{"id":21252,"date":"2017-02-28T11:15:40","date_gmt":"2017-02-28T08:15:40","guid":{"rendered":"https:\/\/www.altoros.com\/blog\/?p=21252"},"modified":"2019-05-07T03:19:38","modified_gmt":"2019-05-07T00:19:38","slug":"applying-data-centric-approach-to-unify-iot-security-policies","status":"publish","type":"post","link":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/","title":{"rendered":"Applying Data-Centric Approach to Unify IoT Security Policies"},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_79_2 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#More_data_more_challenges\" >More data, more challenges<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#Regulations_and_security_policy_requirements\" >Regulations and security policy requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#How_this_relates_to_IoT\" >How this relates to IoT<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#Addressing_the_problem\" >Addressing the problem<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#An_example_using_Cassandra\" >An example using Cassandra<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#Want_details_Watch_the_video\" >Want details? Watch the video!<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#Related_slides\" >Related slides<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#Related_reading\" >Related reading<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#About_the_speaker\" >About the speaker<\/a><\/li><\/ul><\/nav><\/div>\n<h3><span class=\"ez-toc-section\" id=\"More_data_more_challenges\"><\/span>More data, more challenges<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The Internet of Things (IoT) is driving significant new IP traffic, creating more complex security challenges for enterprise IT. Projections from one major technology company show steady 20 to 25% <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/solutions\/executive-perspectives\/annual-internet-report\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">data growth<\/a> over the next few years, resulting in a doubling every three years or so. Add to this related growth of IoT devices\u2014more devices means <a href=\"https:\/\/www.altoros.com\/blog\/cybersecurity-for-the-iot-and-ge-predix\/\">more threats<\/a>\u2014and consequent <a href=\"https:\/\/www.altoros.com\/blog\/the-good-the-bad-and-the-ugly-use-of-iot-who-owns-the-data\/\" >security challenges<\/a> for IoT data.<\/p>\n<p>At the recent <a href=\"https:\/\/www.meetup.com\/Predix\/events\/231937012\/\" target=\"_blank\" rel=\"noopener noreferrer\">meetup<\/a>, <a href=\"https:\/\/www.linkedin.com\/in\/prasad-mujumdar-88b14729\/\" target=\"_blank\" rel=\"noopener noreferrer\">Prasad Mujumdar<\/a>, an engineer with BlueTalon, focused on how \u201ca data-centric security approach can unify all security policies around data for full visibility and better control.\u201d<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Prasad-Mujumdar-v2.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Prasad-Mujumdar-v2.png\" alt=\"BlueTalon-Security-Predix-IoT-Prasad-Mujumdar-v2\" width=\"640\" class=\"aligncenter size-full wp-image-21386\" \/><\/a><\/p>\n<blockquote><p><em>&#8220;How do I make sure the right people are allowed to see [the data], and those who are not are not allowed to access it no matter what apps they are trying to use?\u201d \u2014Prasad Mujumdar, BlueTalon<\/em><\/p><\/blockquote>\n<p>Prasad mentioned the issue of being able to move data from one app to another while retaining secure compliance. \u201cIf you have a file system on a NoSQL database, and move it to Hadoop or another database (of any type), or to a data science application, (in all cases) you need to have a consistent security policy across the pipeline,\u201d he said. \u201cIt doesn&#8217;t matter what you&#8217;re running, you should see the exact same ID and rules enforcement attached to that data.\u201d<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Regulations_and_security_policy_requirements\"><\/span>Regulations and security policy requirements<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Prasad introduced some of the regulatory trends and \u201cscary stories\u201d for companies that fail to be in compliance. The violation of officially established regulations may result in huge fines.<\/p>\n<p>For example, Facebook is daily facing fines of \u20ac250,000 in Belgium as European Court of Justice <a href=\"https:\/\/curia.europa.eu\/jcms\/upload\/docs\/application\/pdf\/2015-10\/cp150117en.