Popular IoT messaging protocol lacks encryption and sufficient device authentication security. Credit: Thinkstock The insecure implementation of the MQTT (Message Queue Telemetry Transport) protocol, an Oasis standard for IoT communication, by many IoT product vendors is contributing to the high risk of IoT devices on enterprise and home networks. Although TLS is recommended by the Cloud Security Alliance for secure communication with MQTT, most vendors appear to ignore transport security, making all communication open and available. Further, authentication is often ignored.MQTT defined MQTT is a lightweight protocol that connects a device to a server or other management system when messaging is required. This makes it a good choice for networks where bandwidth use is tightly controlled. However, the MQTT standard does not include encryption. Vendors or businesses must add encryption as part of their solution. In addition, while servers can authenticate devices, no mechanism exists in the Oasis standard to allow devices to authenticate servers.The riskA authentication issue, however, is the failure to implement any available device authentication. An example of the risk was reported by Lucas Lundgren last year. Lundgren claimed he discovered around 60,000 IoT message brokers that allowed access without authentication (McAuley, 2017). With the fast growth of IoT, we can assume that this number has significantly increased. Lundgren demonstrated that he can quickly compromise hospital, prison, and satellite control systems because of insecure configuration of MQTT.Some vendors do provide encryption for their MQTT solutions. Also, third-party vendors provide solutions to which any IoT device can securely attach, making IoT proliferation much safer. The problem is that owners and managers of most businesses, especially small and home businesses, don’t ask the right questions or have the budget for third-party security. Meeting the challengesSo who is responsible for IoT security. Ultimately, it is we security professionals who have to perform the necessary risk assessments and make the necessary controls adjustments. But this is not a long-term solution given the use of IoT across businesses, homes, and organizations of all sizes… including those with no security teams. I agree with the Department of Homeland Security principles (below) in its Strategic Principles for Securing the Internet of Things that it is everyone’s responsibility to meet IoT challenges:1. IoT developers to factor in security when a device, sensor, service, or any component of the IoT is being designed and developed2. IoT manufacturers to improve security for both consumer devices and vendor managed devices3. Service providers, that implement services through IoT devices, to consider the security of the functions offered by those IoT devices, as well as the underlying security of the infrastructure enabling these services4. Industrial and business-level consumers (including the federal government and critical infrastructure owners and operators) to serve as leaders in engaging manufacturers and service providers on the security of IoT devices [in other words demand security]ConclusionIt would be nice to see these principles voluntarily followed, but that is unlikely to happen unless consumers and businesses demand it. Microsoft and Adobe, for example, were largely pushed to more secure practices by consumers and bad public relations related to breaches. I hope it doesn’t take several highly destructive events to get IoT developers, manufacturers, service providers, and users on board with IoT security. Even if it happens in the near future, security professionals must fill the gap with education and analysis whenever IoT is included in a project. Related content opinion MQTT is not evil, just not always secure The MQTT messaging protocol standard used by IoT vendors is not inherenly secure enough. Solutions exist to secure it, but organizations and vendors must assess risk and properly configure IoT and network security. By Tom Olzak Jul 17, 2017 3 mins Internet of Things opinion Anatomy of an insider attack Manage insider attack risks with scenarios and application of common sense. By Tom Olzak Sep 30, 2016 4 mins Business Continuity Security opinion Identity governance and admin: beyond basic access management User behavior analytics give additional power to identity management and compliance. By Tom Olzak Aug 30, 2016 5 mins Investigation and Forensics Compliance Security opinion It's all about critical processes Focus on processes, not hardware and software silos. By Tom Olzak Jul 27, 2016 5 mins Critical Infrastructure Data and Information Security Network Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe