Compliance reduces legal exposure. Architecture reduces the actual attack surface. Most IoT security budgets are still allocated as if those were the same problem.
The 2025–2026 empirical picture is sharper than most security roadmaps assume. Device counts have exploded, fleets have fragmented across vendors, and the line between enterprise IT and operational technology has dissolved. Three structural asymmetries separate the programs that work from the ones that burn budget.
The first asymmetry is between compliance and security. The second is between greenfield advice and brownfield reality. The third is between nominal regulation and actualized enforcement. A connected-device program that treats these as the same problem will scale its attack surface faster than its defenses. A program that treats them as separate engineering disciplines has a chance at Iotellect's secure foundation for connected environments as a structured runtime — not a collection of bolt-on tools.
This article covers what reduces IoT attack surface, what only looks like it does, and what to budget for scenarios that have not yet happened.
Inventory Is the Foundational Control — But Completeness Is a Myth
Every IoT attack-surface program begins with the same question: what do we have? The 2025 evidence converges on an uncomfortable answer — most programs answer it incorrectly.
CISA, together with NSA, FBI, EPA and international partners, published “Foundations for OT Cybersecurity: Asset Inventory Guidance for Owners and Operators” in August 2025. The guidance codifies asset inventory as a five-step discipline: scope definition, asset identification, taxonomy, data management and lifecycle management. The central claim is direct: accurate OT asset inventory is the essential first step toward defensible architecture.
The problem is that completeness at enterprise scale has become combinatorially impossible. Forescout Vedere Labs analysed 10 million devices across 700 organizations in November 2025 and found that 65% of connected assets are no longer traditional IT. The average organization runs 164 device functions, 1,629 vendors and 876 operating system versions. Fleet diversity has passed the threshold where agent-based inventory scales cleanly.
The empirical cost of the gap is visible in incident data. Microsoft’s 2024 Digital Defense Report found unmanaged devices central to ransomware attacks reaching the ransom stage. Dragos engagements repeatedly flagged OT network visibility as a leading finding. Unknown assets become unmanaged assets. Unmanaged assets become initial access points and blind spots during response.
Recap: continuous discovery beats aspirational completeness. The honest target is narrowing blind spots on a weekly cadence, not achieving a 100% inventory that decays by the time it prints.
Segmentation: Purdue Did Not Fail, Segmentation Drift Did
The Purdue Enterprise Reference Architecture is not obsolete. It stopped being maintained. Flat networks, incremental growth, cloud analytics, vendor access and IoT sensors blurred layer separation and made “air gaps” a myth.
The operational successor concept is IEC 62443 zones-and-conduits. NIST SP 800-82r3 references ISA-62443-2-1 as the preferred cybersecurity program standard. Zones group assets by required security level and blast-radius tolerance. Conduits enforce control between zones.
The critical execution error is treating the zone-and-conduit model as a network diagram exercise. It is not. It is a risk classification exercise that drives control selection.
This distinction matters in brownfield environments. IEC 62443-2-1:2024 explicitly addresses legacy systems. A legacy PLC with network isolation, protocol filtering at the conduit, continuous passive monitoring and a planned replacement constitutes managed risk. That framing removes the false dichotomy between “patch everything” and “accept unmanaged exposure.”
Warning sign: most plants that describe themselves as “segmented” are running a firewall with hundreds of broad permit rules between OT and IT. That is a managed bridge, not a boundary. The #1 attack vector into ICS and OT networks remains lateral movement from the enterprise IT network.
Identity: Default Credentials Are an Architectural Failure
The credential problem in IoT is a supply-chain problem disguised as a user problem. When Mirai took down Dyn in 2016 using 62 hardcoded username-password pairs, the post-mortem framed the answer as “users should change their passwords.” Years later, the pattern still drives compromises across routers, cameras, gateways and industrial devices.
The OWASP Top 10 2025 Authentication Failures entry maps hard-coded passwords, hard-coded credentials, default credentials and default passwords to recorded CVEs. The OWASP IoT Top 10 keeps weak, guessable or hardcoded passwords as the top IoT vulnerability.