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">has declared<\/a> Safe Harbor invalid, which means that tracking data from non-members is illegal. Similarly, the <a href=\"https:\/\/www.forbes.com\/sites\/maggiemcgrath\/2014\/01\/10\/target-data-breach-spilled-info-on-as-many-as-70-million-customers\/\" target=\"_blank\" rel=\"noopener noreferrer\">data breach experience<\/a> of Target\u2014a large discount store retailer in US\u2014resulted in a 46% drop in profits in 2013 due to reputational damage (with additional $100 millions to upgrade the affected systems).<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Prasad-Mujumdar.jpg\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Prasad-Mujumdar.jpg\" alt=\"BlueTalon Security Predix IoT Prasad Mujumdar\" width=\"640\" class=\"aligncenter size-full wp-image-21282\" \/><\/a><\/p>\n<p>Prasad then outlined a few business-level policy issues for enterprises to keep in mind as they grapple with security issues:<\/p>\n<ul>\n<li>Data owners and regulatory entities define policies of use.<\/li>\n<li>Definition of policies must be owned by business stakeholders.<\/li>\n<li>Automated enforcement of policies across data platforms is needed.<\/li>\n<li>Policies managed by business owners must be enforceable independent of data platform.<\/li>\n<li>Enforcement of these policies must be demonstrable to auditors.<\/li>\n<li>Enforcement must be distributed and consistent.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_this_relates_to_IoT\"><\/span>How this relates to IoT<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Prasad noted that in addition to many users, an IoT deployment will have many, that is, heterogeneous data flows. \u201cThe biggest problem with these data flows is getting a consistent policy,\u201d he said. The policy extends beyond basic rules, according to Prasad.<\/p>\n<p>Thus, behavior must also be taken into account. For example, \u201cyou should know who&#8217;s doing what in your system. Who&#8217;s running too many reports, for example? You must be able to stop them, or alert someone there might be a hack in your system.\u201d<\/p>\n<p>Prasad then focused on how to codify policies that give different users different access:<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Codify-Policies.jpg\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Codify-Policies.jpg\" alt=\"BlueTalon Security Predix IoT Codify Policies\" width=\"640\" class=\"aligncenter size-full wp-image-21279\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Addressing_the_problem\"><\/span>Addressing the problem<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>\u201cDon&#8217;t change tools just because you put up a security layer,\u201d Prasad exhorted. He described how <a href=\"http:\/\/bluetalon.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BlueTalon<\/a>\u2014a platform for defining fine-grained data access policies applied to all users, all applications, and multiple data stores\u2014was developed to address these issues.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-High-Level-Architecture-View.jpg\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-High-Level-Architecture-View.jpg\" alt=\"BlueTalon Security Predix IoT High Level Architecture View\" width=\"640\" class=\"aligncenter size-full wp-image-21280\" \/><\/a><\/p>\n<p>Prasad emphasized the importance of centralizing decisions to manage policies from one place, as well as making the enforcement protocol transparent \u201cto preserve the UX,\u201d reiterating the commitment to the user experience he mentioned earlier in his talk.<\/p>\n<p><center><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/how-blue-talon-works-iot-data-centric-approach-predix-v11.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/how-blue-talon-works-iot-data-centric-approach-predix-v11.png\" alt=\"how-blue-talon-works-iot-data-centric-approach-predix-v11\" width=\"640\" class=\"aligncenter size-full wp-image-21291\" \/><\/a><\/center><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"An_example_using_Cassandra\"><\/span>An example using Cassandra<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The Cassandra NoSQL database is one of the options available for use with the Predix platform, and Prasad provided some examples of the issues that arise with its use. For example, one security feature is limited to a simple Grant\/Revoke command at the table level, giving it an \u201call or nothing\u201d approach to access. Each user must be recreated on every local Cassandra node for authentication. <\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Granular-Access-Control-Cassandra.jpg\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/BlueTalon-Security-Predix-IoT-Granular-Access-Control-Cassandra.jpg\" alt=\"BlueTalon Security Predix IoT Granular Access Control Cassandra\" width=\"640\" class=\"aligncenter size-full wp-image-21281\" \/><\/a><\/p>\n<p>In contrast, implementing BlueTalon provides \u201cgranular, user-based access controls to columns and sub-fields,\u201d Prasad said. Dynamic attribute resolution and proxy authentication is enabled, and it&#8217;s possible to conduct auditing of user data requests to monitor compliance or check on anomalous behaviors. He also noted a very minimal performance impact through BlueTalon&#8217;s use, saying that users will be unaware of its existence.