Every device, app, service, and interface in IoT needs its own identity, which operators can use to track and analyze activity. This is not only used to identify problems but also to protect the systems from attacks, attempted fraud, and espionage.
The more you have, the more you get: identity plays a key role in securing IoT, and the number of digital identities to manage tends to grow exponentially – many more than existing identity and access management (IAM) systems need to support, says the IoT Working Group at Cloud Security Alliance.
The security industry is changing and IAM is no longer solely concerned with managing people but also managing the hundreds of thousands of “things” that may be connected to a network. Some practitioners have begun to refer to this new identity ecosystem as the Identity of Things.
Smart Industry asked leading analyst firms about the importance of identity management, the major challenges, and the ways to implement identities for IoT. Full Article