Embedded, IoT, OT, and Physical Device Security

Key Takeaways

  • Embedded, IoT, and OT devices often have long lifecycles, limited patching, weak defaults, and high availability requirements.
  • Segmentation is a primary control because many devices cannot run normal endpoint agents.
  • OT environments prioritize safety and availability, so security changes require careful testing and coordination.
  • Physical security protects devices from theft, tampering, unauthorized ports, and console access.
  • Asset inventory is essential because unmanaged devices cannot be patched, monitored, or retired correctly.
Last updated: April 2026

Embedded, IoT, OT, and Physical Device Security

Embedded systems, IoT devices, and operational technology often do not look like traditional computers, but they still create security risk. Examples include cameras, badge readers, printers, medical devices, sensors, building controls, industrial controllers, and point-of-sale terminals.

Common Characteristics

CharacteristicSecurity impact
Long lifecycleDevices may outlive vendor support
Default credentialsEasy initial compromise if not changed
Limited computeMay not support EDR or full disk encryption
Proprietary protocolsHarder to monitor or test safely
High availability needPatching may require maintenance windows
Physical exposureAttackers may reach ports, buttons, or storage

IoT and Embedded Controls

ControlPurpose
Asset inventoryKnow device type, owner, firmware, location, and support status
Change default credentialsRemove common initial access path
Network segmentationLimit what the device can reach and who can reach it
Firmware updatesFix known device vulnerabilities
Disable unused servicesReduce attack surface
Certificate-based authenticationStrengthen device identity where supported
MonitoringDetect unusual traffic or behavior
Secure disposalRemove credentials, keys, and stored data

OT Security Considerations

OT includes systems that monitor or control physical processes. Examples include PLCs, SCADA components, manufacturing systems, and building automation.

IT priorityOT priority
Confidentiality often leadsSafety and availability often lead
Frequent patching may be normalPatching requires testing and outage planning
Standard endpoint agents are commonAgents may be unsupported or unsafe
Office network traffic patternsDeterministic process traffic may be expected

OT security work should involve operations engineers, safety owners, and change control. A well-intentioned vulnerability scan can disrupt fragile devices if it is not planned.

Physical Device Security

RiskControl
Stolen deviceLocks, cages, asset tracking, secure mounting
Console port misusePort blockers, locked cabinets, disabled ports
Rogue USB deviceUSB control, endpoint policy, port locks
TamperingTamper-evident seals, cameras, inspections
Unauthorized facility accessBadges, guards, mantraps, visitor logs

Practical Scenario

A warehouse uses network-connected cameras, badge readers, and environmental sensors. The secure operations plan should inventory every device, change default passwords, place devices on segmented VLANs, restrict management to an admin subnet, update firmware during planned windows, monitor traffic for unusual outbound connections, and physically secure devices in public areas.

Common Exam Traps

TrapBetter exam reasoning
"Install EDR on every IoT device."Many IoT devices cannot run agents, so use segmentation and monitoring.
"Patch OT immediately without testing."OT changes require safety-aware testing and scheduling.
"A camera is not a computer."Networked devices can be attack paths.
"Physical access does not matter if the network is secure."Physical access can expose ports, reset buttons, storage, or consoles.

Quick Drill

Pick the best control:

  1. Stop cameras from reaching finance servers: segmentation.
  2. Prevent use of factory passwords: change defaults during onboarding.
  3. Protect a switch in a public hallway: locked enclosure.
  4. Avoid disrupting industrial controllers with scanning: coordinate testing and maintenance windows.
  5. Know which devices are unsupported: asset inventory with lifecycle status.
Test Your Knowledge

An IoT camera cannot run an endpoint agent. Which control most directly limits the damage if it is compromised?

A
B
C
D
Test Your Knowledge

Why should vulnerability scanning in an OT environment be coordinated carefully?

A
B
C
D
Test Your KnowledgeMulti-Select

Which controls help protect physical devices from tampering? Choose two.

Select all that apply

Locked cabinets or cages
Tamper-evident seals
Default shared passwords
Unrestricted public console access