BUILT-IN VS BOLTED-ON SECURITY
According
to a recent white paper by the British semiconductor technology company ARM, 1
trillion Internet of Things (IoT) devices will be built between 2017 and 2035 (Marshall,
2017). Examples of IoT devices are: connected appliances, smart home security
devices, wearable health monitors, fitness trackers, biometric scanners, and
ultra-high speed wireless internet (Thomas, 2022). Vijendra Katiyar,
director-Enterprise Business in India stated that, “As the IT infrastructure evolves
and becomes more complex, security needs to be built in, not bolted on later,”
(Nandikotkur & Ross, 2019).
Server
vendors tend to fall into two different security categories. Providers tend to “bolt
on” security measures after manufacturing the hardware. Partners build security
into their products and processes from start to finish, (CIO, 2018). Cyber-resilience
and cybersecurity are quite different in the fact that cyber-resilience
requires built-in features at every stage of the server design and production
process. Whereas cybersecurity is bolted on after the product is already complete,
as sort of an afterthought (CIO, 2018).
Many
times organizations focus mostly on operating system and application security
concerns and not on the hardware side of security (CIO, 2018). In order for a
system to be the most secure both software and hardware security must be
applied. Bolted on, or software security can come in many forms such as: encryption
and antivirus software, VPNs, among others. Built in, or hardware security can
come in forms of: immutable silicon root of trust, BIOS security, and physical
security (CIO, 2018).
Although
bolted on security is often more costly, and should be planned and purchased at
the manufacturing\hardware vendor level in the form of secure processors, it
can also be updated later as firmware, and can even be implemented single-sign-on,
or other “plug-in” features, and additional physical hardware security. I
believe this is why bolted on security is most often used; it is easier to
apply afterwards, and is usually the cheaper method to help secure computer systems.
References
Built in or bolted on? CIO.
(2018, April 24). Retrieved March 29, 2022, from
https://www.cio.com/article/228796/built-in-or-bolted-on.html
MarshallCEO, P. (2017,
November 22). Why cyber security must be built in, not bolted on. Automation
World. Retrieved March 29, 2022, from
https://www.automationworld.com/factory/iiot/blog/13318082/why-cybersecurity-must-be-built-in-not-bolted-on
Nandikotkur, G., & Ross,
R. (2019, June 11). Why security needs to be built in, not bolted on. Bank
Information Security. Retrieved March 29, 2022, from
https://www.bankinfosecurity.asia/security-needs-to-be-built-in-bolted-on-a-12586
Thomas, M. (2022, February
18). 27 top internet of things examples you should know. Built In. Retrieved
March 29, 2022, from https://builtin.com/internet-things/iot-examples
Comments
Post a Comment