IoT Security: ETSI Recommends Avoiding Internet Exposure to IoT devices
IoT devices should avoid being exposed to Internet

IoT Security: ETSI Recommends Avoiding Internet Exposure to IoT devices

The Internet of Things (IoT) has become an integral part of our lives, with billions of devices connected to the internet. The IoT devices are usually connected to Internet in order to allow them to communicate with Cloud-based applications rendering the value added services expected by customers. Examples can include, Medical condition monitoring, Remote Baby monitoring, Music content players, Remote Home Appliances management…? ?


However, this connectivity between the IoT device and the Cloud-Based applications, also makes the overall service an easy target for cyberattacks.


In the past few years, lots of IoT devices have been hacked because they were exposed on the internet.

  • Medical devices: Medical devices that are connected to the internet can be hacked to change their settings or even to deliver incorrect dosages of medication. In 2022, hackers were able to hack into insulin pumps and change the settings, which could have resulted in serious harm to patients.
  • Baby monitors: Baby monitors can be hacked to spy on babies. In 2021, hackers were able to hack into a popular baby monitor brand and watch babies in their cribs.
  • Smart speakers: Smart speakers can be hacked to record conversations or even issue commands. In 2020, hackers were able to hack into Amazon Echo speakers and issue commands to turn on lights or lock doors.
  • Internet-connected thermostats: Internet-connected thermostats can be hacked to change the temperature in a home or office. In 2019, hackers were able to hack into Nest thermostats and change the temperature to freezing.
  • Security cameras: Security cameras are a common target for hackers because they can be used to spy on people. In 2017, hackers were able to access over 100,000 security cameras around the world.

The list of IoT devices that have been hacked is constantly growing, hence it is important for IoT device designers to take steps to secure their IoT devices and protect them from these types of attacks.


The ETSI 403 645 document is a set of security recommendations for IoT devices. One of the key recommendations is to minimise attack exposure surface, meaning - amongst other things - avoid exposing IoT devices to the internet whenever possible.


There are a number of ways to avoid exposing IoT devices to the internet. One way is to use a local area network (LAN) to connect the devices to each other and to a controller. This way, the devices are not directly connected to the internet and can only be accessed by authorized users. And then if the the controller needs to be connected to other cloud-based instances, that connection needs to remain on a private network as well.


Another way to avoid internet exposure of the device by connecting them directly to the cloud-based instances via fully private networks.


In addition, it is important to keep IoT devices up to date with the latest security patches. This will help to protect the devices from known vulnerabilities.

By following these recommendations, organizations can help to protect their IoT devices from cyberattacks.

In addition to avoiding internet exposure, the ETSI 403 645 standard also recommends a number of other security measures for IoT devices, such as:

  • Using strong passwords and authentication methods
  • Encrypting data in transit and at rest
  • Regularly scanning for vulnerabilities
  • Implementing security incident response procedures


By following these recommendations, organizations can help to secure their IoT devices and protect their data from unauthorized access.


Dale Richards

CCaaS on Azure. Software Platform Innovation. Microsoft Azure Co-sell. Agility, Adaptability, and Value Creation through Collaborative Co-selling.

1 年

Thanks for the article, Sylvestre. Also, the discussion is helpful. ??Dan Newbold II, I'm curious to hear your take on this topic.

Noam Segev

Chief Revenue Officer and Cybersecurity Professional- Expert in generating new revenue streams on top of cellular IoT connectivity

1 年

I partially agree Sylvestre Becker Babel . However, you have missed one of the major threats of physical tempering with IOT devices, located outside the enterprise perimeter- for example, smart meters, EV charging stations, Point of Sales etc. Deployment of private networks would not solve cases of fraud or remote attacks via connectivity on the enterprise control center.

Cedric Mauvielle

VP Global IoT Sales and Partnership

1 年

the challenge with the Internet is that it just needs one mistake to expose the IoT fleet. Moreover tech evolves. Devices with a 5 to 10years lifecycle are usually not advanced as cost saving drives their procurement. A device that is good technologically and software speaking in 2023 may not be as good in 2033. Imagine the leap frog we made compared to the best devices produced in 2013. So limiting risk and avoiding the main hacking risk that Internet represent is a valid long term step. Current software based solution to protect IoT device is not a guarantee of safety over time.

Lukasz M.

IoT Solutions for SMBs: Driving Growth & Competitive Advantage

1 年

Very good article, Sylvestre Becker Babel. We access our bank accounts daily via the Public Internet, so connecting IoT devices to the network is not the real issue. IoT devices are exposed when they accept incoming connections "from the Internet". Sending telemetry data from devices to the backend system utilizing the Public Internet is totally valid approach, provided that: * Devices are the active participants of communication. * We establish mutual authentication between devices and the backend endpoint. * Transmission is encrypted. If an IoT device drops any incoming request (as it should), connecting it to the Internet does not provide any risk.

要查看或添加评论,请登录

Sylvestre Becker Babel的更多文章

社区洞察

其他会员也浏览了