STE WILLIAMS

Proposed IoT Security Bill Well-Intentioned But Likely Hard To Enforce

Internet of Things Cybersecurity Improvement Act of 2017 proposes minimum set of security controls for IoT products sold to government.

Security vendors this week praised a newly-proposed Senate bill that would require a minimum set of security controls for IoT devices, but they also expressed concerns that the legislation would be hard to enforce.

The provisions of the bill, titled Internet of Things (IoT) Cybersecurity Improvement Act of 2017, apply primarily to IoT devices meant for use by the U.S. government. Senators Mark Warner (D-VA) and Cory Gardner (R-CO) Tuesday introduced the bill Tuesday, citing concerns that government cyber systems might be put at risk by poorly-protected IoT devices.

The proposed bill requires IoT vendors that sell to the federal government to ensure their devices can be patched, do not have fixed or hard-coded passwords, and do not have any known security vulnerabilities.

The bill also requires IoT vendors to ensure that any software they use for communications, encryption, and other critical functions is fully supported by the software vendor. The bill directs the White House’s Office of Management and Budget to develop alternative security requirements for IoT devices that do not have the data processing or software functionality to support security updates and patches.

In addition, the Internet of Things (IoT) Cybersecurity Improvement Act of 2017 promotes the creation of standard vulnerability disclosure polices for federal contractors.  It seeks to ensure that bug hunters are provided adequate legal protections when hunting for and disclosing bugs in IoT products in a responsible manner.

The bill was drafted in consultation with organizations such as the Berkman Klein Center for Internet Society at Harvard University and the Atlantic Council. It is one of the first to attempt to address the burgeoning security problems caused by poorly protected Internet connected devices.

Last year, threat actors took advantage of hard-coded passwords and other vulnerabilities in Internet connected home routers, CCTVs and DVRs to launch massive denial of service attacks against Internet service provider Dyn and other major online properties including Netflix, Airbnb, and Twitter. The Mirai attacks showed how easily threat actors could assemble massive attack botnets from vulnerable IoT devices and use them to launch DDoS attacks and other malicious campaigns.

With analyst firms like Gartner predicting that tens of billions of IoT device will go online in the next few years, concerns over the threat to Internet security from vulnerable IoT devices have only escalated.

From that standpoint, the proposed legislation is definitely a good thing, says Rod Schultz, chief product officer for Rubicon Labs. “The fact that Congress is even discussing IoT security is a good thing, and calling out low-hanging security challenges such as static passwords will help,” he says.

There is still a lot that still needs to be considered with respect to vulnerability detection and legal enforcement of the bill, as well as what parties in the IoT supply chain will be indemnified.  “But it’s refreshing to see Congress being proactive,” he says.

Travis Smith, principal security researcher at Tripwire, says the bill will help address some IoT security issues and protect security researchers who expose vulnerabilities in Internet-connected devices.  But even if IoT vendors were to develop systems that can be patched and do not have hard-coded passwords, it would still be up to the users to ensure that default passwords are changed and that relevant patches are applied. These issues could limit the effectiveness of the bill.

Mirai was successful not because users couldn’t change device passwords, but because they chose not to, Smith observes.

“If this bill wants to address the real problem regarding insecurity of IoT devices, additional language…needs to be added,” Smith says.

“First, not only should there be no hard-coded credentials, there should be no [admin] credentials shared across devices,” Smith suggests.

Secondly, the bill should require defined processes for IoT device vendors to alert consumers about the availability of security patches. “Far too often, patches are uploaded to a support portal — without the end-user having any idea about it,” Smith says.

Related content:

 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year … View Full Bio

Article source: https://www.darkreading.com/iot/proposed-iot-security-bill-well-intentioned-but-likely-hard-to-enforce/d/d-id/1329521?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Measuring Security Effectiveness Body








To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

NSS Labs’ CMO Gautam Aggarwal discusses how the company’s CAWS Security Validation Platform can help CISOs get empirical evidence of security effectiveness and map security vulnerabilities to business impact.



‘);
}



‘);
}

Comments

‘);
}

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

Dark Reading Live EVENTS

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon Contest

Write a Caption, Win a Starbucks Card! Click Here

Latest Comment: “Windows 10 Paint 3D is awesome!”


Security Vulnerabilities: The Next WaveJust when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?

Reports

[Strategic Security Report] Assessing Cybersecurity Risk

[Strategic Security Report] Assessing Cybersecurity Risk

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today’s enterprises evaluate the risks they face. This report also offers a look at security professionals’ concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.

7 Hardware  Firmware Hacks Highlighted at Black Hat 2017

7 Hardware Firmware Hacks Highlighted at Black Hat 2017

Best of Black Hat: 20 Epic Talks in 20 Years

IoT Security Incidents Rampant and Costly

Dark Reading - Bug Report
Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database

CVE-2017-0290Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within …


CVE-2016-10369Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).


CVE-2016-8202Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version…


CVE-2016-8209Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.


CVE-2017-0890Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week
<!–
UBM DeusM
–>

UBM Tech



Leveraging Machine Learning and AI to Combat Online Attacks

As the threat landscape grows more complex, organizations need a framework to combat a wide diversity of cyberattacks. Gigamon’s CTO Shehzad Merchant talks about the company’s Security Defender Lifecycle Model and how it uses AI and machine learning to contain potential threats.

