CIS Controls IoT Companion Guide
CIS Controls IoT Companion Guide
Acknowledgments .............................................................................................................................................2
Introduction........................................................................................................................................................3
Definition of Internet of Things ..........................................................................................................................3
Methodology ......................................................................................................................................................5
Scope ................................................................................................................................................................5
Terminology.......................................................................................................................................................5
Applicabiliy Overview ........................................................................................................................................6
CIS Controls 1–20 (Version 7): Internet of Things Security ........................................................................ 7-63
Acronyms and Abbreviations...........................................................................................................................64
Links and Resources .......................................................................................................................................66
Closing Notes ..................................................................................................................................................67
This work is licensed under a Creative Commons Attribution-Non Commercial-No Derivatives 4.0 International
Public License (the link can be found at https://creativecommons.org/licenses/by-nc-nd/4.0/legalcode).
To further clarify the Creative Commons license related to the CIS Controls ® content, you are authorized to copy
and redistribute the content as a framework for use by you, within your organization and outside of your
organization for noncommercial purposes only, provided that (i) appropriate credit is given to CIS, and (ii) a link
to the license is provided. Additionally, if you remix, transform, or build upon the CIS Controls, you may not
distribute the modified materials. Users of the CIS Controls framework are also required to refer to
(http://www.cisecurity.org/controls/) when referring to the CIS Controls in order to ensure that users are
employing the most up-to-date guidance. Commercial use of the CIS Controls is subject to the prior approval of
CIS® (Center for Internet Security, Inc.®).
Acknowledgments
CIS® (Center for Internet Security, Inc.®) would like to thank the many security experts who volunteer their time
and talent to support the CIS Controls and other CIS work. CIS products represent the effort of a veritable army
of volunteers from across the industry, generously giving their time and talent in the name of a more secure
online experience for everyone.
Editors:
Contributors:
2
Introduction
The CIS Controls are a prioritized set of actions that collectively form a defense-in-depth
approach and best practices that mitigate the most common attacks against systems and
networks. The CIS Controls are developed by a community of information technology (IT) experts
who apply their first-hand experience as cyber defenders to create these globally accepted
security best practices. The experts who develop the CIS Controls come from a wide range of
sectors, including retail, manufacturing, healthcare, transport, education, government, defense,
and others. While the CIS Controls address the general practices that most organizations should
take to secure their systems, some operational environments may present unique requirements
not addressed by the CIS Controls.
The purpose of the CIS Controls Internet of Things Community is to develop best practices and
guidance for implementing the CIS Controls in association with a variety of devices within the
Internet of Things (IoT). Enterprise use of IoT presents unique and complex challenges for
security professionals. IoT devices are being embedded into the enterprise across the globe and
often cannot be secured via standard enterprise security methods, such as running a monitoring
application on the device, as the devices can’t support these types of applications. Yet for ease of
use, enterprise IoT devices are often connected to the same networks that employees use day in
and day out and are often directly connected to the internet via a variety of network protocols
(e.g., Ethernet, Bluetooth, wireless fidelity [WiFi], cellular).
3
Regardless of which definition an organization chooses to use, there are certain common
features:
The lack of a consistent, agreed-upon definition is actually part of the challenge within the IoT
arena. IoT is a large, complex space and common issues include:
Examples of IoT devices that might be included within an enterprise include smart speakers,
security cameras, door locks, window sensors, thermostats, headsets, watches, power strips, and
more—basically any device that may be integrated into a typical business IT environment.
4
Methodology
A consistent approach is needed for analyzing the CIS Controls in the context of IoT. For each of
the 20 CIS Controls, the following information is provided in this document:
• Applicability – This assesses the degree to which a CIS Control functions or pertains to
IoT.
• Challenges – These are unique issues that make implementing any of the relevant CIS
Controls, or Sub-Controls, for IoT devices difficult.
• Additional Discussion – This is a general area for any guidance that also needs to be
noted. For instance, relevant tools, products, or threat information that could be of use
can be found here.
Scope
The objective of this document is to have broad applicability across sectors. IoT affects all areas
of computing across multiple sectors, such as healthcare, aviation, public safety, and energy.
This has led to sector-specific IoT security guidance, but this document is purposefully sector-
agnostic. As such, this guide focuses on purchasing, deploying, and monitoring commercially
available IoT devices. This document does not provide guidance on how to design, develop, and
manufacture secure IoT devices, such as the secure system development process noted within
NIST Special Publication (SP) 800-160 Revision 1.
Terminology
As noted earlier, there are many definitions of IoT. Below are basic descriptions of IoT
components and terminology that we use throughout this document. Devices are the thing within
IoT and are the primary focus of this guide. Gateways are devices that multiple things connect to
in order to receive instructions, transfer data, etc. Multiple devices are often connected to a single
gateway, or a gateway may solely passively monitor IoT devices. A gateway has an internet
connection, whereas not all IoT devices will, and may only support local wireless protocols such
as RFID, WiFi, Bluetooth, and Zigbee. Gateways are one way to help reduce the attack surface of
legacy IoT devices that cannot be properly secured. Many consumer IoT devices are associated
with complex cloud platforms that can control the behavior of IoT devices and access and store
data.
5
Applicability Overview
More than 60% of CIS Sub-Controls apply
Between 60% and 0% of CIS Sub-Controls apply
0% of CIS Sub-Controls apply
8 Malware Defenses
11 Secure Configuration for Network Devices, such as Firewalls, Routers and Switches
12 Boundary Defense
13 Data Protection
6
CIS Control 1: Inventory and Control of Hardware Assets
Actively manage (inventory, track, and correct) all hardware devices on the network so that only
authorized devices are given access, and unauthorized and unmanaged devices are found and
prevented from gaining access.
IoT Applicability
It is important to track which devices have access to the network and are accessing data and
organizational resources. IoT devices are no different and this Control is considered extremely
important. Traditional MAC (media access control) and IP (internet protocol) addresses can be
used for device identifiers. Unfortunately, not all IoT devices will have these identifiers present
(e.g., MAC address, IP address). For instance, while Zigbee devices support physical layer MAC
address, they use a Zigbee network address in lieu of an IP address. Very simple sensors and
devices used for location tracking may only beacon identifiers for RFID. When using devices that
do not support network-based authentication, network segmentation can be considered as a
possible way to mitigate risk. Additional information on segmentation is available in CIS
Control 12 (Boundary Defense) and CIS Control 15 (Wireless Access Control).
IoT Challenges
Organizations must deploy technology that tracks the myriad of IoT devices that can be deployed
across their enterprise. Understanding which device types and, in some cases, which specific
device instances are authorized to connect to the network is the starting point to adapting this
Control for IoT. For devices without traditional identifiers, physical tags can be placed onto the
devices themselves that integrate with asset management systems. For IoT devices with an
externally accessible physical interface, cellular devices can be inserted into that interface with
cloud-based asset management systems.
