Reader small image

You're reading from  IoT and OT Security Handbook

Product typeBook
Published inMar 2023
PublisherPackt
ISBN-139781804619803
Edition1st Edition
Right arrow
Authors (2):
Smita Jain
Smita Jain
author image
Smita Jain

Business enabler and risk management focused, Smita has a unique and globally-experienced approach to Information Security, Data Privacy, IT, OT-IoT, and Digital Transformation. Her hallmarks include transformative vision casting and strategy setting, operational and organizational excellence, and a risk-based approach to enterprise enablement. Recognized thought leader in the transformation process, re-envisioning and establishing organizational cadence and culture. With an established track record of effectively working across various industries. A cybersecurity consultant, strategist, mentor to organizations about the ever-changing cybersecurity landscape and helping them build a dynamic cybersecurity program.
Read more about Smita Jain

Vasantha Lakshmi
Vasantha Lakshmi
author image
Vasantha Lakshmi

Vasantha Lakshmi works at Microsoft India as a Technology Specialist and as previously a Program Manager. She holds Certified Information System Security Professional (CISSP) certification which aids in aligning with the industry standard of security. She has been working on various security products for the last Seven years. She has more than twelve years of experience working as an architect of end-to-end cybersecurity solutions(device, data, apps, O365, identity etc.) for Microsoft 365. Prosci Certified Change Practitioner certification aids in her journey to digitally transform organisations. She holds many certifications such as M365 Enterprise Administrator Expert, M365 Desktop Administrator Associate, SC-200, SC-300, MS-500.
Read more about Vasantha Lakshmi

View More author details
Right arrow

Preface

This book gives a quick overview of internet of things (IoT) and operational technology (OT) architecture and then dives into securing IoT and OT devices. You will learn about Microsoft Defender for IoT (MDIoT) to secure IoT and OT devices against cyberattacks.

Who this book is for

This book is for CEOs, DEOs, CDOs, CFOs, B-CISOs, operations teams, enablers of the fourth Industrial Revolution (Industry 4.0), Zero-Trust/SASE enablers, heads of IT, digital transformation leaders, OT operations, security operations, and so on.

What this book covers

Chapter 1, Addressing Cybersecurity in the Age of Industry 4.0, covers Industry 4.0, which is the digital transformation that the manufacturing and production industries are going through in the connected world we live in today. However, there are a number of cybersecurity challenges associated with it, and they need immediate attention.

Chapter 2, Delving into Network Segmentation-Based Reference Architecture – The Purdue Model, explains the Purdue model and the industrial network architecture for industrial internet of things (IIoT), IoT, OT, supervisory control and data acquisition (SCADA), integrated computer systems (ICS), and more. OT is the base of the Purdue model.

Chapter 3, Common Attacks on IoT/OT Environments, elaborates on some of the common attack vectors that we see in IoT/OT. We will see how some of these attacks were made due to the weakness in the system.

Chapter 4, What is Microsoft Defender for IoT?, defines MDIoT, its features, and capabilities.

Chapter 5, How Does Microsoft Defender for IoT Fit into Your OT/IoT Environment/Architecture?, discusses multiple architectures and use cases and how we can fit MDIoT in various environments.

Chapter 6, How Do the Microsoft Defender for IoT Features Help in Addressing Open Challenges?, enumerates some of the business challenges of managing and securing IoT devices. Certain challenges are particularly important to address today as they affect not only business but also human life.

Chapter 7, Asset Inventory, builds upon the belief that your assets are of paramount importance, so we will show how increasing visibility into your assets will help reduce risk.

Chapter 8, Continuous Monitoring, helps with the detection of policy violations, industrial malware, anomalies, and operational incidents.

Chapter 9, Vulnerability Management and Threat Monitoring, looks at risk assessment, which forms an integral part of MDIoT. For example, the top vulnerable devices, variation from the baselines, remediation priorities based on the security score, network security risks, illegal traffic by firewall rules, connections to ICS networks, internet connections, access points, industrial malware, indicators, unauthorized assets, weak firewall rules, network operations, protocol problems, backup servers, disconnections, IP networks, protocol data volumes, and attack vectors are some of the topics discussed.

Chapter 10, Zero Trust Architecture and the NIST Cybersecurity Framework, focuses on Zero Trust, a security imperative. IoT devices, especially, are highly attacked, paving the way into the internal network and hence the OT network as well. MDIoT, with a minimal operating system (OS) footprint, can help organizations with rich information on risky OS configurations, strong identity for authentication, and so on to determine anomalies and unauthorized activities. Enterprise IoT is also discussed.

To get the most out of this book

It is best if you work in or know about Industry 4.0 and its cybersecurity challenges, or you are most welcome to learn about it from the book itself.

Software/hardware covered in the book

Operating system requirements

Defender for IoT physical appliance for sensor

NA

Defender for IoT virtual appliance on a virtual machine (VM)

The sensor provided is Linux and can be set up on Hyper-V or VMware VMs

Download the color images

We also provide a PDF file that has color images of the screenshots and diagrams used in this book. You can download it here: https://packt.link/O5D0H

Conventions used

There are a number of text conventions used throughout this book.

Code in text: Indicates code words in text, database table names, folder names, filenames, file extensions, pathnames, dummy URLs, user input, and Twitter handles. Here is an example: “Select eth0 (or eth1 based on your configuration).”

A block of code is set as follows:

#include <Windows.h>
Int main(void) {
MessageBoxA(0, “hi there.”, “info”, 0);
return 0;
}

When we wish to draw your attention to a particular part of a code block, the relevant lines or items are set in bold:

#include <Windows.h>
Int main(void) {
MessageBoxA(0, “hi there.”, “info”, 0);
return 0;
}

Any command-line input or output is written as follows:

$ mkdir css
$ cd css

Bold: Indicates a new term, an important word, or words that you see onscreen. For instance, words in menus or dialog boxes appear in bold. Here is an example: “Go to the Plans and Pricing section situated on the left under the Management header.”

Tips or important notes

Appear like this.

Get in touch

Feedback from our readers is always welcome.

General feedback: If you have questions about any aspect of this book, email us at customercare@packtpub.com and mention the book title in the subject of your message.

Errata: Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you have found a mistake in this book, we would be grateful if you would report this to us. Please visit www.packtpub.com/support/errata and fill in the form.

Piracy: If you come across any illegal copies of our works in any form on the internet, we would be grateful if you would provide us with the location address or website name. Please contact us at copyright@packt.com with a link to the material.

If you are interested in becoming an author: If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, please visit authors.packtpub.com.

Share Your Thoughts

Once you’ve read IoT and OT Security Handbook, we’d love to hear your thoughts! Please click here to go straight to the Amazon review page for this book and share your feedback.

Your review is important to us and the tech community and will help us make sure we’re delivering excellent quality content.

Download a free PDF copy of this book

Thanks for purchasing this book!

Do you like to read on the go but are unable to carry your print books everywhere?

Is your eBook purchase not compatible with the device of your choice?

Don’t worry, now with every Packt book you get a DRM-free PDF version of that book at no cost.

Read anywhere, any place, on any device. Search, copy, and paste code from your favorite technical books directly into your application.

The perks don’t stop there, you can get exclusive access to discounts, newsletters, and great free content in your inbox daily

Follow these simple steps to get the benefits:

  1. Scan the QR code or visit the link below

https://packt.link/free-ebook/9781804619803

  1. Submit your proof of purchase
  2. That’s it! We’ll send your free PDF and other benefits to your email directly
lock icon
The rest of the chapter is locked
You have been reading a chapter from
IoT and OT Security Handbook
Published in: Mar 2023Publisher: PacktISBN-13: 9781804619803
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at €14.99/month. Cancel anytime

Authors (2)

author image
Smita Jain

Business enabler and risk management focused, Smita has a unique and globally-experienced approach to Information Security, Data Privacy, IT, OT-IoT, and Digital Transformation. Her hallmarks include transformative vision casting and strategy setting, operational and organizational excellence, and a risk-based approach to enterprise enablement. Recognized thought leader in the transformation process, re-envisioning and establishing organizational cadence and culture. With an established track record of effectively working across various industries. A cybersecurity consultant, strategist, mentor to organizations about the ever-changing cybersecurity landscape and helping them build a dynamic cybersecurity program.
Read more about Smita Jain

author image
Vasantha Lakshmi

Vasantha Lakshmi works at Microsoft India as a Technology Specialist and as previously a Program Manager. She holds Certified Information System Security Professional (CISSP) certification which aids in aligning with the industry standard of security. She has been working on various security products for the last Seven years. She has more than twelve years of experience working as an architect of end-to-end cybersecurity solutions(device, data, apps, O365, identity etc.) for Microsoft 365. Prosci Certified Change Practitioner certification aids in her journey to digitally transform organisations. She holds many certifications such as M365 Enterprise Administrator Expert, M365 Desktop Administrator Associate, SC-200, SC-300, MS-500.
Read more about Vasantha Lakshmi