Regulation has finally caught up. The UK Product Security and Telecommunications Infrastructure Act 2022, effective 29 April 2024, criminalizes universal default passwords in consumer connectable products. ETSI EN 303 645 §5.1, “No universal default passwords,” is the technical template behind PSTI, Singapore CLS, India TEC and the EU Cyber Resilience Act conformance presumption.
The architecturally coherent answer is hardware-rooted cryptographic device identity. IEEE Std 802.1AR-2018 defines the Secure Device Identifier framework. TPM 2.0 stores immutable identities in tamper-resistant hardware.
The reality check: TPM-equipped devices remain a minority of the installed base. A Rockwell MicroLogix 1400 or Siemens SIMATIC controller from 2011 predates TPM 2.0 and will never get it. Cryptographic identity solves 2026+ greenfield. The brownfield fleet remains a decade-long liability.
Rule of thumb: if a vendor pitches “IoT PKI retrofits” for 2010-era SCADA, ask for proof points. Identity at the hardware level cannot be emulated backwards.
Firmware: RFC 9019 Is the Floor, CRA Article 13 Is the Wall
Secure firmware updates are no longer a choice. IETF RFC 9019 defines the canonical IoT firmware-update architecture: signed manifest, out-of-band trust anchors and cryptographic image authentication. RFC 9124 specifies manifest elements including monotonic sequence numbers for anti-rollback and STRIDE threat modelling. These are the baseline any OTA pipeline must produce.
The EU Cyber Resilience Act turns firmware maintenance from a best practice into a legal obligation. Article 13 sets minimum support and update-availability expectations, manufacturer due diligence on third-party components and upstream vulnerability reporting to component maintainers. This reshapes the P&L of products that assumed two-to-three-year update cycles.
The CRA also mandates a machine-readable Software Bill of Materials covering at least top-level dependencies. BSI TR-03183-2 v2.1.0 specifies CycloneDX 1.6+ or SPDX 3.0.1+ as acceptable formats. Main obligations apply from 11 December 2027.
Warning sign: top-level SBOM is necessary and insufficient. Binarly research in August 2025 identified the XZ backdoor persisting in Docker base images long after public disclosure. Downstream IoT edge-container builds inherited the compromise transitively. SBOMs did not detect it. Behavioural analysis did.
The lesson is architectural, not procedural. Compliance conformity and security effectiveness are different problems. A fleet that passes CRA conformity assessment can still be structurally owned. The engineering response is SBOM plus VEX/CSAF vulnerability exchange plus runtime attestation — a behavioural detection layer, not signature-based.
Zero Trust for IoT: Overlay, Not Native
Zero trust is canonical in enterprise security. Applied literally to IoT and OT, it misfires. NIST SP 1800-35 covers enterprise zero-trust example implementations and states that ICS and OT are not in scope, though the concepts can inform planning. CISA’s Zero Trust Maturity Model includes IoT in the Devices pillar but disclaims challenges specific to OT and certain IoT classes.
That caveat matters. In OT, incident response diverges from enterprise reflexes. A fail-closed control can create more damage than the compromise it was meant to stop. Safety and uptime change the design logic.
The contrarian framing is simple: zero trust assumes that trust is explicit, identity-centric and continuously enforceable. IoT and OT systems violate all three assumptions by design. Zero trust addresses access decisions. It does not explain how compromise spreads once trust already exists through inherited trust and shared control paths.
The practical question is not “can we do zero trust in a 20-year-old plant?” but “which architectural class of zero trust?” Native microsegmentation often means VLAN rewiring, agent installation, re-IP work and production disruption. Identity-based overlay deployments tell a different story.
Rule of thumb: before committing zero-trust budget in a brownfield environment, require the architecture class. Overlay — software-defined policy fabric over existing infrastructure — is the deployable pattern. Native — VLANs, agents and re-IP — is the statistical failure mode. A secure IoT edge platform that enforces identity and governance on top of existing cabling is what makes brownfield zero trust feasible in practice.