Some IoT devices are designed to work in relative isolation and never connect to an enterprise
network. These devices still may be network-connected though, as they can communicate with a
back-end cloud platform that the enterprise neither controls nor manages. Wireless IoT gateways
can also be used to monitor wireless traffic from IoT devices, which can then be relayed to an
asset management system, either in the cloud or physically hosted at the enterprise. Another
challenge can be using digital certificates in IoT devices. Finally, global positioning system (GPS)
can also be an effective way to monitor the location of IoT devices distributed outside the
enterprise.
7
access control-address resolution protocol (MAC-ARP) tables, domain name system (DNS),
active directory (AD), or a variety of IoT-specific tools employed to control and collect data in
these systems for the express purpose of locating the variety of connected assets.
Wireless monitoring may be necessary to identify devices as many IoT devices lack wire-line
physical connections. Many newer IoT devices support integration into IoT management systems
via application programming interfaces (APIs). At the very least, organizations can make a listing
of device MAC address, device type, serial number, and other relevant information. "Smarter" IoT
devices can utilize digital certificates to enhance identity and access management.
Included?
Sub-
Control Title Control Description Justification
Control
8
CIS Control 1: Inventory and Control of Hardware Assets Applicability
Included?
Sub-
Control Title Control Description Justification
Control
9
CIS Control 2: Inventory and Control of Software Assets
Actively manage (inventory, track, and correct) all software on the network so that only authorized
software is installed and can execute, and that all unauthorized and unmanaged software is found
and prevented from installation or execution.
IoT Applicability
Network scanning and agent-based approaches are typical methods for software asset
management. As mentioned in CIS Control 1, network scanning can leave many IoT devices in
an unsafe or unusable state. Agent-based approaches will be ineffectual for IoT devices as there
is a not a common platform for the agent to be built to and installed on. Manual and procedural
methods can be used for asset tracking, such as a spreadsheet.
IoT Challenges
Identifying the versions of software and firmware of IoT devices within the enterprise is a
challenge. It may be possible to leverage central command and control systems, which are aware
of device firmware versions. However, custom and restricted operating systems may limit remote
query capability. In general, IoT device software is not patchable, but is loaded onto the device as
a new complete image. To obtain the listing of software applications on an embedded device, it
may be necessary to work with the device developer/manufacturer. Manual sampling or firmware
extraction via on-board direct maintenance ports (e.g., joint test action group [JTAG]) using
proprietary software and hardware tools may be required.
Tracking versions of Bluetooth and WiFi in devices can be quite difficult and may not be possible
using traditional scanning methods. Applications like Airodump-ng for WiFi devices and hcitool or
ubertooth-scan for Bluetooth devices will provide broadcast advertisements and MAC addresses.
Note that for Bluetooth devices, MAC addresses do not conform to typical conventions and are
oftentimes represented as the device WiFi MAC address incremented by 1 bit. The information
available from WiFi and Bluetooth advertisements will allow enterprises to identify which versions
of wireless protocols are supported.
Whitelisting is generally not available on IoT devices. Whitelisting can occur at the application
layer, or specific libraries or scripts can be whitelisted. A more common capability is for devices to
perform command whitelisting, which only specifies a subset of commands that a device would
accept. This will more likely be available with IoT vendors that engage within a security
engineering process over the lifecycle of the product.
10
CIS Control 2: Inventory and Control of Software Assets Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Utilize software inventory tools Not all IoT devices will be able to
Utilize Software throughout the organization to automate integrate or be inventoried by an
2.3
Inventory Tools the documentation of all software on automated tool, but those that have this
business systems. capability should use it.
11
CIS Control 2: Inventory and Control of Software Assets Applicability
Included?
Sub-
Control Title Control Description Justification
Control
The software inventory system should The lack of information available for
Integrate Software be tied into the hardware asset software and hardware assets will likely
2.5 and Hardware inventory so all devices and associated prevent the combination of these two
Asset Inventories software are tracked from a single inventories from being particularly
location. helpful.
Address Ensure that unauthorized software is Enterprises are often unable to control
2.6 Unapproved either removed or the inventory is the software that is running on an IoT
Software updated in a timely manner. device..
12
CIS Control 3: Continuous Vulnerability Management
Continuously acquire, assess, and take action on new information in order to identify
vulnerabilities, remediate, and minimize the window of opportunity for attackers.
IoT Applicability
Vulnerability monitoring and management are applicable to IoT devices, but it is a much more
difficult challenge in this context than with traditional systems or even mobile devices. Just as with
other devices on a network, regularly scheduled vulnerability assessments should be conducted
to determine non-secure configurations that lead to elevated threats to the enterprise. These
security holes should be remediated quickly, and the processes used for remediation should be
fed back into the organization's best practices for secure IoT device deployment.
IoT Challenges
Active vulnerability assessments of IoT devices in an operational environment may be dangerous,
as they can lead to system instability or failure. Ideally, how the device will behave when scanned
will be known before it is scanned. As an alternative, passive vulnerability assessment can be
one way to get the vulnerabilities identified without the risk of harming the operational
environment. These assessments can be done manually or with automated tools sold by a third-
party vendor. Although many IoT devices will be deployed internally, and not directly exposed to
the internet, it may be a worthwhile exercise to routinely scan your organization using tools like
Shodan or Censys. These tools can detect externally exposed devices and help administrators
either remove or properly configure them.
A laboratory test environment may be appropriate for regularly scheduled assessments against
new threats and new IoT software configurations. Collaborative threat laboratories (e.g.,
sponsored by an Information Sharing & Analysis Center [ISAC] or other industry body) and IoT
vendor laboratories may be the best venues for implementing this Control. As with other
hardware and software vulnerabilities, these new vulnerabilities should also be evaluated against
the organization’s risk appetite to determine when a particular device or device class can no
longer be supported on the network, or when it must be isolated in some fashion.
13
CIS Control 3: Continuous Vulnerability Management Applicability
Included?
Sub-
Control Title Control Description Justification
Control
14
CIS Control 3: Continuous Vulnerability Management Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Regularly compare the results from Enterprises using IoT devices will benefit
Compare Back-to-
consecutive vulnerability scans to verify from checking current IoT vulnerabilities
3.6 Back Vulnerability
that vulnerabilities have been within a network against historical data
Scans
remediated in a timely manner. and vulnerability trends.
15
CIS Control 4: Controlled Use of Administrative Privileges
The processes and tools used to track/control/prevent/correct the use, assignment, and
configuration of administrative privileges on computers, networks, and applications.
