drj logo
  • This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Young Professional Spotlight
    • Career Spotlight
    • Article Submission
    • Digital Edition
    • DRJ Annual Resource Directories
    • Article Archives
  • EVENTS
    • DRJ Fall 2022
    • Other Industry Events
    • Schedule & Archive
  • WEBINARS
    • Upcoming
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Industry Groups
    • Business Directory
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • FAQs Committee
      • Web Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

IT Experts Call for a Bill of Materials (SBOM) for Device Software in IoT Security Report 2022

by Jon Seals | May 12, 2022 | | 0 comments

Industrial controls, production and the smart home are often ‘insufficiently’ protected against hackers

Düsseldorf/Germany – Shampoo, cookies, canned soup and medicines all have one thing in common: the listing of all ingredients on the package and their traceability back through the manufacturer to the producer of the individual ingredient. Important smart industrial controls, intelligent production plants and devices such as routers, network cameras, printers and many others bring their firmware with operating systems and applications directly along – without a precise proof of the software components contained. Often this means immense risks of infestation by hackers and data thieves in companies using these controls and devices.

As part of the “IoT Security Report 2022” study, 75 percent of the 318 IT industry professionals and executives surveyed in consequence advocate a precise proof of all software components, the so-called “Software Bill of Materials” (SBOM) for all components, including all software contained in an endpoint. “Within the scope of our research over the past few years, virtually all devices connected to a network have contained sometimes more, sometimes less hidden flaws in the firmware and applications, an accurate content statement of software components is therefore extremely important for an organization’s IT to verify and maintain security levels,” says Jan Wendenburg, CEO of ONEKEY (formerly IoT Inspector). The company has developed a fully automated security and compliance analysis for the software of control systems, production equipment and smart devices and makes it available as an easy-to-integrate platform for companies and hardware manufacturers.

Manufacturers neglect security  
As a result, there is not much confidence in the manufacturer-side security of IoT devices: 24 percent of the 318 respondents consider this to be “not sufficient,” with a further 54 percent considering it to be “partially sufficient” at most. Hackers keep an eye on vulnerable devices for some time now – and the trend is rising. 63 percent of IT experts confirm that hackers are already misusing IoT devices as a gateway into networks. In companies in particular, confidence in the security measures around IoT is low: only a quarter of the 318 respondents see complete security guaranteed by their own IT department, while 49 percent see it as only “partially sufficient.” And 37 percent of IT professionals surveyed for the IoT Security Report 2022 have already experienced security-related incidents with endpoints that are no normal PC clients. “The risk is constantly increasing as connected manufacturing continues to expand. In general, the number of networked devices is expected to double in a few years,” says Jan Wendenburg of ONEKEY. In addition to the automatic analysis platform for checking device firmware, the company also operates its own test lab, where the hardware of major manufacturers is tested and vulnerability reports, so-called advisories, are published on a regular basis.

Unclear responsibilities in companies  
Another risk: industrial control systems, production facilities and other smart infrastructure endpoints are often in company use for more than ten years. Without compliance strategies, however, there are usually no update policies in most companies either. In addition, often there is a very unclear situation around responsibilities: among the 318 company representatives surveyed, a wide variety of people and departments are responsible for IoT security. These range from CTO (16 percent) to CIO (21 percent) to Risk & Compliance Manager (22 percent) to IT Purchasing Manager (26 percent). In 21 percent of the companies, external consultants even handle the purchasing of IoT devices and systems. By contrast, only 23 percent perform the simplest security check – an analysis and testing of the included firmware for security vulnerabilities. “This is negligent. An examination of the device software takes a few minutes only, and the result clearly indicates the risks and their classification into risk levels. This process should be part of the mandatory program before and during the use of endpoints – from routers to production machines,” Jan Wendenburg of ONEKEY sums up.

About ONEKEY:  
ONEKEY (formerly IoT Inspector) is the leading European platform for automated security & compliance analysis for devices in industry (IIoT), production (OT) and the Internet of Things (IoT). Using automatically generated “Digital Twins” and “Software Bill of Materials (SBOM)” of the devices, ONEKEY autonomously analyzes firmware for critical security vulnerabilities and compliance violations, completely without source code, device or network access. Vulnerabilities for attacks and security risks are identified in the shortest possible time and can thus be specifically remedied. Easily integrated into software development and procurement processes, the solution enables manufacturers, distributors and users of IoT technology to quickly and automatically check security and compliance before use and 24/7 throughout the product lifecycle. Leading companies, such as SWISSCOM, VERBUND AG and ZYXEL are using this platform today – universities and research institutions can use the ONEKEY platform for study purposes free of charge.

