Back to Blog
SecuritySeptember 8, 202511 min read

IoT Security Best Practices: How IoT Software Companies Protect Connected Devices

Comprehensive guide to securing IoT devices from an industrial IoT solutions provider. Covers hardware security, encrypted communication, secure boot, OTA updates, and vulnerability management.

IoT Security Best Practices: How IoT Software Companies Protect Connected Devices

IoT security encompasses a multi-layered approach to protecting connected devices from unauthorized access, data breaches, firmware tampering, and network-based attacks throughout their entire lifecycle. With over 15 billion IoT devices deployed globally and projections exceeding 30 billion by 2030, the attack surface for embedded systems has expanded dramatically. Effective IoT security requires defense in depth: hardware root of trust using secure elements or TPMs, secure boot to verify firmware integrity, encrypted communication via TLS 1.3 or DTLS, mutual authentication between devices and cloud platforms, secure over-the-air (OTA) update mechanisms with rollback protection, and continuous vulnerability monitoring. The OWASP IoT Top 10 identifies the most critical risks including weak passwords, insecure network services, lack of update mechanisms, and insecure data transfer. Organizations deploying IoT must also comply with emerging regulations like the EU Cyber Resilience Act, NIST IR 8259, and ETSI EN 303 645, which mandate specific security baseline requirements.

How Do You Implement Hardware-Level Security?

Hardware security forms the foundation of any IoT security strategy. Secure elements like the Microchip ATECC608B, Infineon OPTIGA Trust M, and NXP SE050 provide tamper-resistant storage for cryptographic keys, hardware-accelerated crypto operations, and secure key provisioning. ARM TrustZone (on Cortex-M33/M55) creates isolated secure processing environments without requiring a separate chip. For higher assurance applications, TPM 2.0 modules provide standardized hardware security with measured boot, sealed storage, and remote attestation. Physical security measures include disabling JTAG/SWD debug ports on production devices, enabling flash readout protection, and using anti-tamper mesh for high-value devices.

What Communication Security Measures Are Essential?

Every IoT device must implement these communication security measures:

  • TLS 1.3 for all TCP-based communication (MQTT, HTTPS, CoAP over TCP), with certificate pinning where possible.
  • DTLS 1.2/1.3 for UDP-based protocols (CoAP, LwM2M) commonly used in constrained devices.
  • Mutual TLS (mTLS) authentication: both device and server verify each other's certificates, preventing man-in-the-middle attacks.
  • Per-device unique credentials: never share keys across devices. Use X.509 certificates or pre-shared keys provisioned during manufacturing.
  • Network segmentation: isolate IoT devices on separate VLANs or network segments from IT infrastructure.
  • Regular key rotation: implement automated key renewal mechanisms, especially for long-lived industrial devices.

How Should OTA Updates Be Secured?

Secure OTA updates are critical because the update mechanism itself can be an attack vector. Every firmware update must be digitally signed by the manufacturer using asymmetric cryptography (ECDSA P-256 or Ed25519). The device must verify the signature before applying the update, using a public key stored in immutable memory. Implement version checking with monotonic counters to prevent rollback attacks, where an attacker forces installation of an older firmware version with known vulnerabilities. Use A/B partition schemes (dual-bank) so the device can fall back to the previous working firmware if the update fails. Encrypt the firmware image during transit and optionally at rest to protect intellectual property. Consider using standardized update formats like SUIT (Software Updates for Internet of Things) from IETF.

What Regulatory Standards Should IoT Devices Comply With?

IoT security regulations are evolving rapidly worldwide. The EU Cyber Resilience Act (CRA), effective from 2027, mandates that all products with digital elements sold in the EU must meet baseline cybersecurity requirements, including vulnerability handling, secure default configurations, and security updates. ETSI EN 303 645 defines 13 security provisions for consumer IoT devices. NIST IR 8259 provides a core baseline for IoT device security capabilities. In specific verticals, medical devices must comply with FDA cybersecurity guidance, automotive systems follow ISO/SAE 21434 and UN R155, and industrial control systems reference IEC 62443. Manufacturers should adopt a security-by-design approach, integrating threat modeling (STRIDE, PASTA) into the earliest stages of product development.

Key takeaway: IoT security requires defense in depth across hardware (secure elements, TrustZone), firmware (secure boot, signed OTA updates), communication (TLS 1.3, mutual authentication), and operations (vulnerability monitoring, incident response). Compliance with the EU Cyber Resilience Act, ETSI EN 303 645, and NIST IR 8259 is becoming mandatory for market access.

How Did We Secure an IoT Product Against Real-World Threats?

At EmbedCrest, we performed a complete security architecture review and implementation for a medical device manufacturer shipping BLE-connected patient monitoring devices. The original design had critical vulnerabilities: hardcoded BLE pairing keys, unencrypted firmware updates over UART, and no secure boot. We redesigned the security architecture using an nRF5340 with TrustZone and an ATECC608B secure element. The secure element stored per-device ECDSA P-256 keys provisioned during manufacturing using a custom secure provisioning jig. We implemented MCUboot with signed firmware verification (Ed25519), TF-M for cryptographic services in the Secure World, and BLE LESC (LE Secure Connections) with out-of-band pairing. OTA updates were signed with a key stored in AWS CloudHSM and delivered through a custom update server with staged rollout. After implementation, we engaged a third-party penetration testing firm that conducted 80 hours of testing including BLE sniffing, firmware extraction attempts, and man-in-the-middle attacks. All attack vectors were successfully mitigated.

What Are the Most Overlooked IoT Security Vulnerabilities?

Beyond the well-known OWASP IoT Top 10, several subtle vulnerabilities are frequently overlooked. Side-channel attacks on software crypto implementations leak key material through timing variations or power consumption patterns. Use constant-time crypto libraries like Mbed TLS or libsodium, and prefer hardware crypto accelerators that are inherently resistant to timing attacks. Supply chain attacks through compromised third-party libraries are increasing: audit all dependencies, pin exact versions, and verify checksums. JTAG/SWD debug port exposure on production PCBs allows full firmware extraction and memory manipulation. Always disable debug access permanently using OTP fuses (not just software configuration, which can be reverted). BLE advertisement data leakage reveals device presence, type, and sometimes usage patterns even without pairing. Implement BLE privacy with resolvable private addresses (RPA) that rotate every 15 minutes. Physical UART console exposure allows root shell access on Linux-based IoT devices. Disable serial consoles in production builds and use authenticated debug access for field diagnostics.

How Should You Plan for Long-Term Security Maintenance?

IoT devices often operate for 10-15 years, far exceeding typical software maintenance windows. Plan for long-term security by implementing cryptographic agility: design your secure boot and TLS implementations to support algorithm migration (for example, from ECDSA P-256 to post-quantum algorithms like CRYSTALS-Dilithium) without hardware changes. Establish a Software Bill of Materials (SBOM) for each firmware release, tracking all dependencies and their known vulnerabilities using tools like OWASP Dependency-Track or Snyk. Implement automated CVE monitoring with alerts when any dependency is affected. Design your OTA system to support emergency security patches with bypass of normal staged rollout when critical vulnerabilities are discovered. Budget for ongoing security maintenance in the product business model, not just initial development. The EU Cyber Resilience Act mandates security updates for the expected product lifetime, making long-term maintenance a legal requirement for products sold in the EU starting in 2027.

IoT SecurityCybersecurityEncryptionSecure BootEmbedded Security

Rajdatt

Lead Embedded Systems Engineer at EmbedCrest Technology

Delivering enterprise grade embedded systems, IoT, and Edge AI engineering solutions.

FAQ

Frequently Asked Questions

What is the most common IoT security vulnerability?

Weak or default credentials remain the most common IoT vulnerability. Many devices ship with default passwords or use hardcoded credentials, enabling large-scale botnet attacks like Mirai.

Do all IoT devices need a secure element?

Not all, but it is strongly recommended for any device handling sensitive data or requiring high assurance. For cost-sensitive devices, ARM TrustZone on Cortex-M33 provides hardware isolation without an additional chip.

How often should IoT firmware be updated?

Security patches should be deployed as soon as vulnerabilities are discovered. Feature updates can follow a quarterly or semi-annual cadence. The EU CRA will require manufacturers to provide security updates for the expected product lifetime.

What encryption is suitable for constrained IoT devices?

AES-128-GCM for symmetric encryption and ECDSA with P-256 or Ed25519 for asymmetric operations provide strong security with reasonable resource requirements. ChaCha20-Poly1305 is an alternative for devices without AES hardware acceleration.

Ready to Build Your Embedded Solution?

From Edge AI to industrial IoT, our engineering team delivers end to end embedded systems solutions. Let us discuss your project requirements.

Get in Touch