IoT Applicability
Very few IoT devices include administrative accounts for management of the system. In some
situations, especially with enterprise or consumer-grade IoT devices, control or pseudo-
administrative access can be obtained through management applications on mobile devices.
IoT Challenges
Ensure that when evaluating IoT components for use in the enterprise, you investigate the
controls associated with administrative accounts, to include the type of authentication supported –
which will most likely be passwords – and the strength of the authentication implementation. For
administrator accounts, attempt to ensure that, at a minimum, strong password requirements are
used, and account access is audited. In addition, when feasible, attach the IoT component to a
directory, allowing for the use of domain administrator accounts when needed. This will allow for
the ability to more easily restrict the use of administrative privileges.
Administrators should be extremely careful when first working with a completely unmanaged
device.
Attackers may attempt to obtain administrator rights via operating system (OS) or firmware level
vulnerabilities so they can hide themselves from the user. This entire CIS Control is difficult to
enforce on a rooted device that has its security architecture broken. Although this may provide a
user with root access, they often have default administrator credentials that do not frequently
change. Furthermore, if an administrator is able to change their password, it is recommended
they comply with the password requirements set forth by National Institute of Standards and
Technology (NIST) SP 800-63-3. This means that memorized secrets (i.e., passwords) chosen by
a subscriber (i.e., human) should be at least 8 characters long. To the extent practical in IoT,
multifactor authentication (MFA) should always be used.
16
CIS Control 4: Controlled Use of Administrative Privileges Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Use Multi-Factor
Use multi-factor authentication and Two-factor authentication (2FA) is not
Authentication for
4.5 encrypted channels for all generally available when managing or
All Administrative
administrative account access. using an IoT device.
Access
17
CIS Control 4: Controlled Use of Administrative Privileges Applicability
Included?
Sub-
Control Title Control Description Justification
Control
18
CIS Control 5: Secure Configuration for Hardware and Software
on Mobile Devices, Laptops, Workstations and Servers
Establish, implement, and actively manage (track/report on/correct) the security configuration of
mobile devices, laptops, servers, and workstations using a rigorous configuration management
and change control process in order to prevent attackers from exploiting vulnerable services and
settings.
IoT Applicability
A majority of the time, resource constrained IoT devices lack the configuration and customization
options provided by laptops or even mobile devices. Yet some devices can still be hardened in a
limited fashion. This is true even of embedded IoT devices. A common example is changing
default passwords. End users should familiarize themselves with the developer's or
manufacturer's documentation for a device and also take advantage of other available resources
(e.g., academic papers, conference proceedings) to understand what configuration options are
available and whether a device can be sufficiently configured to meet your needs.
IoT Challenges
A device or application's configuration may drift over time, even if efforts are made to properly
configure the device before or during deployment. This could be due to software updates, factory
resets, or potentially even software errors. Some IoT device configurations, especially for
consumer or typical enterprise use, are solely available within a corresponding mobile application.
Users will need to first connect the device to the application before configuration is an option.
Although this can make device configuration, monitoring, and maintenance easier, it also
expands the overall attack surface of the device as now the mobile device (and mobile
application) must also remain secure. Undocumented APIs and backdoors may offer original
equipment manufacturers (OEMs) and potentially malicious parties access to the device, and
subsequently consumer or enterprise information. For instance, many IoT devices run a web
server with network troubleshooting tools installed (e.g., ping, nslookup) that can be used to
profile any internal or external network to which the IoT device is connected.
A subset of IoT devices support real-time operating systems (RTOSs) that allow for some amount
of persistent storage. Oftentimes, this persistence comes in the form of startup scripts that can be
modified to affect the configuration of the device at boot time. It is worthwhile to take the time to
research if these configurations are written in a secure manner. When IoT devices support
access control via user or administrator accounts and passwords, default accounts and
passwords should be changed, and sound password update and strength guidelines promoted. If
available, MFA should be used to protect administrator accounts.
19
CIS Control 5: Secure Configuration for Hardware
and Software on Mobile Devices, Laptops, Workstations Applicability
and Servers
Included?
Sub-
Control Title Control Description Justification
Control
20
CIS Control 6: Maintenance, Monitoring and Analysis of Audit
Logs
Collect, manage, and analyze audit logs of events that could help detect, understand, or recover
from an attack.
IoT Applicability
Logs on IoT devices can take a variety of formats, and there are no uniform standards for how to
store and transfer data. Each OEM is free to create their own format, making integrations from
multiple vendors within the same network difficult. Furthermore, devices may not be configured to
log events; they may store logs locally on the device; or they may be sending them off to a local
gateway or cloud platform. Organizations should ensure that IoT devices create detailed logs and
many IoT devices have this capability. Additionally, a trusted method of extracting and parsing
audit logs from relevant components should be available. However, this may prove challenging in
some instances where OS and application logs are not enabled or available. To the degree
possible, the default stance should always be to attempt to collect these logs.
IoT Challenges
Having logs from IoT devices is one measure of success but means little to an organization’s
cybersecurity posture if they are not being reviewed on a regular basis. Another challenging area
related to IoT security is how to integrate large security data from large quantities of components
into an enterprise’s Security Information and Event Management (SIEM) system. The creation of
custom connectors should be investigated when IoT components do not provide standards-based
log output. Just as important is a focus on how to make sense of the IoT log data when combined
with standard network data captured by the SIEM. The establishment of rules that correlate this
diverse data effectively will be an interesting challenge moving forward. Cloud-based analysis
may be a potential solution to these challenges.
Additionally, many developers are worried about logging too often to flash memory, which can
potentially lead to excessive wear on the flash memory modules. This is an open problem, and
developers must attempt to strike their own balance based on customer need.
21
CIS Control 6: Maintenance, Monitoring
Applicability
and Analysis of Audit Logs
Included?
Sub-
Control Title Control Description Justification
Control
22
CIS Control 6: Maintenance, Monitoring
Applicability
and Analysis of Audit Logs
Included?
Sub-
Control Title Control Description Justification
Control
23
CIS Control 7: Email and Web Browser Protections
Minimize the attack surface and the opportunities for attackers to manipulate human behavior
through their interaction with web browsers and email systems.
IoT Applicability
IoT devices generally do not use email or external web browser applications or interfaces,
although some stand-alone IoT management systems may leverage standard web browser
technologies for visualization and a common user experience. The majority of IoT devices will use
email and browsers in a "headless" fashion.
IoT Challenges
Some devices will run a web server in order to support Representational State Transfer (RESTful)
web services. It is uncommon to be able to apply hardening guidance (e.g., CIS Benchmarks) to
these devices.