<\/p>\n<p><a href=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/blue-talon-security-policies-points-of-visibility-v11.png\"><img decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/blue-talon-security-policies-points-of-visibility-v11.png\" alt=\"blue-talon-security-policies-points-of-visibility-v11\" width=\"640\" class=\"aligncenter size-full wp-image-21389\" \/><\/a><\/p>\n<p>In conclusion, he said the company&#8217;s approach \u201cunifies security in the data platforms embedded in Predix,\u201d something that he believes IoT deployers will welcome in coming years as the Internet of Things plays a larger role in their enterprise and drives all those bytes of new data.<\/p>\n<p>For more details on unifying IoT security policies, check out <a href=\"https:\/\/www.altoros.com\/webinars\/security-of-iot-data-implementing-data-centric-security-and-user-access-strategy\/\" >a webinar<\/a> by <a href=\"https:\/\/www.linkedin.com\/in\/pratikrverma\/\" target=\"_blank\" rel=\"noopener noreferrer\">Pratik Verma<\/a>, BlueTalon&#8217;s CEO, or watch the following recording from the meetup.<\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Want_details_Watch_the_video\"><\/span>Want details? Watch the video!<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td class=\"video-details-td\">\n<div style=\"float: right; width: 45%; padding-left: 15px; font-size: 14px;\">\n<p><strong>Table of contents<\/strong><\/p>\n<ol>\n<li style=\"margin-bottom: 6px;\">What are some of the security breaches in IoT? (<a href=\"#wistia_w7ajoswx7q?time=160\">2&#8217;40&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 6px;\">What are the data security requirements in Predix? (<a href=\"#wistia_w7ajoswx7q?time=200\">3&#8217;20&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 6px;\">How to differentiate policies for different users? (<a href=\"#wistia_w7ajoswx7q?time=305\">5&#8217;05&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 6px;\">How does BlueTalon unifiy IoT security policy management? (<a href=\"#wistia_w7ajoswx7q?time=475\">7&#8217;55&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 6px;\">How does access control work? (<a href=\"#wistia_w7ajoswx7q?time=570\">9&#8217;30&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 6px;\">How is data visibility managed? (<a href=\"#wistia_w7ajoswx7q?time=1065\">17&#8217;45&#8221;<\/a>)<\/li>\n<li style=\"margin-bottom: 6px;\">An example with Cassandra: policies for granular access control (<a href=\"#wistia_w7ajoswx7q?time=1120\">18&#8217;40&#8221;<\/a>)<\/li>\n<\/ol>\n<\/div>\n<p><script charset=\"ISO-8859-1\" src=\"\/\/fast.wistia.com\/assets\/external\/E-v1.js\" async><\/script><\/p>\n<div class=\"wistia_embed wistia_async_w7ajoswx7q\" style=\"height:320px;width:440px\">&nbsp;<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Related_slides\"><\/span>Related slides<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><center><iframe loading=\"lazy\" src=\"https:\/\/www.slideshare.net\/slideshow\/embed_code\/key\/ra0cJBNhy9gH0n\" width=\"427\" height=\"356\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" style=\"border:1px solid #CCC; border-width:1px; margin-bottom:5px; max-width: 100%;\" allowfullscreen><\/iframe><\/center><\/p>\n<p>&nbsp;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Related_reading\"><\/span>Related reading<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/the-good-the-bad-and-the-ugly-use-of-iot-who-owns-the-data\/\">The Good, the Bad, and the Ugly Use of IoT: Who Owns the Data?