain on our IoT devices connected via ethernet. We attempted to work with several physical security hardware manufacturers to enable 802.1x and have identified a lot of challenges in our industry. Some companies advertise 802.1x as a feature, but don't actually work. Several reiterations of their firmware during discussions make me wonder if I'm the first one attempting to implement it for their product. I doubt 802.1x worked at any of their other customer sites. I'm not going to call anyone out on this article for now even though some of you think I should.
So what's feeding into this lack of logically secure physical security devices? Why are manufacturers saying they support it when in fact they don't?
Rob Kay Senior Manager, Technical Security, Engineering and Reliability at Rivian weighs in on this topic:
802.1x became an IEEE standard in 2001. Despite undergoing revisions since then, we have had over 20 years to perfect its implementation. However, it is regrettably unsurprising that we continue to face challenges with it even today. I believe both end users and product installers must shoulder responsibility for the risks they introduce to the network. Consider this: if a breach occurs on your network through a port connected to a security-owned device such as a camera or intercom, who bears the ownership of that risk? Is it the IT/network team, the security manager, the installation company, or the engineer who approved it?
As long as we regard this issue as "someone else's problem," we will never attain the unified front necessary to progress toward the secure environment we owe it to ourselves and our employers to establish. This transformation must begin with security by design. We have moved beyond a reality where interoperability reigns supreme. We need to stop shipping devices in modes that makes them easiest to connect to, and hoping technicians or engineers enable security features. Hardware should ship with those features enabled by default, forcing conscious choice to disable them. This requires investment in training and education for all of us to understand the impact of our decisions.
There's a lack of education for IoT device security and logical security in the physical security space.
What is the prescribed solution?
(Everything up to this point was written without the assistance of AI)
For those interested in what Chat GPT had to say about 802.1x, see below:
My question to Chat GPT:
领英推荐
Me: "What is 802.1x secure certificates all about?
AI Disclaimer: Chat GPT was used in the generation of the below content
802.1X is a network access control protocol that provides an authentication framework for securing network connections. It is commonly used in Wi-Fi networks and Ethernet connections to ensure that only authorized devices and users can access the network. Secure certificates are a crucial component of the 802.1X authentication process.
Here's a breakdown of the key concepts:
Using secure certificates enhances the security of the authentication process by preventing unauthorized devices from gaining access to the network and ensuring that the authentication server is legitimate.
In summary, 802.1X with secure certificates helps maintain network security by enforcing strict authentication before allowing devices to connect. This is particularly important in environments where unauthorized access can have serious consequences, such as corporate networks, educational institutions, and government agencies.
Me: "Is 802.1x still relevant today for security? are there other options?
ChatGPT:
Yes, 802.1X is still very relevant today for network security. It remains one of the most effective methods for securing network access and ensuring that only authorized devices and users can connect to a network. Here are a few reasons why 802.1X is still widely used:
While 802.1X remains a strong and widely used option for network security, there are also alternative methods and technologies that can complement or provide additional layers of security:
In summary, while there are alternative security measures available, 802.1X remains a cornerstone of network security, especially for controlling access to wired and wireless networks. Organizations often combine 802.1X with other security technologies to create a comprehensive defense strategy against various types of threats.
Hit this spot on, Philip Jang - like you say, securing the identities of our sprawling edge complex is, your words - riveting (and scary; and timely as well?)
Senior Manager, Cybersecurity, Resiliency & Business Operations— | Cloud, Zero Trust, Staff Development | CISSP, CISM, CCSP, MBA, PMP, CSM
12 个月Thx for sharing this Phil. I appreciate you delineating chatGPT vs. you