Right Approach Zero Trust Iot
Right Approach Zero Trust Iot
Palo Alto Networks | The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 1
Table of Contents
Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3
The Right Approach to Zero Trust Security for Enterprise IoT Devices . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 2
Introduction
The incredible growth of the Internet of Things has presented unique business opportunities and new
operational models across various industries and use cases. Although estimates vary, the Gartner
Machina IoT database predicts there will be over 18 billion connected devices in enterprises by 2030. To
put the numbers in perspective, by 2030, there will be four times the number of devices connecting to
the network than the users in an enterprise.
These devices are powering exciting new use cases across a multitude of industries, from manufac-
turing to banking, as well as driving business outcomes and operational efficiencies previously unat-
tainable. However, this explosion in adoption has inadvertently expanded the surface for cyberattacks,
exposing organizations to a wide range of network-connected device security risks.
Palo Alto Networks Unit 42 IoT Threat Report, based on 1.2 million endpoints, found that IoT devices
comprised 30% of all enterprise devices in 2020. On top of that, the Gartner Machina IoT database also
predicts approximately 13% CAGR growth of IoT devices from 2020 to 2030.
$ ¥
€
Manufacturing Smart Building Retail Government Healthcare Banking
Figure 1: Projected IoT growth by industry, according to Gartner’s Machina IoT Forecast database
Across all industries, the security risk exposure of these network-connected devices is high. Palo Alto
Networks Unit 42’s IoT Threat Report found that:
• 57% of IoT devices are highly vulnerable.
• 98% of all connected device traffic is unencrypted.
• 83% of connected devices run unsupported OS.
Security approaches historically employed by networking and security teams cannot effectively
protect network-connected devices. These systems relied on protections at the network perimeter to
secure organizations. The internal network was deemed trusted and secure, and application traffic
could flow unrestricted. However, with the rise of connected devices and other changes, such as con-
nectivity to the internet, cloud migration, and hybrid work, the traditional network perimeter is no
longer a circle of trust.
To provide adequate security, the enterprise IT and security teams must account for all types of devices
accessing the network, from conventional IT devices to connected IoT devices. The way to do this is by
adopting a Zero Trust approach to security and applying it to network-connected devices and systems.
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 3
work, a “protect surface” is defined. It comprises the enterprise’s most critical and valuable data, assets,
applications, and services. Because it contains what is most critical to an organization’s operations, the
protect surface is orders of magnitude smaller than the attack surface and is always knowable.
In Zero Trust, only known, allowed traffic can access the protect surface. In this case, IoT devices only
have access to the data and applications they need to perform their tasks but nothing more. This is
known as least-privileged access.
Zero Trust provides a security framework for network-connected devices that continuously validates
their integrity. Zero Trust also enforces least-privileged access for connected devices, limiting exposure
of data and applications. With Zero Trust, connected devices’ transactions are secure and validated to
thwart cyberthreats and protect data.
Palo Alto Networks has outlined the Zero Trust framework with the following guiding principles that
encompass security for all users, applications, and infrastructure within an organization across the four
pillars of Identity, Device/Workload, Access, and Transaction, as represented in table 1. These pillars are
also applicable to IoT devices.
Securing unmanaged network-connected devices is essential to achieving Zero Trust for infrastructure.
These guiding principles help define actionable Zero Trust security for all connected devices.
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 4
The Right Approach to Zero Trust Security for
Enterprise IoT Devices
The Zero Trust guiding principles outlined in the previous section translate into further granular guid-
ing principles specific to achieving Zero Trust for office IoT and other devices such as printers, camer-
as, tablets, smart TV, HVAC systems, etc. Table 2 presents a Zero Trust framework that organizations
should consider for securing network-connected devices.
Discover all IoT devices Recommend Zero Trust policies Continuously monitor IoT devices
Assess IoT security risk Enforce Zero Trust policies Prevent known and unknown threats
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 5
Addressing Challenges with Zero Trust for IoT Devices
Palo Alto Networks Enterprise IoT Security brings IoT devices into the Zero Trust security model fold
and addresses challenges following principles based on three core areas:
1. Device/Workload
2. Access
3. Transaction
The principles behind these pillars minimize connected device security risks to keep your organization
safe from cyberattacks. Palo Alto Networks has made it exceedingly easy to achieve Zero Trust for IoT
devices, thus elevating organizations’ overall security posture. The following is the Palo Alto Networks
practical approach to how organizations can achieve Zero Trust for IoT devices.
Discovery
You can’t secure what you can’t see. To extend the principles of Zero Trust to IoT devices, it is essential
to go beyond users and standard IT devices to include all unmanaged connected devices. Enterprise IoT
Security from Palo Alto Networks is the only agentless IoT security solution that uses machine learning
(ML) and deep packet inspection with crowdsourced telemetry to discover and classify every connected
device in the network, including the never-seen-before ones.
ML is not only a superior approach compared to the reactive, traditional, signature-based device dis-
covery methods, but it is also vital. The volume of network-connected devices unknown to IT is stag-
gering, and the growth continues. An ML-powered device discovery approach ensures that new devices
are quickly and accurately discovered and classified in real time. It provides an approach that address-
es the challenges associated with new connected device types being added to the network, fueled by
emerging wireless protocols, such as 5G.
Our Enterprise IoT Security analyzes 200 parameters to accurately match each connected device’s IP
address with its type, vendor, and model to surface 50+ essential device attributes that completely pro-
file the device. Accurate and granular device classification is necessary to differentiate unmanaged net-
work-connected devices from managed IT assets. Doing that enables enforcement of Zero Trust-driven
security policies that only allow approved traffic across your network.
Figure 3 shows the top categories of contextual information that Enterprise IoT Security provides.