<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/cybersecurity-for-the-iot-and-ge-predix\/\">Cybersecurity for the IoT: Issues, Challenges, and Solutions<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/adopting-an-iot-platform-things-to-know-and-pitfalls-to-avoid\/\">Adopting an IoT Platform: Things to Know and Pitfalls to Avoid<\/a><\/li>\n<li><a href=\"https:\/\/www.altoros.com\/blog\/cloud-foundry-and-iot-concerns-the-need-for-standardization-and-transaction-authentication\/\">Cloud Foundry and IoT: The Need for Standardization and Transaction Authentication<\/a><\/li>\n<\/ul>\n<hr\/>\n<h3><span class=\"ez-toc-section\" id=\"About_the_speaker\"><\/span>About the speaker<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div>\n<div style=\"float: right;\"><a href=\"https:\/\/www.linkedin.com\/in\/prasad-mujumdar-88b14729\/\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/Prasad-Mujumdar-BlueTalon-bio.png\" alt=\"Prasad Mujumdar, BlueTalon bio\" width=\"150\" height=\"150\" class=\"aligncenter size-full wp-image-21332\" \/><\/a><\/div>\n<div style=\"width: 600px;\"><small><a href=\"https:\/\/www.linkedin.com\/in\/prasad-mujumdar-88b14729\/\">Prasad Mujumdar<\/a> is a Software Engineer at BlueTalon. He graduated as an MS in Computer Science from Indian Institute of Technology, and holds a BS from the University of Mumbai. Prasad is associated with various projects of the Apache Hadoop ecosystem. He has been a committer and PMC member of Apache Flume and Apache Sentry (Incubating) and also a committer on Apache Hive. Prior to BlueTalon, Prasad served as a senior software engineer at Cloudera and at IBM where he worked on database products development.<\/small><\/div>\n<\/div>\n<hr\/>\n<p><center><small>This post is written by <a href=\"https:\/\/www.altoros.com\/blog\/author\/rstrukhoff\/\">Roger Strukhoff<\/a>, <a href=\"https:\/\/www.altoros.com\/blog\/author\/sophie.turol\/\">Sophie Turol<\/a>, and <a href=\"https:\/\/www.altoros.com\/blog\/author\/alex\/\">Alex Khizhniak<\/a>.<\/small><\/center><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More data, more challenges<\/p>\n<p>The Internet of Things (IoT) is driving significant new IP traffic, creating more complex security challenges for enterprise IT. Projections from one major technology company show steady 20 to 25% data growth over the next few years, resulting in a doubling every three years or so. Add [&#8230;]<\/p>\n","protected":false},"author":9,"featured_media":21405,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[7],"tags":[873,117,647],"class_list":["post-21252","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news-and-opinion","tag-cloud-native","tag-iot","tag-predix"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Applying Data-Centric Approach to Unify IoT Security Policies | Altoros<\/title>\n<meta name=\"description\" content=\"To eliminate the burdens of varying access permissions in an IoT deployment, a solution is needed to consolidate all the heterogeneous security policies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Applying Data-Centric Approach to Unify IoT Security Policies | Altoros\" \/>\n<meta property=\"og:description\" content=\"More data, more challenges The Internet of Things (IoT) is driving significant new IP traffic, creating more complex security challenges for enterprise IT. Projections from one major technology company show steady 20 to 25% data growth over the next few years, resulting in a doubling every three years or so. Add [...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/\" \/>\n<meta property=\"og:site_name\" content=\"Altoros\" \/>\n<meta property=\"article:published_time\" content=\"2017-02-28T08:15:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-07T00:19:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"Roger Strukhoff\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roger Strukhoff\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/\",\"name\":\"Applying Data-Centric Approach to Unify IoT Security Policies | Altoros\",\"isPartOf\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif\",\"datePublished\":\"2017-02-28T08:15:40+00:00\",\"dateModified\":\"2019-05-07T00:19:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#primaryimage\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif\",\"width\":640,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.altoros.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Applying Data-Centric Approach to Unify IoT Security Policies\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#website\",\"url\":\"https:\/\/www.altoros.com\/blog\/\",\"name\":\"Altoros\",\"description\":\"Insight\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.altoros.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8\",\"name\":\"Roger Strukhoff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg\",\"contentUrl\":\"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg\",\"caption\":\"Roger Strukhoff\"},\"description\":\"Roger Strukhoff is Director of Research at Altoros. He also serves as Executive Director of the Tau Institute for Global ICT Research, Conference Chair of Cloud Expo and Things Expo, Co-Chair of the Big Data World Forum, and Open-Source Chair for the global DCD Converged conference series. He received his BA from Knox College, and conducted MBA studies at California State University\/East Bay. Previously in his career, he was VP of New Products at International Data Group and Director of Global Publications at TIBCO Software.