Monitoring: Fewer Than Ten Percent Have It
Dragos estimates that fewer than 10% of OT networks worldwide have meaningful network monitoring in place. In many incident response cases, investigations still begin not with a detection alert but with someone noticing that “something seemed wrong” in operations. That is a decade of detection marketing against a baseline around one site in ten.
The financial ROI is measurable. Organizations with comprehensive OT visibility detect and contain incidents far faster because they can see controllers, HMIs, gateways, engineering workstations and protocol behavior in context. Without that instrumentation, response teams spend the first phase of an incident discovering the environment.
The FrostyGoop case from January 2024 is the canonical study of why OT-native detection matters. FrostyGoop issued legitimate-looking Modbus TCP commands from a Linux binary to affect ENCO heat controllers in Lviv. Hundreds of apartment buildings lost heat at sub-zero temperatures. Standard antivirus was not the right control. Passive network-behaviour anomaly detection watching Modbus flow deltas from non-engineering hosts would have had a better chance.
Modern OT monitoring must move beyond device-by-device enumeration. Threat groups increasingly map control loops by correlating HMIs, VFDs, meters and remote gateways as connected functional units. That rewards hunts clustered across device classes, not isolated asset records.
Bottom line: monitoring is not optional at IEC 62443 SL-2. It is compliance-mandated. And it is the single control with the highest observed containment ROI.
Regulation: Teeth on Paper, Lag in Practice
The regulatory tailwind is real. CRA Article 64 establishes significant penalty ceilings. NIS2 Article 34 imposes major penalties for essential and important entities. UK PSTI reaches GBP 10 million or 4% of global turnover, plus daily penalties for continuing non-compliance.
The CRA calendar is concrete: entry into force in December 2024, body notifications from June 2026, mandatory ENISA reporting from September 2026 and main obligations, including CE marking for cybersecurity, from December 2027. Conformity default is manufacturer self-assessment for most products.
NIS2 transposition has been uneven, but the direction is clear: more entities, stronger governance and explicit board accountability. Reporting expectations are becoming operational facts, not legal abstractions.
Hint: nominal penalty ceilings are real. Enforcement capacity lags 12–24 months. Fear-based vendor marketing runs ahead of actual risk. Use regulation to justify governance and budget. Do not confuse it with architecture.
The Wildcard Worth Hedging
Most security budgets handle the median incident. Few handle the tail. The scenario worth hedging in 2026 is a sector-wide vendor zero-day in Siemens S7, Rockwell ControlLogix, Schneider Modicon or Unitronics firmware, combined with deprecated firmware and exposed engineering systems.
The precursor event is documented. CyberAv3ngers compromised Unitronics-based water utilities across the United States and Israel within days in 2023. A fresh PLC firmware vulnerability, an unpatchable installed base and direct internet exposure make coordinated disruption plausible within 48 hours.
The probability is low in any given year. The impact is catastrophic. That makes it a budget problem, not a prediction problem.
Final takeaway
In practical terms, teams should allocate 10–15% of OT security spend to the wildcard hedge. Cross-reference asset-level firmware inventory against CISA KEV every 72 hours. Deploy compensating controls on the unpatchable fleet: passive NBAD tuned to MITRE T0801 baselines, protocol filtering at the conduit, unidirectional gateways and behavioural attestation on workstations. Pre-authorize a 72-hour emergency segmentation playbook.
Attack surface reduction in connected environments has stopped being a tooling problem and started being an architectural discipline. Compliance is the floor. Detection is the ceiling.
Standards define the requirements. Architecture decides whether they work.
Share this post
Leave a comment
All comments are moderated. Spammy and bot submitted comments are deleted. Please submit the comments that are helpful to others, and we'll approve your comments. A comment that includes outbound link will only be approved if the content is relevant to the topic, and has some value to our readers.

Comments (0)
No comment