Figure 3: Enterprise IoT Security can discover 90% of the devices within 48 hours—and more after that
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 6
Risk Assessment
The next step in applying the Zero Trust framework is to assess the risk with high confidence and de-
termine the level of risk for IoT devices. However, to assess risk effectively, one needs to know what it
means, clarifying it relative to threats and vulnerabilities.
Risk is a function of threats exploiting vulnerabilities to compromise or damage assets, such as con-
nected devices. Three vectors are used to measure network-connected device risk:
1. Threats
2. Vulnerabilities
3. Asset context
Enterprise IoT Security from Palo Alto Networks detects and assesses risk across all three vectors. This
is done by leveraging crowdsourced device data, machine learning-powered device behavior anomaly
assessment, proprietary Unit 42 threat research, CVEs, third-party vulnerability management infor-
mation, and more.
Device Risk
Figure 4: Enterprise IoT Security detects and assesses risk across these three vectors
Enterprise IoT Security measures risk and assigns a score for the amount of risk it observes at four levels:
1. Individual office IoT and other generic devices
2. Device profile
3. Site
4. Organization
When calculating the risk scores of IoT device profiles, sites, and organizations, Enterprise IoT Security
considers the scores of individual devices within a particular group and the percentage of risky devices
in the group. The different scores provide a simple means to check the risk posed at various points and
areas of your network.
Discover IoT device vulnerabilities in your network in a few hours rather than three-plus weeks.
Here’s how.
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 7
Zero Trust Principle Two: Access
Least-privileged access segmentation for native and third-party infrastructure.
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 8
Policy Implementation
Enterprise IoT Security can natively implement recommended Zero Trust security policies with its
NGFW or via third-party enforcement points in two primary ways:
1. Enforce recommendations with one click via Palo Alto Networks NGFW. Our patented Device-ID
policy construct tracks an individual device across the network, providing detailed information
as a context within the ML-Powered NGFW for any alert or incident that may occur—regardless
of changes to the device’s IP address or location. In addition, policy rules and Layer 7 controls are
automatically updated as the location and identified risks change. Table 5 shows how Device-ID is
more scalable and provides faster remediation and response to threats.
2. Enforce the recommended policies using our NAC integrations with Cisco ISE, Forescout, or Aruba
ClearPass.
Table 3: How Device-ID Helps Administrators Get Fast and Accurate Policy Implementation
Without Device-ID With Device-ID
Reliance on IP address as a proxy for device Device identity is available within policy
identity does not provide accurate device identity
Reliance on users, network, or device admins to Consistent policy enforcement regardless
properly address device issues is error-prone and of where the device is connected or how it is
creates an opportunity for exploitation configured
Reliance on external systems such as NAC or asset Directly feed Device-ID using Enterprise IoT
management requires integrations to be built and Security, eliminating the need for complex
maintained integrations
Threat or incident investigation needs SOC to Threats alert with device info received by SIEM
touch multiple systems to track down which
specific device generated the alert
Continuous Monitoring
Continuous monitoring is the final and crucial step in closing the Zero Trust security loop for net-
work-connected IoT devices. Even if a device has been profiled and placed in the correct segment, it
could still be compromised during its connection to the network. If an IoT device is compromised, its
access to the resources and the network is immediately blocked.
Our ML-based Enterprise IoT Security automatically ascertains an IoT device’s identity and verifies
normal behaviors. Once normal behaviors are established, the solution kicks in anomaly detection to
uncover and prioritize any potential deviation from the baseline. Our machine learning establishes a
baseline of Layer 7 device behaviors and provides two types of insights:
1. Enterprise IoT Security uses ML to compare the behaviors with similar crowdsourced devices to
establish a behavior baseline and monitor deviation continually. This information helps automate
Zero Trust policy creation.
2. Enterprise IoT Security also monitors device traffic and communication patterns and continually
contrasts them against existing VLAN designs to simulate the right microsegmentation design and,
after that, enforcement.
IoT devices generate unique, identifiable patterns of network behavior. Using machine learning and AI,
Enterprise IoT Security recognizes these behaviors and identifies every device on the network. It then
creates a rich context-aware inventory that is dynamically maintained and always up to date.
After identifying a device and establishing a baseline of its normal network activities, Enterprise IoT
Security monitors network activity to detect any unusual behavior indicative of an attack or breach. If
suspicious activity is detected, Enterprise IoT Security notifies administrators through security alerts
in the portal. Depending on each administrator’s notification settings, alerts are sent through email
and SMS notifications. Enterprise IoT Security also blocks devices not compliant with the established
security and compliance policy from accessing the network.
The Right Approach to Zero Trust Security for Enterprise IoT Devices | Whitepaper 9
Built-in Prevention
Enterprise IoT Security monitors all connected devices and stops all threats with the industry’s leading
IPS, malware analysis, web, and DNS prevention technology. Seamlessly integrated with Enterprise IoT
Security, our Cloud-Delivered Security Services coordinate intelligence to prevent all network-con-
nected device threats without increasing the workload for your security personnel. To decrease re-
sponse times, connected devices with validated threats can be dynamically isolated upon detection
of threats by our ML-Powered NGFWs. This gives your security team time to form remediation plans
without the risk of further infection from those devices.
3000 Tannery Way © 2022 Palo Alto Networks, Inc. Palo Alto Networks is a registered
Santa Clara, CA 95054 trademark of Palo Alto Networks. A list of our trademarks can be found at
https://www.paloaltonetworks.com/company/trademarks.html. All other
Main: +1.408.753.4000 marks mentioned herein may be trademarks of their respective companies.
Sales: +1.866.320.4788 parent_ds_right-approach-to-zero-trust-for-enterprise-devices_120622
Support: +1.866.898.9087
www.paloaltonetworks.com