Sub-
Control Title Control Description Justification
Control
Disable
Unnecessary or Uninstall or disable any unauthorized
Email client and browser plugins
7.2 Unauthorized browser or email client plugins or add-
generally do not exist for IoT devices.
Browser or Email on applications.
Client Plugins
Limit Use of
Scripting Ensure that only authorized scripting
Obtaining this level of granularity is often
7.3 Languages in languages are able to run in all web
not possible.
Web Browsers browsers and email clients.
and Email Clients
24
CIS Control 7: Email and Web Browser Protections Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Subscribe to URL-categorization
services to ensure that they are up to
Subscribe to URL- In order for this mitigation to be put into
date with the most recent website
7.5 Categorization place, it would have to be done at the
category definitions available.
Service network level.
Uncategorized sites shall be blocked by
default.
Use Domain Name System (DNS) In order for this mitigation to be put into
Use of DNS
7.7 filtering services to help block access to place, it would have to be done at the
Filtering Services
known malicious domains. network level.
Use sandboxing to analyze and block Email is typically used as an egress data
Sandbox All Email
7.10 inbound email attachments with transfer method and receiving email
Attachments
malicious behavior. attachments may not be possible.
25
CIS Control 8: Malware Defenses
Control the installation, spread, and execution of malicious code at multiple points in the
enterprise, while optimizing the use of automation to enable rapid updating of defense, data
gathering, and corrective action.
IoT Applicability
Malware most certainly affects IoT devices, as seen with recent, high-profile attacks utilizing
distributed denial of service (DDoS) and explored in greater detail in the paper DDoS in the IoT:
Mirai and Other Botnets. Both malware and exploits are now tailored to affect IoT devices and
platforms, which highlights the need for a robust strategy to defend against malware and
malicious code.
IoT Challenges
Given the limited processing ability and limited power capacity of many IoT components, host-
based malware protections may consume too many cycles and too much energy, necessitating
alternative protections. Using commercial, network-based malware detection systems (e.g., in-
line monitoring) may not be feasible due to latency requirements or the use of non-IP protocols,
but this is changing. IoT-specific network monitoring devices are beginning to be available for
both enterprises and consumers. Continuous monitoring at corporate or other gateways through
which IoT device information (updates and/or data) flows may be used to detect adversary
malware or to correlate observed activity with known, legitimate, and/or planned activity.
A primary attack vector for malware against an IoT device is through maintenance action of a new
IoT device software load (also known as the software or firmware update process). Supply chain
risk management can help to address these risk factors. Additionally, periodic validation of IoT
device operation via alternative information channels (e.g., analog records, operational anomaly
detection through long-term analytics) may be possible but will require collection and long-term
storage of what is normally perishable data.
In certain industries where availability is the overriding concern (e.g., healthcare, energy), IoT
devices may be uniquely vulnerable to DDoS. Anti-malware tools and techniques should be
properly regression-tested to ensure that availability and reliability of the system will not be
adversely affected. Additionally, all anti-malware tools should be configured such that a false
positive detection will not negatively impact the availability or reliability of any critical processes.
Testing may need to occur whenever a change is made to the anti-malware software such as a
configuration change, software hotfix, or repository update. It is important to understand the
attack patterns used to affect IoT devices in your industry.
Another product category that can assist in defense against the threat of malware is threat
intelligence focused on IoT devices. These services review Tactics, Techniques, and Procedures
(TTPs) and provide a risk rating or threat score to analysts based on behavior and other factors.
26
Finally, whitelisting of software can provide malware protection by preventing malicious code from
executing in the first place.
Included?
Sub-
Control Title Control Description Justification
Control
27
CIS Control 8: Malware Defenses Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Enable Enable command-line audit logging for Interacting with the device via a
8.8 Command-Line command shells, such as Microsoft® command line interface is often not
Audit Logging PowerShell and Bash. supported for IoT.
28
CIS Control 9: Limitation and Control of Network Ports,
Protocols and Services
Manage (track/control/correct) the ongoing operational use of ports, protocols, and services on
networked devices in order to minimize windows of vulnerability available to attackers.
IoT Applicability
Most IoT devices communicate via specific ports and protocols just as other IT assets, though
some embedded devices and sensors are not fully network aware. Defining allowable ports,
protocols, and services that may be used by IoT devices must be performed and then enforced.
However, IoT devices may implement other communication protocols that do not ride over the
corporate network. As an example, IoT devices that implement Bluetooth could be used as a
jumping-off point for an attacker, and, once exploited, allow the attacker to move to a nearby
target that does not have Bluetooth locked down. It is important to fully understand the protocols
employed by each IoT device, which of those protocols are allowed within an enterprise, and then
design an overarching security strategy that mitigates the risk associated with these
implementations.
IoT Challenges
IoT network traffic is highly predictable and repetitious, in comparison with commodity enterprise
traffic. Commercial and/or industrial IoT traffic generally leverages a private network or specific
and unchanging ports, protocols, and services on a corporate network. IoT devices may be tested
to assess their susceptibility to messaging that does not conform to expectations; related risks
may be mitigated through application of this Control.
Vendors may require internet access to IoT devices or subsystems to support and verify licensing
or maintenance agreements, or to perform maintenance or support; such access should be
monitored and limited. Another challenge of securing IoT is related to employees, customers, or
others bringing consumer IoT devices into the enterprise. Research has shown that employees
often associate IoT software on their corporate assets (laptops or phones) with their personal IoT
devices (e.g., fitness trackers), or bring their personal IoT devices directly into the network (e.g.,
smart speaker or digital assistant). This opens up command and control channels between the
device’s installed software or hardware and internet sites used for data collection or
management. Organizations should monitor for personal IoT-related traffic and take actions to
deny that traffic when necessary.
29
CIS Control 9: Limitation and Control of Network Ports,
Applicability
Protocols and Services
Included?
Sub-
Control Title Control Description Justification
Control
30
CIS Control 10: Data Recovery Capabilities
The processes and tools used to properly back up critical information with a proven methodology
for timely recovery of it.
IoT Applicability
Many IoT devices may provide onboard storage for data and logs, though some IoT devices do
not. Devices that store data may transfer it to dedicated network storage locations for near-term
or permanent storage. This can be done periodically or in near real-time. When taking an
inventory of the types of IoT devices to be used within an enterprise, it is important to understand
whether data is at risk of being lost at any given point in the architecture and to devise a plan for
ensuring that data can be recovered in case of component failure.
IoT Challenges
Backing up IoT data can be very difficult as traditional backup strategies simply will not work. For
instance, even simple utilities such as rsync will not be available and are therefore not a valid
option. However, native backup capabilities may be present, and those should be understood
before purchase and be implemented accordingly. Native capabilities may automatically back up
to the cloud or a phone, and enterprises should understand this before implementation.