\",\"url\":\"https:\/\/www.altoros.com\/blog\/author\/rstrukhoff\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Applying Data-Centric Approach to Unify IoT Security Policies | Altoros","description":"To eliminate the burdens of varying access permissions in an IoT deployment, a solution is needed to consolidate all the heterogeneous security policies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/","og_locale":"en_US","og_type":"article","og_title":"Applying Data-Centric Approach to Unify IoT Security Policies | Altoros","og_description":"More data, more challenges The Internet of Things (IoT) is driving significant new IP traffic, creating more complex security challenges for enterprise IT. Projections from one major technology company show steady 20 to 25% data growth over the next few years, resulting in a doubling every three years or so. Add [...]","og_url":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/","og_site_name":"Altoros","article_published_time":"2017-02-28T08:15:40+00:00","article_modified_time":"2019-05-07T00:19:38+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif","type":"image\/gif"}],"author":"Roger Strukhoff","twitter_misc":{"Written by":"Roger Strukhoff","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/","url":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/","name":"Applying Data-Centric Approach to Unify IoT Security Policies | Altoros","isPartOf":{"@id":"https:\/\/www.altoros.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#primaryimage"},"image":{"@id":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#primaryimage"},"thumbnailUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif","datePublished":"2017-02-28T08:15:40+00:00","dateModified":"2019-05-07T00:19:38+00:00","author":{"@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8"},"breadcrumb":{"@id":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#primaryimage","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2017\/02\/data-centric-approach-with-bluetalon-to-unify-iot-security-policies.gif","width":640,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/www.altoros.com\/blog\/applying-data-centric-approach-to-unify-iot-security-policies\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.altoros.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Applying Data-Centric Approach to Unify IoT Security Policies"}]},{"@type":"WebSite","@id":"https:\/\/www.altoros.com\/blog\/#website","url":"https:\/\/www.altoros.com\/blog\/","name":"Altoros","description":"Insight","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.altoros.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/56ea20d6f280f7a442e89e5884b06fd8","name":"Roger Strukhoff","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.altoros.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg","contentUrl":"https:\/\/www.altoros.com\/blog\/wp-content\/uploads\/2016\/03\/roger_strukhoff_user_icon-150x150.jpg","caption":"Roger Strukhoff"},"description":"Roger Strukhoff is Director of Research at Altoros. He also serves as Executive Director of the Tau Institute for Global ICT Research, Conference Chair of Cloud Expo and Things Expo, Co-Chair of the Big Data World Forum, and Open-Source Chair for the global DCD Converged conference series. He received his BA from Knox College, and conducted MBA studies at California State University\/East Bay. Previously in his career, he was VP of New Products at International Data Group and Director of Global Publications at TIBCO Software.","url":"https:\/\/www.altoros.com\/blog\/author\/rstrukhoff\/"}]}},"_links":{"self":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/21252","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/comments?post=21252"}],"version-history":[{"count":57,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/21252\/revisions"}],"predecessor-version":[{"id":42859,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/posts\/21252\/revisions\/42859"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media\/21405"}],"wp:attachment":[{"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/media?parent=21252"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/categories?post=21252"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.altoros.com\/blog\/wp-json\/wp\/v2\/tags?post=21252"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}