Whether smart machines, networked production lines or automated processes: The increasing digitalization of industrial applications is leading to a rapidly growing number of networked IoT devices. However, as the complexity of infrastructures increases, so do the requirements for cyber security: especially in times of NIS-2 and the Cyber Resilience Act (CRA), there is an acute need for action in many sectors. Despite all this, numerous myths surrounding the topic of IoT security persist. So it's time for a realistic assessment - and for a partner who takes a holistic approach to real security.
Myth 1: “We have a Trusted Platform Module - that's why it's safe”
For many years, it was enough to refer to a Trusted Platform Module (TPM), regardless of how it was used, to fulfill the issue of security. However, successful attacks have shown that this is not enough. The perspective has changed here. Security arises transparently from the hardware, which checks the initial code at system startup. The subsequent software components continue this process.
Myth 2: “We can update in 24 hours - everything is safe”
As a common means and as a first measure, it is important to install updates. Techniques such as DevOps and automation make it possible to generate updates quickly. However, it is highly questionable whether these will reach the devices in time, as 1-50% of all IoT solutions are not permanently online and it often takes 1-2 months for the next service technician to visit them. Here it is important to implement concepts such as “layered defense” so that even in the event of a root exploit, for example, no further damage occurs and the device can be restored to a secure state with the next update.