Article source: https://www.darkreading.com/leveraging-machine-learning-and-ai-to-combat-online-attacks/v/d-id/1329523?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Using Intelligence to Optimize Your Data Defense Strategy








To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

How do you optimize your security budget and the tools you already have? John Weinschenk of Spirent discusses how preemptive intelligence can help an organization manage its in-house security solutions and prioritize equipment decisions.



‘);
}



‘);
}

Comments

‘);
}

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

Dark Reading Live EVENTS

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon Contest

Write a Caption, Win a Starbucks Card! Click Here

Latest Comment: “Windows 10 Paint 3D is awesome!”


Security Vulnerabilities: The Next WaveJust when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?

Reports

[Strategic Security Report] Assessing Cybersecurity Risk

[Strategic Security Report] Assessing Cybersecurity Risk

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today’s enterprises evaluate the risks they face. This report also offers a look at security professionals’ concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.

7 Hardware  Firmware Hacks Highlighted at Black Hat 2017

7 Hardware Firmware Hacks Highlighted at Black Hat 2017

Best of Black Hat: 20 Epic Talks in 20 Years

IoT Security Incidents Rampant and Costly

Dark Reading - Bug Report
Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database

CVE-2017-0290Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within …


CVE-2016-10369Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).


CVE-2016-8202Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version…


CVE-2016-8209Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.


CVE-2017-0890Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week
<!–
UBM DeusM
–>

UBM Tech



Protecting Your Organization Against Ransomware

John Shier, Senior Security Advisor for Sophos, explains how the company’s ransomware protection service can help you defend your organization without going through a steep learning curve.

Article source: https://www.darkreading.com/protecting-your-organization-against-ransomware/v/d-id/1329525?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

How to Beat Phishing Attacks

From attacks on CEOs to “mom phishing,” social engineering attacks are getting more targeted and sophisticated. KnowBe4’s CEO Stu Sjouwerman explains how online security awareness training and phishing exercises can help educate and train employees to protect corporate data.

Article source: https://www.darkreading.com/how-to-beat-phishing-attacks/v/d-id/1329526?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Assume the Worst

Jeffrey Duran, Director of Product Marketing for enSilo warns CiSOs that putting too much emphasis on preventative security can be a risky proposition. Instead organizations need to consider post-infection detection to truly be secure.

Article source: https://www.darkreading.com/assume-the-worst/v/d-id/1329527?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

How to Combat the Security Skills Shortage

A higher volume of online attacks and a dearth of security professionals make it difficult for organizations to protect themselves. CenturyLink’s Cybersecurity Architect Jeffrey Krone explains how outsourcing can help companies get the talent, scale, and expertise they need.

Article source: https://www.darkreading.com/how-to-combat-the-security-skills-shortage/v/d-id/1329528?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Twenty-five Percent of Emails Deemed Unsafe

Mimecast’s Steve Malone discusses the latest findings from the company’s Email Security Risk Assessment report, and how cloud-based email services can help.

Article source: https://www.darkreading.com/twenty-five-percent-of-emails-deemed-unsafe/v/d-id/1329529?_mc=rss_x_drr_edt_aud_dr_x_x-rss-simple

Thwarting DDoS Attacks








To InformationWeek
Network Computing
Darkreading





Dark Reading | Security | Protect The Business - Enable Access

Search

Neustar’s Barrett Lyons discusses the company’s investment in a “scrubbing service” and Web application firewalls to protect organizations against DDoS attacks.



‘);
}



‘);
}

Comments

‘);
}

Register for Dark Reading Newsletters

Live Events

Webinars


More UBM Tech
Live Events

Dark Reading Live EVENTS

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments

0 Comments


Cartoon Contest

Write a Caption, Win a Starbucks Card! Click Here

Latest Comment: “Windows 10 Paint 3D is awesome!”


Security Vulnerabilities: The Next WaveJust when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?

Reports

[Strategic Security Report] Assessing Cybersecurity Risk

[Strategic Security Report] Assessing Cybersecurity Risk

As cyber attackers become more sophisticated and enterprise defenses become more complex, many enterprises are faced with a complicated question: what is the risk of an IT security breach? This report delivers insight on how today’s enterprises evaluate the risks they face. This report also offers a look at security professionals’ concerns about a wide variety of threats, including cloud security, mobile security, and the Internet of Things.

7 Hardware  Firmware Hacks Highlighted at Black Hat 2017

7 Hardware Firmware Hacks Highlighted at Black Hat 2017

Best of Black Hat: 20 Epic Talks in 20 Years

IoT Security Incidents Rampant and Costly

Dark Reading - Bug Report
Bug Report

Enterprise Vulnerabilities
From DHS/US-CERT’s National Vulnerability Database

CVE-2017-0290Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within …


CVE-2016-10369Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).


CVE-2016-8202Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version…


CVE-2016-8209Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.


CVE-2017-0890Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

googletag.display(‘div-gpt-ad-961777897907396673-15’);

Information Week
<!–
UBM DeusM
–>

UBM Tech