Organizations should verify and review backup settings from the device manufacturer, including
any associated service within the IoT ecosystem, to make sure the proper information is backed
up and that improper information is not backed up. Proper authentication mechanisms should be
in place to protect any enterprise cloud backup. IoT devices may also unintentionally back up
information to any desktop environment they are connected to, including gateways or mobile
devices. The creation of these backups should be prevented unless specifically authorized by the
enterprise.
31
CIS Control 10: Data Recovery Capabilities Applicability
Included?
Sub-
Control Title Control Description Justification
Control
32
CIS Control 11: Secure Configuration for Network Devices, such
as Firewalls, Routers and Switches
Establish, implement, and actively manage (track/report on/correct) the security configuration of
network infrastructure devices using a rigorous configuration management and change control
process in order to prevent attackers from exploiting vulnerable services and settings.
IoT Applicability
This Control is not directly applicable to IoT devices but is relevant for the security of certain types
of IoT gateways (e.g., small office, home office [SoHo] routers used as IoT gateways) as well as
for the secure usage of general network devices. There is guidance on WiFi security, but it
applies to all computing devices and not necessarily IoT. When there is a plan to do a medium- to
large-scale deployment of IoT devices within an enterprise, take the opportunity to review the
configurations for firewalls, routers, and switches to ensure that additional vulnerabilities are not
introduced through misconfiguration. Additionally, take care to revisit the guidance provided within
CIS Control 9 (Limitation and Control of Network Ports, Protocols and Services).
IoT Challenges
Legacy IoT systems may favor proprietary byte-oriented protocols, but legacy systems that
migrate to TCP/IP (e.g., Modbus TCP) are often fragile and insecure. The absence of
commercially available network devices for legacy networks limits the value of this Control for
those networks.
33
CIS Control 11: Secure Configuration for Network Devices,
Applicability
such as Firewalls, Routers and Switches
Included?
Sub-
Control Title Control Description Justification
Control
Maintain Standard
Maintain documented security See the Applicability statement above.
Security
11.1 configuration standards for all authorized This Control is not directly applicable to
Configurations for
network devices. IoT.
Network Devices
Use Automated
Compare all network device
Tools to Verify
configurations against approved security See the Applicability statement above.
Standard Device
11.3 configurations defined for each network This Control is not directly applicable to
Configurations
device in use, and alert when any IoT.
and Detect
deviations are discovered.
Changes
34
CIS Control 11: Secure Configuration for Network
Applicability
Devices, such as Firewalls, Routers and Switches
Included?
Sub-
Control Title Control Description Justification
Control
Manage Network
Devices Using
Manage all network devices using multi- See the Applicability statement above.
Multi-Factor
11.5 factor authentication and encrypted This Control is not directly applicable to
Authentication
sessions. IoT.
and Encrypted
Sessions
35
CIS Control 12: Boundary Defense
Detect/prevent/correct the flow of information transferring across networks of different trust levels
with a focus on security-damaging data.
IoT Applicability
This is a particularly important control for IoT devices, and strategies for traditional boundary
defense apply. Defenses and mitigations, such as network monitoring tools, email security,
intrusion detection system (IDS) and intrusion prevention system (IPS) alerts, logging of events
and alerts and virtual private network (VPN) concatenators, are all important and should be
utilized to the extent possible. These can be implemented in segmented networks where IoT
devices are utilized and routed instead of through the trusted enterprise network. Controlling the
flow of information within a network is important.
IoT Challenges
IoT devices are increasingly being used in stand-alone scenarios or connected to cloud-based
platforms. Full infrastructures dedicated to IoT may be needed that support capture, processing,
and analysis of data from IoT endpoints in the cloud. In addition, IoT devices may share and
collate information from many different organizations. For cloud-based systems that support IoT,
consider cloud security best practices, and move to a data-centric security approach to support
the sharing of IoT data across many different organizations. The CIS Controls™ Cloud
Companion Guide offers additional guidance for securing cloud environments.
As discussed in other Controls within this guide, the use of segregation strategies is
recommended to keep IoT components operating in their own zones or on their own separate
networks. In cases where there must be a connection point between an IoT segment and the
corporate network, boundary defense mechanisms must be put in place. Firewalls, IDS, and IPS
can provide assurance that a compromise of the less-trusted IoT network will have limited effect
on the more secure corporate network.
36
CIS Control 12: Boundary Defense Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Maintain an
Maintain an up-to-date inventory of all Network boundaries with insecure,
Inventory of
12.1 of the organization's network legacy, or untrusted devices should be
Network
boundaries. inventoried and monitored.
Boundaries
Scan for
Perform regular scans from outside
Unauthorized IoT devices may be making connections
each trusted network boundary to
Connections to networks not approved by the
12.2 detect any unauthorized connections
Across Trusted enterprise. This could be due to
which are accessible across the
Network malware, misconfiguration, or by design.
boundary.
Boundaries
Configure
Configure monitoring systems to record Although this Sub-Control is quite useful,
Monitoring
network packets passing through the this is generally not an IoT-specific
12.5 Systems to
boundary at each of the organization's configuration, although some developer
Record Network
network boundaries. options may support this.
Packets
37
CIS Control 12: Boundary Defense Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Deploy NetFlow
Enable the collection of NetFlow and
Collection on This is a useful Sub-Control yet there is
12.8 logging data on all network boundary
Networking nothing specific to IoT within its scope.
devices.
Boundary Devices
Require All Require all remote login access to the VPN applications and their back-end
Remote Logins to organization's network to encrypt data components can integrate with external
12.11
Use Multi-Factor in transit and use multi-factor authentication services and identity
Authentication authentication. providers.
38
CIS Control 13: Data Protection
The processes and tools used to prevent data exfiltration, mitigate the effects of exfiltrated data,
and ensure the privacy and integrity of sensitive information.
IoT Applicability
Protecting the security of data being stored, transmitted, and manipulated on IoT devices can be
critical depending on use case or sector. Certain industries may not contain any sensitive data in
the traditional sense. In other instances, certain IoT devices will be dedicated to environments
that have an informal set of standards and norms, or their usage may be directly regulated (e.g.,
Payment Card Industry Data Security Standard [PCI DSS], Health Insurance Portability and
Accountability Act [HIPAA], General Data Protection Regulation [GDPR]). The level of data
protection needed is often specific to the use case at hand, depending on factors such as data
sensitivity and likelihood of exposure.
Some IoT devices will process and transmit complex enterprise or customer information in
modern formats, whereas other devices will read and transmit physical attributes such as
temperature or pressure. This latter information is sometimes not deemed to be especially
sensitive or proprietary on its own, though it may become more sensitive when coupled with other
data points, such as location. In some cases, these “simple” IoT use cases can be absent of any
particular protections in the way it is collected, transferred, stored, and analyzed.
IoT Challenges
Detecting and preventing the flow of data out of IoT devices is a difficult task, as is preventing
unauthorized disclosure. IoT devices will often have a diverse supply chain, utilizing numerous
hardware manufacturers alongside cloud services. This makes data protection that much more
difficult. If possible, data-in-transit security, through protocols such as IPsec or Transport Layer
Security (TLS), must be implemented to guard against eavesdropping on data flowing between
IoT and other enterprise components. This is difficult as most IoT devices will ship with a set of
security protocols that are supported, and this may never change over the lifetime of the device.
Protections must also be implemented for the data stored on any cloud platform or the device
itself, including integrated memory or removable storage media. This is another area typically
outside of enterprise control and may need to be screened for pre-purchase if it is a necessary
enterprise security control, as does any IoT device's ability to manage cryptographic keys.
Traditional enterprise data loss protection (DLP) systems can be helpful for email and network
stored data. It is important to perform methodical threat modeling for every new IoT system being
39
implemented. Consider the value of, and the threats to, data when determining whether
encryption should be applied to protect that data. In some instances, the need to support near
real-time communications outweighs the need to apply an encryption layer to the data. The output
of a threat analysis will provide the foundation for an effective data protection strategy.
Included?
Sub-
Control Title Control Description Justification
Control
Monitor and
Monitor all traffic leaving the This can be extremely difficult for IoT,
Detect Any
13.5 organization and detect any especially if the network is not “IoT
Unauthorized Use
unauthorized use of encryption. aware.”
of Encryption
40
CIS Control 13: Data Protection Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Manage System's
External Configure systems not to write data to
Removable external removable media, if there is no
13.8 In most cases this cannot be managed.
Media's business need for supporting such
Read/Write devices.
Configurations
41
CIS Control 14: Controlled Access Based on the Need to Know
The processes and tools used to track/control/prevent/correct secure access to critical assets
(e.g., information, resources, systems) according to the formal determination of which persons,
computers, and applications have a need and right to access these critical assets based on an
approved classification.
IoT Applicability
Authentication to IoT devices is sometimes not a built-in capability. This can cause significant
problems for controlling access to enterprise data stored on IoT devices. Access control
mechanisms should be in place for all entities accessing any IoT device, alongside any
associated cloud service, web application, or mobile application. Sub-Controls relating to private
VLANs may not be applicable, as are those relating to sensitive information or data.
IoT Challenges
Legacy IoT systems often lack automated access control functionality. If this is the case,
organizations should still consider developing policies around secure usage of IoT devices,
especially regarding which networks legacy IoT devices can access. Manual or physical security
solutions that are consistent with an assessed risk profile can also be created. Similarly,
determinations for enterprise data access should be made for all users, applications (including
mobile applications), IoT devices, and any requisite management infrastructure. Plans should be
in place to permanently remove or render device data inaccessible for all devices outside the
physical perimeter of the enterprise.
Although traditional network security mitigations apply, holistic approaches to IoT security may
need to include cellular security if a cellular modem is present. CIS provides the CIS Controls™
Mobile Companion Guide to assist with deploying mobile devices in the enterprise. Cellular
networks are not always properly encrypted and authenticated, and, as the security of these
networks is difficult to independently validate, enterprises can elect to use devices that can
establish an authenticated and encrypted session back to the cloud service or enterprise.
Although 3G universal mobile telecommunications system (UMTS) networks perform mutual
authentication, the improvements made within 4G long-term evolution (LTE) systems are
worthwhile to ensure that device and network properly authenticate each other. Enterprises
should not count on 2G global system for mobile communication (GSM) networks for device
authentication or encryption.
42
CIS Control 14: Controlled Access Based on the
Applicability
Need to Know
Included?
Sub-
Control Title Control Description Justification
Control
43
CIS Control 14: Controlled Access Based on the
Applicability
Need to Know
Included?
Sub-
Control Title Control Description Justification
Control
44
CIS Control 15: Wireless Access Control
The processes and tools used to track/control/prevent/correct the secure use of wireless local
area networks (WLANs), access points, and wireless client systems.
IoT Applicability
Many IoT devices will make use of a variety of wireless communication protocols, although some
rely on wired mediums, such as Ethernet, for functions like building automation controls and other
use cases. Devices may use the global and ubiquitous highway addressable remote transducer
(HART) protocol, while others use proprietary solutions with built-in access control.
Geographically distributed systems may use elements of cellular stacks. WiFi is a very common
communication protocol for IoT devices, and controls can be implemented within the device and
at the network level. Vulnerabilities may exist within the protocols being used or within the
firmware used to connect and maintain a network connection.
IoT Challenges
Disabling wireless network interfaces can be a challenge as it is not normally a user-customizable
option in off-the-shelf IoT devices. If there is a concern around the usage of wireless, it may be
possible to perform radio frequency (RF) environment characterization and continuous RF
monitoring to see if any pertinent interfaces are in use. IoT devices in the enterprise may
implement several protocols, such as Zigbee, Z-Wave and Bluetooth Low Energy (BLE). To the
extent possible, security engineers should ensure that only needed protocols are allowed within
the organization. Regardless, proper network segmentation will be an ongoing challenge for IoT
devices used within an enterprise.
45
CIS Control 15: Wireless Access Control Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Disable Wireless
Disable wireless access on devices that IoT devices will likely rely upon some
Access on
15.4 do not have a business purpose for form of wireless as their primary
Devices if Not
wireless access. communication mechanism.
Required
46
CIS Control 15: Wireless Access Control Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Leverage the
This is an important capability that is not
Advanced
Leverage the Advanced Encryption always available for IoT. Enterprises will
Encryption
15.7 Standard (AES) to encrypt wireless data need to verify this before purchase, but
Standard (AES) to
in transit. this is possible to determine with online
Encrypt Wireless
research.
Data
47
CIS Control 16: Account Monitoring and Control
Actively manage the lifecycle of system and application accounts — their creation, use,
dormancy, deletion — in order to minimize opportunities for attackers to leverage them.
IoT Applicability
The need exists to manage accounts on IoT devices and associated platforms throughout their
lifecycle. IoT devices will have a series of accounts already created and in use when the device is
purchased and shipped. Account management is also applicable to mobile applications, IoT
management platforms, and cloud platforms. Additionally, enterprises and potentially individual
users may also create new accounts. All of these accounts need to be actively managed.
