CISSP · · 4 min read

Embedded Systems and IoT Security: Securing the Devices Nobody Thinks About

IoT and embedded devices are everywhere and almost never patched. Learn the security challenges and compensating controls for CISSP Domain 3.

Hook / Why This Matters

CISSP Lens: Pick answers that align business risk, governance intent, and practical control execution.

Your network has more embedded devices than computers. Printers, HVAC controllers, badge readers, medical devices, and industrial sensors all run software, connect to your network, and almost never get patched. Every one of them is an attack surface the CISSP exam expects you to understand.

Core Concept Explained Simply

Embedded systems are purpose-built computing devices designed for a specific function. Unlike general-purpose computers, they typically have constrained resources (limited CPU, memory, and storage), run specialized firmware or real-time operating systems, and operate for years or decades without updates. IoT (Internet of Things) devices are networked embedded systems, and their connectivity dramatically expands the attack surface.

Why Embedded and IoT Devices Are Hard to Secure

Several characteristics make these devices uniquely challenging:

SCADA and ICS

SCADA (Supervisory Control and Data Acquisition) and ICS (Industrial Control Systems) manage critical infrastructure: power grids, water treatment, manufacturing lines, and oil pipelines. These are operational technology (OT) environments, and their security priorities differ fundamentally from traditional IT:

In OT, a system going offline can cause physical harm, environmental damage, or loss of life. Patching an ICS system requires extensive testing because an unexpected reboot or configuration change could shut down a power plant or contaminate a water supply.

The Purdue Model

The Purdue model defines network segmentation layers for ICS environments:

Traffic should flow through defined pathways with strict controls at each boundary. Direct connections from Level 0/1 devices to the enterprise network or internet should never exist.

Real-Time Operating Systems (RTOS)

Many embedded devices run real-time operating systems that prioritize deterministic timing over features. RTOS security is limited by design because the focus is on predictable execution, not security controls. This means security must be provided externally through network controls and monitoring.

Cyber-Physical Systems

When digital systems control physical processes, security failures have physical consequences. A compromised insulin pump, a tampered traffic light controller, or a manipulated power grid relay can cause injury or death. This raises the stakes beyond data protection to safety.

CISSP Lens

The exam tests your understanding of why embedded and IoT devices require different security approaches than traditional IT systems. Know that OT environments prioritize availability (and often safety) over confidentiality. Know that compensating controls are necessary when devices cannot be directly patched or hardened. Know the Purdue model as the standard segmentation framework for ICS.

A common exam pattern describes an unmanageable device and asks for the best security approach. The answer almost always involves network segmentation and monitoring rather than trying to secure the device itself.

Real-World Scenario

A hospital's network-connected infusion pumps were discovered running firmware with known vulnerabilities that allowed remote code execution. The manufacturer had no patch available and estimated a fix would take 12 to 18 months. The pumps could not be taken offline because patients depended on them.

The hospital's security team implemented compensating controls:

This approach contained the risk without disrupting patient care, which is the core challenge of OT and medical device security.

Common Mistakes and Misconceptions

Actionable Checklist

Key Takeaways

Exam-Style Reflection Question

A manufacturing facility cannot patch a vulnerability in its SCADA system because the vendor requires six months of testing before approving updates. What is the best approach?

Answer: Implement compensating controls while waiting for the approved patch. This includes network segmentation to isolate the SCADA system, enhanced monitoring for exploit attempts, restricting remote access, and ensuring only authorized personnel can interact with the system. In OT, availability and safety take priority, so patching without vendor validation could be more dangerous than the vulnerability itself.

Read next

© 2025 Threat On The Wire. All rights reserved.