Recent Posts

  • Download Your Planning Templates
  • They Called Me ‘The Queen of Doom’
  • Business Continuity as a Business Strategy
  • AlertMedia Improves Emergency Management with the Launch of Event Pages: Connecting People with Critical Information in Real-Time
  • Disaster Recovery Planning in a VM Operating Environment

Recent Comments

  • carybaron@yahoo.com on Contingency Planning Cycle
  • marifergerson0102 on Contingency Planning Cycle

Archives

  • December 2020 (1)
  • October 2020 (1)
  • August 2020 (1)
  • January 2020 (1)
  • November 2019 (9)
  • October 2019 (8)
  • September 2019 (8)
  • August 2019 (17)
  • July 2019 (77)
  • June 2019 (92)
  • May 2019 (128)
  • April 2019 (109)
  • March 2019 (80)
  • February 2019 (106)
  • January 2019 (102)
  • December 2018 (96)
  • November 2018 (131)
  • October 2018 (139)
  • September 2018 (81)
  • August 2018 (124)
  • July 2018 (113)
  • June 2018 (90)
  • May 2018 (142)
  • April 2018 (151)
  • March 2018 (124)
  • February 2018 (157)
  • January 2018 (140)
  • December 2017 (118)
  • November 2017 (158)
  • October 2017 (186)
  • September 2017 (139)
  • August 2017 (212)
  • July 2017 (179)
  • June 2017 (214)
  • May 2017 (230)
  • April 2017 (223)
  • March 2017 (159)
  • February 2017 (175)
  • January 2017 (112)
  • December 2016 (8)
  • October 2016 (12)
  • June 2016 (15)
  • May 2016 (4)
  • April 2016 (10)
  • January 2016 (10)
  • December 2015 (2)
  • October 2015 (12)
  • September 2015 (2)
  • June 2015 (15)
  • April 2015 (15)
  • March 2015 (6)
  • February 2015 (7)
  • January 2015 (6)
  • December 2014 (18)
  • November 2014 (19)
  • October 2014 (24)
  • September 2014 (11)
  • August 2014 (13)
  • July 2014 (7)
  • June 2014 (36)
  • May 2014 (19)
  • April 2014 (21)
  • March 2014 (90)
  • February 2014 (5)
  • January 2014 (26)
  • December 2013 (10)
  • November 2013 (25)
  • October 2013 (37)
  • September 2013 (27)
  • August 2013 (8)
  • July 2013 (8)
  • June 2013 (31)
  • May 2013 (17)
  • April 2013 (103)
  • March 2013 (82)
  • February 2013 (120)
  • January 2013 (212)
  • December 2012 (128)
  • November 2012 (92)
  • October 2012 (159)
  • September 2012 (112)
  • August 2012 (153)
  • July 2012 (106)
  • June 2012 (91)
  • May 2012 (35)
  • April 2012 (49)
  • March 2012 (14)
  • February 2012 (19)
  • January 2012 (44)
  • December 2011 (9)
  • November 2011 (21)
  • October 2011 (45)
  • September 2011 (13)
  • August 2011 (9)
  • July 2011 (47)
  • May 2011 (46)
  • April 2011 (10)
  • March 2011 (25)
  • February 2011 (1)
  • January 2011 (17)
  • December 2010 (8)
  • October 2010 (19)
  • September 2010 (1)
  • July 2010 (23)
  • June 2010 (1)
  • May 2010 (1)
  • April 2010 (21)
  • March 2010 (1)
  • February 2010 (1)
  • January 2010 (4)
  • December 2009 (20)
  • November 2009 (4)
  • October 2009 (17)
  • September 2009 (11)
  • August 2009 (2)
  • July 2009 (2)
  • June 2009 (79)
  • April 2009 (20)
  • March 2009 (1)
  • January 2009 (22)
  • November 2008 (1)
  • October 2008 (1)
  • July 2008 (4)
  • June 2008 (22)
  • April 2008 (25)
  • February 2008 (1)
  • January 2008 (16)
  • December 2007 (17)
  • November 2007 (662)
  • October 2007 (410)
  • September 2007 (1)
  • November 1999 (1)

ARTICLES & NEWS

  • Business Continuity
  • Disaster Recovery
  • Crisis Management & Communications
  • Risk Management
  • Article Archives
  • Industry News

THE JOURNAL

  • Digital Edition
  • Young Professionals
  • Career Spotlight
  • Advertising & Media Kit
  • Submit an Article

RESOURCES

  • White Papers
  • Rules & Regulations
  • FAQs
  • Glossary of Terms
  • Industry Groups
  • Business & Resource Directory
  • Business Resilience Decoded

EVENTS

  • Fall 2022
  • Spring 2022

WEBINARS

  • Watch Now
  • Upcoming

CONTACT

  • Article Submission
  • Media Kit
  • Contact Us

ABOUT DRJ

Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

LEARN MORE

TWITTER

Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

Follow us for daily updates @drjournal

Newsletter

The Journal, right in your inbox.

Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

Subscribe Now
Copyright 2022 Disater Recovery Journal
  • Terms of Use
  • Privacy Policy