IoT Challenges
It can be challenging to manage accounts on a single system with different user accounts
developed by different vendors. Realistically, it may not be possible to manage all accounts on a
device from all of the companies involved in development. Still, though all accounts may not be
properly documented upon receipt of a device, creating as thorough an inventory of these
accounts as possible is important. It is difficult to identify all root accounts that a developer may
use, and it may be preferable to use devices that can disable all accounts that the organization
has not explicitly approved.
Legacy IoT systems with stand-alone consolidating or command and control hosts should
leverage system tools, augmenting them with manual recording and audit processes as required,
to enable this Control. Cloud-based applications supported by the enterprise should be monitored
and have their credentials disabled during employee separation. Enterprise applications should
be analyzed and reviewed for proper authentication techniques. Special attention should be paid
to areas where integration occurs between third-party services and when identities are federated.
Logging should be enabled within back-end management services to monitor activity, with the
logs regularly reviewed.
48
CIS Control 16: Account Monitoring and Control Applicability
Included?
Sub-
Control Title Control Description Justification
Control
16.4 Encrypt or Hash Encrypt or hash with a salt all This is typically a feature that will need to
All Authentication authentication credentials when stored. be built-in to the device and verified by
Credentials the enterprise before purchase.
16.5 Encrypt Ensure that all account usernames and This feature will need to be built into the
Transmittal of authentication credentials are device beforehand, but IoT devices
Username and transmitted across networks using should be cryptographically protecting
Authentication encrypted channels. authentication data using modern
Credentials means.
16.6 Maintain an Maintain an inventory of all accounts This is an important Sub-Control but will
Inventory of organized by authentication system. need to be accomplished via technical
Accounts and procedural means. To accomplish it,
enterprises must be aware of all the
cloud platforms and user accounts
associated with an IoT device.
49
CIS Control 16: Account Monitoring and Control Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Disable Any Disable any account that cannot be Just as with traditional systems,
16.8 Unassociated associated with a business process or accounts that are not linked to an
Accounts business owner. approved user should be disabled.
Ensure All Ensure that all accounts have an To the extent possible on IoT devices
16.10 Accounts Have An expiration date that is monitored and and within applications, accounts should
Expiration Date enforced. not be created to be used in perpetuity.
Monitor Attempts
Attempts to access disabled or
to Access Monitor attempts to access deactivated
16.12 deactivated accounts should be logged
Deactivated accounts through audit logging.
to the extent possible.
Accounts
Alert on Account Alert when users deviate from normal When abnormal behavior for an account
16.13 Login Behavior login behavior, such as time-of-day, occurs, the necessary parties are
Deviation workstation location, and duration. properly notified.
50
CIS Control 17: Implement a Security Awareness and Training
Program
For all functional roles in the organization (prioritizing those mission-critical to the business and its
security), identify the specific knowledge, skills, and abilities needed to support defense of the
enterprise; develop and execute an integrated plan to assess, identify gaps, and remediate
through policy, organizational planning, training, and awareness programs.
IoT Applicability
Administrators and any potential employees interacting with IoT devices should be trained on
risks and threats specific to IoT platforms. The deployment of IoT components brings with it new
operational capabilities as well as new system and security management requirements. Security
awareness training should be tailored to all employees regularly using these devices.
IoT Challenges
Ensuring that administrators and employees understand the threats IoT devices pose to their
networks can be a challenging task. Special notice should be taken regarding the connection of
insecure legacy devices to enterprise networks handling sensitive enterprise information.
Consumer IoT devices are often cheaply available and becoming ubiquitous in daily living, and
employees will likely bring unapproved devices into the office to use. This could include
connecting enterprise systems to these devices, or connecting the IoT devices directly to the
network. Employees need to understand the security policies surrounding these actions.
Additionally, IoT introduces new concepts that include a heavy focus on RF communications, with
a range of purpose-built protocols. Security engineering teams must understand the intricate
details of these protocols to be able to configure devices in a secure manner. In many cases, IoT
subsystems must also be integrated into the larger enterprise through cloud-based APIs. This
requires that security engineering teams be well versed in the cloud-based technologies that
support IoT.
51
CIS Control 17: Implement a Security Awareness and
Applicability
Training Program
Included?
Sub-
Control Title Control Description Justification
Control
Deliver training to address the skills gap Once a gap analysis has been
Deliver Training to
17.2 identified to positively impact workforce performed, specific training should be
Fill the Skills Gap
members' security behavior. provided to those users.
52
CIS Control 17: Implement a Security Awareness and
Applicability
Training Program
Included?
Sub-
Control Title Control Description Justification
Control
Train Workforce
Train workforce members to be able to Employees can be trained on what
Members on
identify the most common indicators of successful attacks on IoT devices look
17.9 Identifying and
an incident and be able to report such like and to whom they should be
Reporting
an incident. reported.
Incidents
53
CIS Control 18: Application Software Security
Manage the security lifecycle of all in-house developed and acquired software in order to prevent,
detect, and correct security weaknesses.
IoT Applicability
This CIS Control can be applied in a few distinct ways as application software security can apply
to 1) creating IoT devices; 2) deploying cloud-based applications that IoT devices utilize; 3)
writing mobile or other applications that govern the usage of an IoT device; and 4) creating an
application that integrates with a device in some way, such as leveraging an API. Note that this
guide is not focused on the development and manufacturing of IoT devices and instead guides
enterprises on their usage of IoT.
IoT Challenges
Most enterprises will not be provided with the source code used to run and operate IoT devices
on their networks. This also includes the associated mobile applications and cloud platforms. In
many instances, those responsible for application security for IoT devices would have to perform
analysis on compiled binaries pulled from the devices, which can be an arduous and time-
consuming task. Mobile applications may be more easily acquired, but again the analysis would
not be directly on the source, which limits the benefit somewhat. But this can still be a valuable
effort. For instance, privileged credentials for accessing an IoT device have been found inside of
its corresponding mobile application. Or, in another instance, credentials can be shared between
distinct devices from the same manufacturer.
Software being developed by enterprises to connect to IoT components should follow the same
secure development standards that the organization is already using for other internally
developed applications. The IoT Security Testing Guide from the Open Web Application Security
Project (OWASP) can be a useful resource for IoT device software security.
54
CIS Control 18: Application Software Security Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Use only Use only standardized, currently As with any device, only standardized
Standardized and accepted, and extensively reviewed cryptographic algorithms with sufficient
Extensively encryption algorithms. key sizes should be utilized. Specialized
18.5
Reviewed lightweight crypto is available and
Encryption undergoing standardization for resource
Algorithms constrained use cases.
55
CIS Control 18: Application Software Security Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Apply Static and Apply static and dynamic analysis tools Many companies offer these types of
Dynamic Code to verify that secure coding practices services for IoT applications. There is no
Analysis Tools are being adhered to for internally single tool that will operate with 100%
18.7
developed software. efficiency and correctness, necessitating
a toolbox approach of various tools good
at performing different types of analysis.
56
CIS Control 18: Application Software Security Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Use Standard For applications that rely on a database, Enterprises generally have little say in
Hardening use standard hardening configuration the methodologies and standards used
18.11 Configuration templates. All systems that are part of to harden IoT devices. The device
Templates for critical business processes should also manufacturer can provide such
Databases be tested. information before procurement.
57
CIS Control 19: Incident Response and Management
Protect the organization's information, as well as its reputation, by developing and implementing
an incident response infrastructure (e.g., plans, defined roles, training, communications,
management oversight) for quickly discovering an attack and then effectively containing the
damage, eradicating the attacker's presence, and restoring the integrity of the network and
systems.
IoT Applicability
Traditional incident response guidance applies and can be tailored to IoT. This includes the need
for planning, defining roles and responsibilities, and having an escalation path. Like with
traditional computer systems, the need to identify, investigate, respond, and recover from
incidents involving IoT devices is important.
IoT Challenges
Just as security professionals establish incident response plans to react to the compromise of a
traditional IT asset, response plans should be tailored to address the course of action to take
when one or more IoT components are compromised. This should include taking into account the
need to perform forensics on the compromised component as well as the need to quickly ensure
that the device is taken offline to limit the spread of the incident. It should be noted that IoT
forensics requires specialized knowledge and can be difficult to perform. When considering data
forensics for IoT devices, there are a wealth of different types of data available to support the
objective of the acquisition, be it eDiscovery, misuse, or evidence collection to support a criminal
case.
58
CIS Control 19: Incident Response and Management Applicability
Included?
Sub-
Control Title Control Description Justification
Control
Assign job titles and duties for handling Especially if an enterprise is supporting
Assign Job Titles computer and network incidents to an in-house application that integrates
19.2 and Duties for specific individuals, and ensure tracking with an IoT device that is critical to
Incident Response and documentation throughout the business operations, personnel should
incident through resolution. be dedicated to IoT incident response.
Designate
Designate management personnel, as
Management Management and backup personnel
well as backups, who will support the
19.3 Personnel to should be specifically appointed for IoT
incident handling process by acting in
Support Incident incident response.
key decision-making roles.
Handling
Publish
Publish information for all workforce
Information
members, regarding reporting computer Information regarding IoT breaches and
Regarding
anomalies and incidents, to the incident other incidents should be made available
19.6 Reporting
handling team. Such information should to internal employees. This information
Computer
be included in routine employee can be fed back into awareness training.
Anomalies and
awareness activities.
Incidents
59
CIS Control 19: Incident Response and Management Applicability
Included?
Sub-
Control Title Control Description Justification
Control
60
CIS Control 20: Penetration Tests and Red Team Exercises
Test the overall strength of an organization's defense (the technology, the processes, and the
people) by simulating the objectives and actions of an attacker.
IoT Applicability
Using traditional penetration testing exercises, such as scanning to identify what ports are open
and what services are running to find vulnerable or exploitable versions doesn’t apply. Legacy
devices may need to be omitted from these activities, especially if they are supporting an
important business function. IoT typically expands the threat model facing an organization in
unique ways that sometimes cannot be easily rectified or mitigated.
IoT Challenges
Many IoT systems do not have mature IP stacks (or any IP stacks) to scan. Errors in scanning
may severely impact business operations. All such tests and scans should be tested thoroughly in
a non-operational testbed (including code review or architecture review), preferably under
simulated practical load-in operations. Strict rules of engagement must be applied that preclude
any possibility of unintended, unexpected, or unwanted operational impact. A good example is a
realistic, offline, threat-driven scenario. The usage of automated penetration (pen) testing tools
with offline configurations can give a hint as to how the real environment will perform.
Penetration testers and red team members should pay extra care in securing authorization to
perform vulnerability assessment and pen testing activities on cloud-based services supporting
IoT devices and any mobile devices with an application supporting an IoT device. Specific user or
service-level approval may be necessary, more so than what is typically provided by the
enterprise.
61
CIS Control 20: Penetration Tests and Red Team
Applicability
Exercises
Included?
Sub-
Control Title Control Description Justification
Control
Perform periodic Red Team exercises Red team exercises focused on IoT will
Perform Periodic
to test organizational readiness to include any relevant IoT devices,
20.3 Red Team
identify and stop attacks or to respond applications, cloud services, and
Exercises
quickly and effectively. gateways.
62
CIS Control 20: Penetration Tests and Red Team
Applicability
Exercises
Included?
Sub-
Control Title Control Description Justification
Control
63
Acronyms and Abbreviations
64
LTE Long-Term Evolution
M2M Machine-to-Machine
MAC Media Access Control (address)
MFA Multifactor Authentication
MTD Mobile Threat Defense
NFC Near Field Communication
NIST National Institute of Standards and Technology
OEM Original Equipment Manufacturer
OS Operating System
OWASP Open Web Application Security Project
P2P Peer-to-Peer
PCI Payment Card Industry
REST(ful) Representational State Transfer
RF Radio Frequency
RFID Radio Frequency Identifier
RSU Roadside Unit
RTOS Real-Time Operating System
SD Secure Digital
SIEM Security Information and Event Management
SP Special Publication
SSID Service Set Identifier
SYN Synchronization
TCP Transmission Control Protocol
TLS Transport Layer Security
TTP Tactics, Techniques, and Procedures
UMTS Universal Mobile Telecommunications System
USB Universal Serial Bus
VPN Vritual Private Network
WAF Web Application Firewall
WAN Wide Area Network
WiFi Wireless Fidelity
WPA2-PSK WiFi Protected Access 2 Pre-Shared Key
65
Links and Resources
Attify IoT Penetration Testing Guide
https://www.iotpentestingguide.com
CIS Controls™
https://www.cisecurity.org/controls/
CVSS
https://www.first.org/cvss/
ICS Cert
https://ics-cert.us-cert.gov/
ICS ISAC
http://ics-isac.org/blog/
66
Closing Notes
In this document, we provide guidance on how to apply the security best practices found in CIS
Controls Version 7 to IoT environments. The newest version of the CIS Controls and other
complementary documents may be found at www.cisecurity.org.
As a nonprofit organization driven by its volunteers, we are always in the process of looking for
new topics and assistance in creating cybersecurity guidance. If you are interested in
volunteering and/or have questions, comments, or have identified ways to improve this guide,
please write us at: [email protected].
All references to tools or other products in this document are provided for informational purposes
only, and do not represent the endorsement by CIS of any particular company, product, or
technology.
Contact Information
CIS
31 Tech Valley Drive
East Greenbush, N.Y. 12061
518.266.3460
[email protected]
67