Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 552

IoT Security

What is IoT Security?

IoT SecurityThe discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes.


IoT security covers the design, deployment, and operation of safeguards for Internet-of-Things ecosystems: consumer gadgets, smart-home devices, connected vehicles, medical implants, smart-city sensors, and industrial IIoT assets. It must contend with constrained CPUs and memory, intermittent connectivity, weak default credentials, infrequent patches, and supply chains spanning many vendors. Core controls include unique device identity (often via secure elements or TPM-like chips), strong device authentication, signed firmware with secure boot, encrypted-by-default communications (TLS, DTLS, MQTT over TLS), network segmentation, and robust update mechanisms. Regulations such as the EU Cyber Resilience Act, the UK PSTI Act, and standards like ETSI EN 303 645 and NIST IR 8259 now codify minimum IoT security requirements.

Examples

  1. 01

    A smart camera that requires unique per-device passwords, signed firmware, and TLS-encrypted cloud telemetry.

  2. 02

    An IIoT gateway that segments machine-data uplinks from the production network through a one-way diode.

Frequently asked questions

What is IoT Security?

The discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes. It belongs to the OT / ICS / IoT category of cybersecurity.

What does IoT Security mean?

The discipline of protecting Internet-of-Things devices, gateways, networks, and cloud services from compromise, given their scale, constrained resources, and long lifetimes.

How does IoT Security work?

IoT security covers the design, deployment, and operation of safeguards for Internet-of-Things ecosystems: consumer gadgets, smart-home devices, connected vehicles, medical implants, smart-city sensors, and industrial IIoT assets. It must contend with constrained CPUs and memory, intermittent connectivity, weak default credentials, infrequent patches, and supply chains spanning many vendors. Core controls include unique device identity (often via secure elements or TPM-like chips), strong device authentication, signed firmware with secure boot, encrypted-by-default communications (TLS, DTLS, MQTT over TLS), network segmentation, and robust update mechanisms. Regulations such as the EU Cyber Resilience Act, the UK PSTI Act, and standards like ETSI EN 303 645 and NIST IR 8259 now codify minimum IoT security requirements.

How do you defend against IoT Security?

Defences for IoT Security typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for IoT Security?

Common alternative names include: Internet of Things security, IoT cybersecurity.

Related terms

See also