Learning Library

← Back to Library

Shrinking the IoT Attack Surface

Key Points

  • The Internet of Things turns everyday objects—lights, thermostats, cars, cameras—into computers, dramatically expanding the overall attack surface.
  • As codebases grow (e.g., Linux with ~28 M lines, Windows with ~50 M, modern cars >100 M), complexity and the number of software bugs rise, creating more vulnerabilities.
  • A larger “bullseye” attack surface makes it easier for attackers to succeed, so reducing that surface to a tiny target is essential for security.
  • Hacked IoT devices can jeopardize privacy, safety (e.g., medical implants), cause denial‑of‑service failures, and even be weaponized to attack other systems.
  • Mitigating these risks involves practical steps to shrink attack surfaces at home and in the workplace, such as securing devices, limiting exposure, and applying regular updates.

Full Transcript

# Shrinking the IoT Attack Surface **Source:** [https://www.youtube.com/watch?v=7zWVxrjjIpE](https://www.youtube.com/watch?v=7zWVxrjjIpE) **Duration:** 00:13:52 ## Summary - The Internet of Things turns everyday objects—lights, thermostats, cars, cameras—into computers, dramatically expanding the overall attack surface. - As codebases grow (e.g., Linux with ~28 M lines, Windows with ~50 M, modern cars >100 M), complexity and the number of software bugs rise, creating more vulnerabilities. - A larger “bullseye” attack surface makes it easier for attackers to succeed, so reducing that surface to a tiny target is essential for security. - Hacked IoT devices can jeopardize privacy, safety (e.g., medical implants), cause denial‑of‑service failures, and even be weaponized to attack other systems. - Mitigating these risks involves practical steps to shrink attack surfaces at home and in the workplace, such as securing devices, limiting exposure, and applying regular updates. ## Sections - [00:00:00](https://www.youtube.com/watch?v=7zWVxrjjIpE&t=0s) **IoT Expands Attack Surface** - The speaker explains that turning everyday items into IoT computers adds millions of lines of code, increasing complexity, bugs, and vulnerabilities, thereby dramatically enlarging the overall attack surface. ## Full Transcript
0:00here's the problem statement with iot 0:03the Internet of Things everything 0:06becomes a computer 0:08basically a light bulb is a computer 0:10that lights up your home a thermostat is 0:13a computer that controls the temperature 0:15a car is a computer that takes you 0:18places a security camera is a computer 0:20that records activities everything 0:23becomes a computer great where's the 0:26problem well we know from security that 0:29every computer can in fact be hacked so 0:34if everything becomes a computer with 0:36iot and every computer can be hacked 0:38what does that mean 0:40it means this 0:42everything can be hacked that's the 0:44world we're moving to so let's take a 0:46look at an example of what I mean by 0:47this take the Linux operating system 0:50last time I checked it's got about 27 28 0:54million lines of code that make up the 0:56operating system Windows 0:58even more about 50 million how about the 1:03fact that we have cars today with 1:05software in them that have over a 1:07hundred million lines of code in them 1:09now what does all of that mean think of 1:12this as your attack surface and what 1:14happens with those things well in fact 1:16as the number of lines of code goes up 1:19then so does complexity 1:22and so do the number of bugs that are in 1:26the software just because there's more 1:28software and if at the same rate you're 1:30going to end up with more bugs 1:31ultimately that means we have more 1:34vulnerabilities as all of these things 1:35increase 1:36complexity is the enemy of security so 1:39that means the more complex the system 1:41gets the more insecure it gets as well 1:43so what can we do about this attack 1:46surface think of the attack surface a 1:48little bit differently if we've got a 1:49bullseye over here if you've got a huge 1:51Bullseye then it's going to be easier 1:53for the bad guy to hit it when he's 1:55trying to attack you however if we can 1:58shrink that Bullseye down to a minuscule 2:01dot then it's going to be much harder 2:04for the bad guy to do what he wants to 2:05do and you can see it's going to be hard 2:08to shrink some of these attack surfaces 2:10but we are going to look at some things 2:12that you can do for instance what are 2:14the risks why do you even care about 2:16this well there's the issue of privacy 2:18if someone breaks into these devices 2:20maybe they are recording you and seeing 2:22you or tracking your activities there's 2:25the issue of safety some of these may 2:27even be implantable medical devices 2:29imagine a defibrillator or an 2:31implantable insulin pump one day those 2:34things could then be hacked and all 2:35kinds of havoc could occur from that 2:39or a denial of service attack a denial 2:42of service could be where someone has 2:44attacked your device and now your device 2:46won't respond to you that's one example 2:49here another example is where your 2:51device because it's a computer remember 2:53is being used to attack other people's 2:56devices and now you are unwittingly part 2:59of the denial of service on other people 3:01well what can you do to shrink this 3:03attack surface and lessen these kinds of 3:06risks happening to you we're going to 3:08take a look at five things you can do in 3:10your home and five things you can do in 3:12your office and organization to reduce 3:14the risk of iot security okay now what 3:18can we do in order to avoid those risks 3:21well I'm going to give you five things 3:22first of all for your home iot devices 3:25we're going to take a look first at 3:27credentials 3:29creds basically you've got credentials 3:32that are a user ID password 3:36those are the typical ones and you've 3:38got those for your iot devices as well 3:41as for your home network and the iot 3:43devices exist on that Network so you'll 3:45want to secure both of those 3:47the iot device for instance in this case 3:50it's a camera but there's probably an 3:52administrator interface that goes into 3:55this so that this person can log in that 3:57person probably being you if you're the 3:59local iot support guy in your home so 4:03that you can log in and change 4:04configurations and things like that 4:07change that stuff don't go with the 4:10default don't go with the default user 4:12ID if you can change it definitely don't 4:14go with you the default password 4:15definitely change that and the same 4:18thing is true when it comes to your home 4:19router and the network there so there 4:22will be also an administrator interface 4:25here change the default user ID and 4:28password to the extent that you're able 4:29to and also the Wi-Fi network itself 4:33most of these things of iot are working 4:36over a Wi-Fi network we want to change 4:39from the default SSID that the network 4:42broadcasts we want to make sure we have 4:44a strong password on the network work 4:47itself maybe even make it not 4:50discoverable although sometimes that 4:51runs into problems with the individual 4:53devices but make sure that the network 4:55as well is secure now I said change 4:58these passwords I'm going to say 5:00remember this rule about passwords 5:03length 5:04is strength small passwords are almost 5:08always worse than longer passwords so 5:10try to make your password as long as the 5:12system will make it and since you can't 5:14remember it because you don't want to 5:16set them all to the same thing store 5:17them in a password Vault so that way you 5:20can put all of these passwords into the 5:22Vault and then you unlock the Vault with 5:24one password that you know and better 5:27yet use multi-factor authentication that 5:30is something you are and something you 5:32have as well so maybe a biometric in 5:34order to open the safe and then this 5:37part will be much more secure 5:39okay what's next the network itself I 5:42talked about some of the things you can 5:43do to secure the network but how about 5:45the configuration the overall 5:47architecture of your home network so 5:49this is what it normally looks like 5:51you've got a bunch of users here and 5:53they're inside your home they're you 5:55know using their laptops and stuff like 5:56that their devices in order to 5:59ultimately probably access the internet 6:01get out to the rest of the world and so 6:04here's our home router again but what 6:06I'm going to suggest to you is to carve 6:08out a special Network segment for iot 6:12this a lot of these routers support 6:14what's known as a guest Network or a DMZ 6:17area however the terminology is on that 6:20particular system what you want to do is 6:22carve out this separate Network and put 6:25all of your iot devices in that Network 6:27the idea being that if there's a 6:30vulnerability that happens down here it 6:33won't have direct access to all of these 6:35things and it will still be protected 6:38because it's behind the firewalling 6:40capabilities the network address 6:41translation and things like that that 6:43your router implements so create the iot 6:46special Network and maybe you let your 6:49guests in on that as well but that that 6:51will give you a little better separation 6:53okay what else patching 6:58all of these devices have tons of 7:00software in them and what we want to do 7:02is make sure that the software or the 7:05firmware whichever the the terminology 7:08is on it that that stuff is absolutely 7:10up to date as up-to-date as it can 7:13possibly be and the best way to do that 7:15is to set it up to automatically update 7:18rather than do this manually if you're 7:21doing it manually the chances are you're 7:24not going to remember to do it 7:25frequently enough and you're going to 7:27fall behind and why does that matter 7:28because the security vulnerabilities 7:32will exist in your software for a longer 7:34period of time whenever new versions of 7:36software and firmware come out almost 7:38always there are security patches in 7:40there and you want to get those as 7:42quickly as you can again reducing your 7:45attack surface 7:46what else well another idea in security 7:50is the principle of least privilege the 7:52principle of least privilege says I want 7:54to turn off everything that I possibly 7:56can and Harden My systems that's one 7:58aspect of principle of least privilege I 8:01want to effectively disable any 8:03unnecessary functions again this is 8:06hardening I also want to make sure that 8:08only the right resources have access and 8:12are turned on 8:13so to give an example of this let's say 8:15we've got our refrigerator here and it's 8:18an iot refrigerator so it does all the 8:20great bells and whistles here is a user 8:24and the question is does that user 8:26really need remote access into the 8:29fridge 8:30I don't know if you think they do then 8:33go ahead and Grant that but understand 8:34that you've also created some risk 8:37you've created more attack surface if 8:39you're not getting enough value out of 8:41the features that you're getting from 8:43doing that I would say turn that off 8:45another example is is this fridge 8:48connected say to the cloud so that you 8:51can create your shopping lists and 8:52access them elsewhere there might be 8:54some features that you really want to 8:56use just understand with every single 8:58one of these connections you need to 9:00make a conscious decision about risk and 9:03if that risk is in fact worth it in many 9:06cases what we may also be doing by 9:08connecting these things is creating a 9:11greater risk for us in terms of privacy 9:13as well so some of these are back doors 9:15that an attacker could come into and 9:17take control of the device and once they 9:19do they could violate our privacy they 9:22can make the device stop working they 9:24could do all sorts of other things they 9:26could use your refrigerator in order to 9:28attack other people believe it or not 9:31even without your knowledge and so 9:34finally the maybe the best thing that 9:36you can do if you don't need it turn it 9:39off I mean literally not just disable 9:41the feature but if your security camera 9:44is in uh in your home then when you're 9:48in the home you probably don't need it 9:51to be on probably this is a better 9:53setting literally turn the camera off 9:56maybe even unplug it if you're extra 9:58security conscious paranoid so that way 10:01it cannot be spying on you it can't be 10:04being used by a bad guy to do bad stuff 10:06so what I'm saying is be very conscious 10:09and intentional about the features that 10:12you have and the way you've laid things 10:13out so that the stuff that is on is 10:16actually serving your needs and it's not 10:18just on because it was on by default and 10:21that's the way the manufacturer shipped 10:22the device okay now we've talked about 10:24what you need to do to secure the iot 10:27devices in your home 10:29how about in the office some people will 10:32bring home devices into the office also 10:35we have people working from home in a 10:37home office so it's effectively like all 10:39of those iot devices are part of the 10:41corporate Network as well what can we do 10:44in those cases to secure the office well 10:46it begins with policy 10:50I need to have some sort of description 10:52that says this is what's allowed this is 10:55not what's allowed these are the kinds 10:57of things that we are going to implement 10:59and enforce from a security standpoint 11:01and by the way just saying don't ever 11:04bring these devices in that's a fine 11:06statement to make it doesn't mean it's 11:08actually going to happen because a lot 11:10of times people will do what they're 11:11going to do anyway so the policy needs 11:14to be useful in this case not just 11:16something that you write on paper the 11:18next thing would be to train our users 11:21help them understand what they're doing 11:23that help security and the things that 11:25they do that hurt security help them 11:27understand what are the risks in an iot 11:29device because to them it just looks 11:31like something hey it looks harmless I 11:33plug it in and it works but they don't 11:35realize that it may be exfiltrating data 11:37out of their Network that it might be 11:40implanting a virus in their device that 11:43it could be used for spying it could be 11:45used for all kinds of things so make 11:47sure people understand they're going to 11:49be more likely to follow a policy that 11:50they understand than a policy that just 11:53sounds like a bunch of edicts that are 11:54passed down from on an eye 11:56next thing enable 11:59enable the security 12:01I talked about all of these kinds of 12:03controls that we can put in place in 12:05order to make a system more secure an 12:07iot system less risky for us that's what 12:11we want to do we want to enable all 12:13those things even in the office 12:15environment and again start from the 12:17home and then expand out from there 12:20and then we want to discover 12:24again you could say I'm not going to 12:26allow this but that doesn't mean it 12:28doesn't exist I need an ability to 12:30discover all of these things and find 12:33out when someone has brought an iot 12:35device into our Network when something 12:37in a home network has connected in that 12:39we didn't expect it to do the good news 12:41is there are tools and there are 12:43services that will do this kind of 12:44automatic Discovery for you that way you 12:47can be alerted when you have now created 12:49a case that your attack surface has just 12:52increased and then finally we need to 12:55enforce 12:57enforce 12:59the policy that we just came up with 13:01put into practice the training that 13:03we've given you also put into practice 13:07the security controls have those 13:08implemented have them happen 13:10automatically as much as possible 13:12automatically discover new devices and 13:15then ultimately have a way to enforce 13:17all of that and do it seamlessly this is 13:20what we're about what we're trying to do 13:22is decrease the attack surface from a 13:25big attack surface to a much smaller one 13:27and iot is pulling us in the opposite 13:29direction if we don't get control of it 13:31and if we don't get control our devices 13:33aren't serving us they're serving 13:35someone else so you want to make sure 13:37your devices serve you keep your stuff 13:40safe and secure 13:43thanks for watching if you found this 13:45video interesting and would like to 13:46learn more about cyber security please 13:48remember to hit like And subscribe to 13:49this channel