DOD risks 'rogue' apps under current IoT policy
- By Ben Berliner
- Aug 01, 2017
The Department of Defense must address some key security risks in its policies and guidance for Internet of Things devices, according to a new Government Accountability Office report. The report notes that although DOD has identified the many IoT-related security risks and developed policies and threat scenarios, current rules do not adequately address these challenges. The report recommends updates in certain areas to keep DOD information secure from threats posed by IoT devices.
The IoT risks previously identified by DOD are categorized into "operational risks," which come with using and operating a device, and "device risks," which come with the device itself. "Rogue" mobile applications used for malicious purposes and devices that can geotag are considered "operational," while issues such as unpatched software, limited encryption and supply chain threats represent "device" risks.
While DOD has already identified the risks and has provided guidance for many portable connected devices, , the report concludes, "GAO found that these policies and guidance do not clearly address some security risks relating to IoT devices."
For one thing, DOD currently lacks updated policies and guidance for certain IoT devices that it has acquired. Smart televisions and mobile applications, for example, present security risks that still need to be addressed, according to GAO. Additionally, the report observes that current policies and guidance on a host of security issues from cybersecurity, information security to physical security fail to take IoT devices into account. The report also notes there is no single DOD office for IoT security. Rather, the responsibility is shared among different organizations in the department.
In reply comments, acting DOD CIO John Zangardi indicated that an ongoing review of the relevant policies will be finished by the end of the current fiscal year.
Ben Berliner is an editorial fellow at FCW. He is a 2017 graduate of Kenyon College, and has interned at the Center for Responsive Politics and at Sunlight Foundation.
He can be contacted at firstname.lastname@example.org.
Click here for previous articles by Berliner.