Website Maintenance Announcement – September 19–21
Activities begin at 6:00 PM CT on Friday, September 19 and continue through Sunday, September 21.
During this time, Product functionality will be unavailable
Website Maintenance Announcement – September 19–21
Activities begin at 6:00 PM CT on Friday, September 19 and continue through Sunday, September 21.
During this time, Product functionality will be unavailable
In the dynamic world of the Internet of Things (IoT), where interconnected devices and systems are the driving force behind innovation and efficiency, the importance of maintaining a secure and reliable infrastructure cannot be overstated. As federal agencies increasingly adopt IoT technologies, the need for a network that delivers robust connectivity and top-tier security becomes critical.
RUCKUS Networks stands out as a powerful solution, providing capabilities that promote uninterrupted communication, efficient power usage, and strong defense against potential cyber threats. By utilizing a secure and reliable network infrastructure, federal agencies can fully exploit the benefits of their IoT deployments, creating a connected ecosystem that thrives on stability, performance, and uncompromising security.
IoT devices integrated into federal networks are typically designed with functionality that aligns with mission-critical objectives, which demand reliability and resilience. That's why it's crucial to clearly define the various types of IoT deployments within federal networks. This helps with tailoring security measures, meeting regulatory compliance, optimizing resource allocation, and managing risks while enhancing operational efficiency in a complex and dynamic network environment.
IoT Type | Network Segment and Technology |
---|---|
Commercial Internet of Things |
LAN (Ethernet): Audio Visual Systems, Security Systems, Lighting systems |
Industrial Internet of Things (IIoT) |
LAN (Ethernet): Building Management Systems (BMS), HVAC Control, Programmable Logic Controllers (PLCs), Industrial Robots, Energy Monitoring Systems, Inventory Management Systems, Warehouse Automation Devices, Video Surveillance Systems, Access Control Systems, Air/Fire/Gas Detection Systems. |
Infrastructure Internet of Things |
LAN (Ethernet): Building Management Systems (BMS), HVAC Control, Security Systems, In-Building Wireless (IBW) sensors, motion detectors, Lighting systems |
Internet of Military Things (IoMT) |
LPWAN (LoRaWAN, LTE-M, NB-IoT): Sensors and Biometrics, Munitions, Armor, and Weapons |
Although strategically incorporating these devices can allow federal agencies to reap the benefits of increased connectivity and automation, the secure network infrastructure still plays a pivotal role in this process. The robustness and integrity of the network supporting these devices are essential for maintaining a resilient and secure IoT ecosystem within the federal sector. In the next section, we explore the key aspects outlined in government guidance.
NIST Special Publication 800-213A serves as a catalog of IoT device cybersecurity capabilities and non-technical supporting capabilities. It offers guidance on considering system security from the device perspective, allowing for the identification of device cybersecurity requirements—the abilities and actions an agency will expect from an IoT device and its manufacturer and/or third parties.
The special publication caters to the needs of federal agencies looking to deploy IoT devices within their systems. The IoT Cybersecurity Act of 2020 mandates NIST to provide guidance for federal agencies on “the appropriate use and management by agencies of [IoT] devices” connected to information systems. SP 800-213A includes mappings to SP 800-53 and NIST Cybersecurity Framework controls for traceability to RMF guidance, and an IoT cybersecurity profile based on the RMF low-impact baseline control set in SP 800-53B. While the act does not specify any penalties for non-compliance, the law empowers the CIO to prohibit the head of any agency from “procuring or obtaining, renewing a contract to procure or obtain, or using an [IoT] device” if they find through a mandatory review process that the use of the device prevents compliance with NIST standards and guidelines. Securing the network can play a crucial role in enhancing the security of IoT devices, which aligns with the principles of the IoT Cybersecurity Act of 2020.
Many IoT devices can inherently possess insecurities. These known exploits and vulnerabilities can expose users to potential risks by threatening the privacy of sensitive information and providing opportunities for malicious actors to exploit and compromise the integrity of connected systems.
Here is a list of the most common vulnerabilities that lead to IoT device exploitation:
In the upcoming segments of this blog series, we will delve into the advantages of utilizing managed switches—with a special focus on ICX® switches—over their unmanaged counterparts, and understand their role in a risk mitigation strategy. Additionally, we will discuss the convergence of wireless technologies, as the integration of Wi-Fi® and IoT technologies has proven to streamline network management and cut down procurement costs. Lastly, we will explore the advancements in Wi-Fi 6, Wi-Fi 6E, and Wi-Fi 7, as each can be tailored to cater to specific IoT deployment scenarios—from Target Wake Time (TWT) in Wi-Fi 6 to Multi-Link Operation (MLO) and Punctured Transmission in Wi-Fi 7.
Whether your priority lies in network efficiency, security, or adopting the latest wireless standards, this blog aims to provide valuable insights into constructing robust and efficient IoT networks.
Access Part 2, which demonstrates how RUCKUS® solutions—particularly ICX® switches- address the challenges of a vulnerable network. Then, read on to our final chapter, Part 3, regarding flexible wireless connectivity solutions, which address diverse needs.
©2024 CommScope, LLC. All rights reserved. CommScope and the CommScope logo are registered trademarks of CommScope and/or its affiliates in the U.S. and other countries. For additional trademark information see https://www.commscope.com/trademarks. Wi-Fi, Wi-Fi 6, Wi-Fi 6E and Wi-Fi 7 are trademarks of the Wi-Fi Alliance. All product names, trademarks and registered trademarks are property of their respective owners.
Sign up for exclusive insights from RUCKUS Networks.