Provide logging mechanisms and feed integrity-protected logs to the cloud for safe storage

Logging is unfortunately an area of IoT security that has lagged behind, and innovative new approaches are needed to collect data from constrained devices and transmit that data for analysis. There are use cases where logging is made difficult due to sporadic connectivity, devices entering sleep states, and limited resources.

Design systems where IoT devices are capable of recording all access as well as specific security-related events such as failed remote access attempts (such as by SSH or web), detected tamper events, failed privilege escalation attempts, firmware updates, configuration changes, and account modifications.

Log data will likely not ...

Get Practical Internet of Things Security - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.