On the heels of major security breaches related to the Internet of Things (IoT Devices) in recent years, the UK government released a new report this week outlining 13 guidelines it hopes to see become the standard for devices sold to consumers in the United Kingdom.
At the top of the list? No default passwords.
The average home in the UK has 10 smart devices and, as we wrote on our blog last week, the rapidly expanding surface area of the IoT means that potential attackers have a lot of potential entry points to gain access to a network. From unsecured light bulbs to a flaw that allowed hackers to use Apple HomeKit to unlock a user’s smart door, the press has been riddled with cautionary tales of seemingly innocuous ‘smart’ devices being the access point to millions of connected devices. Still, most cyber attacks that use IoT devices as a penetration point to a network tend to exploit one of several easy-to-address gaps in device security; for lack of a better term, most of these attacks occur because manufacturers fail to follow even basic device security protocols
The UK's Department for Culture, Media and Sport released "Secure by Design," a set of guidelines for IoT device security.
After last year’s Mirai botnet attack took down some of the world’s most popular websites by initially infecting a host of unsecured devices, governments began to ramp up their research efforts on IoT security. The first major report to come out of these efforts is Secure By Design from the UK Department for Culture Media and Sport, written in conjunction with the National Cyber Security Centre. The paper cites two overarching concerns regarding the future of IoT:
The authors also outline thirteen key recommendations for any and all new IoT devices being marketed and sold in the UK and said that the report, “advocates a fundamental shift in approach: moving the burden away from consumers having to secure their devices and instead ensuring strong security is built into consumer “Internet of Things” (IoT) products by design. “
A heatmap showing the scope and scale of the Mirai Botnet attack, which was launched via unsecured IoT devices
At the core of the report is a Code of Practice, ”aimed primarily at manufacturers of consumer Internet of
Things products and associated services, [and] that is the product of years of internal research by the UK Government.” The Code of Practice can be a bit surprising - It mostly seems to cover having a basic security development lifecycle - but the promise of quick profits for the latest smart gadgets often mean security is overlooked in the rush to get a product to market. "If we've learned anything from countless attacks on smart devices in recent years, it's that manufacturers have been rushing to get the latest devices to market without properly considering the security implications," said Richard Parris, CEO of security firm Intercede
The thirteen recommendations, in order of priority as defined by the UK, are
1) No default passwords
2) Implement a vulnerability disclosure policy
3) Keep software updated
4) Securely store credentials and security-sensitive data
5) Communicate securely
6) Minimise exposed attack surfaces
7) Ensure software integrity
8) Ensure that personal data is protected
9) Make systems resilient to outages
10) Monitor system telemetry data
11) Make it easy for consumers to delete personal data
12) Make installation and maintenance of devices easy
13) Validate input data
"We want everyone to benefit from the huge potential of internet-connected devices, and it is important they are safe and have a positive impact on people's lives,” said Minister for Digital and the Creative Industries Margot James. "We have worked alongside industry to develop a tough new set of rules so strong security measures are built into everyday technology from the moment it is developed."
Still, the Code of Practice is merely a set of guidelines. It is not, in any way, binding and that has many experts worried:
What is not so clear is whether this new voluntary code of practice will make any difference. The key word is voluntary. The kind of manufacturers who will sign up to a code are probably pretty responsible already but there are plenty of others whose only aim is to pile their insecure products high and sell them cheap. The new policy will work only if online retailers refuse to stock products that do not comply with the code.
- Rory Cellan-Jones, technology correspondent for the BBC
The UK government itself seems to recognize this and sees the recommendations as more of a first step in the right direction. Minister James said of the recommendations, “This will help ensure that we have the right rules and frameworks in place to protect individuals and that the UK continues to be a world-leading, innovation-friendly digital economy.”
Whether these recommendations eventually become UK common law remains to be seen, but they would certainly appear to be an important step forward toward the adoption of more global industry standards for security practices with devices connecting to (and potentially compromising) the Internet of Things.
Read more: