DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports
Events Video Library
Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
View Events Video Library
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks

Integrating PostgreSQL Databases with ANF: Join this workshop to learn how to create a PostgreSQL server using Instaclustr’s managed service

Mobile Database Essentials: Assess data needs, storage requirements, and more when leveraging databases for cloud and edge applications.

Monitoring and Observability for LLMs: Datadog and Google Cloud discuss how to achieve optimal AI model performance.

Automated Testing: The latest on architecture, TDD, and the benefits of AI and low-code tools.

Related

  • Information Security: AI Security Within the IoT Industry
  • Application Integration for IoT Devices: A Detailed Guide To Unifying Your Ecosystem
  • Is Your Internet of Things Fully Online?
  • AI in Edge Computing: Implementing Algorithms to Enhance Real-Time

Trending

  • API Design
  • Unleashing the Power of Microservices With Spring Cloud
  • Top 7 Best Practices DevSecOps Team Must Implement in the CI/CD Process
  • How To Verify Database Connection From a Spring Boot Application
  1. DZone
  2. Data Engineering
  3. Big Data
  4. Virtual Patches for IoT: Now More than Ever

Virtual Patches for IoT: Now More than Ever

Mark O'Neill user avatar by
Mark O'Neill
·
May. 01, 14 · Interview
Like (0)
Save
Tweet
Share
2.66K Views

Join the DZone community and get the full member experience.

Join For Free

When Gunnar Peterson and I wrote about the security considerations for Internet of Things, one of the key items was patching ("Vulnerabilities will be found in IOT systems, but how will they be patched? IOT systems require management systems for patching and versioning"). The problem is that Internet of Things devices are often difficult to update. There isn’t an equivalent of a “Patch Tuesday” for a wristband, or a Wi-Fi-enabled smart meter. Many devices do not have an auto-update mechanism, or may be constrained by bandwidth or processing power. Rather than patching the device itself, patches will often have to be applied upstream as “virtual patches”. A Gateway is the ideal point to apply these virtual patches.

Heartbleed made this device all the more important. This week, in an article entitled "It’s Crazy What Can Be Hacked Thanks to Heartbleed", Robert McMillan covers the work of Nicholas Weaver at UC Berkeley. Weaver has been investigating the vulnerability of devices such as programmable thermostats, home routers, and (ironically) home firewalls to Heartbleed. The problem is that many of these devices are difficult to patch.

He writes "The bad news is that many of the devices that can be hacked can only be updated manually", and "In other words, the Internet of Things needs a patch".

Virtual patches are the key here. They allow patches to be applied upstream from the Internet-of-Things device itself, applying a "wrapper" layer. Virtual patches are also something I also discussed in BBC articles in the context of vulnerabilities in power station control systems and in protecting Windows XP systems now that patches are no longer provided by Microsoft.

By enabling virtual patches to be applied, security gateways are an important piece of a mitigation strategy for vulnerabilities such as Heartbleed. They are the upstream point at which you can apply security mitigation, when devices themselves may be difficult or impossible to patch. This is why at Axway, we provide gateways for Web Services and API traffic, gateways for B2B and file-transfer, and Gateways for email and file sharing. Heartbleed will not be the last vulnerability to impact the Internet of Things in this way, but by applying a virtual patching strategy at the Gateway layer, security mitigation is possible.

IoT Patch (computing)

Published at DZone with permission of Mark O'Neill, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Related

  • Information Security: AI Security Within the IoT Industry
  • Application Integration for IoT Devices: A Detailed Guide To Unifying Your Ecosystem
  • Is Your Internet of Things Fully Online?
  • AI in Edge Computing: Implementing Algorithms to Enhance Real-Time

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 3343 Perimeter Hill Drive
  • Suite 100
  • Nashville, TN 37211
  • support@dzone.com

Let's be friends: