=Paper=
{{Paper
|id=Vol-3610/paper-02
|storemode=property
|title=Zero Trust in the Context of IoT: Industrial Literature Review, Trends, and Challenges
|pdfUrl=https://ceur-ws.org/Vol-3610/paper-02.pdf
|volume=Vol-3610
|authors=Laurent Bobelin
|dblpUrl=https://dblp.org/rec/conf/cesar/Bobelin23
}}
==Zero Trust in the Context of IoT: Industrial Literature Review, Trends, and Challenges==
Zero Trust in the Context of IoT: Industrial Literature Review, Trends, and Challenges Laurent Bobelin1 1 INSA Centre Val de Loire, 88 boulevard Lahitolle 18000 Bourges, France Abstract The Zero-trust (ZT) model is an increasingly popular model that relies on the idea that no trust should be granted to any entity (network, persons, devices) by default. ZT model is gaining attention from both research and practice, with various levels of adequation between research developed and real-life applications. NIST provided a standard to fulfill requirements of ZT architecture of network core but many practical aspects remain unspecified, some of them requiring solving first research challenges in order to be implemented efficiently. An example of such an unspecified field is the integration of IoT/Smart Peripheral Devices (SPD). Various reasons explain this gap: specificities of such resources (possibly lower energy/computation power), their lifecycle, and their use, strongly depending on the use of the whole platform IoT devices are part of. Moreover, additional difficulty to have a good understanding is induced by the fact that both Zero Trust and IoT are identified as promising trends in cybersecurity: many vendors/researchers tag their solutions as IoT integration into the ZT model, with little to no effective compliance to ZT model or standard. Industry is providing many practice-oriented literature, that has to be compared to academic work and standards, in order to consolidate the current state of knowledge and solutions offered to realize this integration. In this paper, we conduct a literature review of non-academic publications, in order to consolidate current knowledge, trends, and future challenges for the industrial integration of IoT devices in ZT architecture. Keywords Zero Trust, IoT, survey, industry 1. Introduction Distributed systems security such as an enterprise or institutional network is usually based on network segmentation: the whole network is divided into different network segments where devices and users accessing it are supposed to have the same privileges. This model, sometimes referred to as the fortress model, has been efficient for securing organizations for decades: using firewalls, it provides efficient means to filter traffic and discard malicious traffic. Two major shifts in the way we use distributed systems revealed the drawbacks of this security model: remote access to resources (for telework for example) and the externalization of services through the use of externally provided resources (such as cloud resources). Indeed within a segment, anyone is implicitly granted the same trust. It means that any compromised resource within a segment is granted full access to this segment and so it can use any possible C&ESAR’23: Computer & Electronics Security Application Rendezvous, Nov. 21-22, 2023, Rennes, France Envelope-Open laurent.bobelin@insa-cvl.fr (L. Bobelin) Orcid 0000-0002-3268-4203 (L. Bobelin) © 2023 Copyright for this paper by its authors. Use permitted under Creative Commons License Attribution 4.0 International (CC BY 4.0). CEUR Workshop Proceedings http://ceur-ws.org ISSN 1613-0073 CEUR Workshop Proceedings (CEUR-WS.org) Proceedings of the 30th C&ESAR (2023) 37 CEUR ceur-ws.org Workshop ISSN 1613-0073 Proceedings Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... means to compromise other resources within the same segment. Remote access for telework then opens doors into privileged segments; on the other hand, hosting services using cloud resources gives the possibility for a compromised (malicious or honest but curious) provider to attack the service network segment. To enforce security in all those systems, Zero Trust Architecture is the solution progressively adopted by systems designer: it relies on the motto that no trust is implicitly given to any entity within the network (either devices, users, or services). Communication flows are allowed only if an entity, named Policy Decision Point (PDP), agrees to let this flow occur. This entity evaluates the confidence it can have in the different entities involved in a flow based on the knowledge it has about the user, device, and service involved. Zero Trust is not a standard tool, but a design motto: the term is then used by vendors to qualify solutions that respect more or less the recommendations to implement Zero Trust. However NIST standard [1] defines the building blocks for a static network, without a federation of identities, and relevant components to deploy. At the core of such an architecture, Trust Engine, Policy Engine, and Policy Enforcement Point, are respectively responsible for trust evaluation, deciding if a flow is authorized or not, and determining how to enforce the decisions. Decisions depend on various information sources and rely on modeling three key entities involved in the communication flow: (1) the user at the origin of communication, (2) the device from where the communication is originating, and (3) the targeted service. Machine to Machine communication breaks the assumption that the user can be identified as a source of vulnerability of the system. Moreover, modern distributed systems also include a wide variety of devices: IoT sensors and actuators, drones, autonomous vehicles (UAV), smartphones, and edge/cloud servers to name a few. Such systems dynamically evolve: moving devices may change location, and the infrastructure handles continuous flow routing between the moving device and the other entities that are part of the system. Well-known solutions to deal with mobility include 4G MME and 5G AMF, which both have proved their efficiency. But the security provided by those standards is not designed to fit in a Zero Trust architecture, as it relies on an implicit trust in the infrastructure. CISA and NSA provided jointly security guidance based on Zero Trust for the 5G cloud infrastructure[2], leaving the end devices case apart. When dealing with systems that include directly interacting with end-user devices, which may damage the other devices through malicious behavior, it may not be sufficient. This safety concern occurs in various systems, ranging from agricultural systems containing IoT actuators, drones, and autonomous tractors, to military systems. Vendors provide solutions to the main challenges induced by IoT-based systems, userless devices, short-lived low resources devices, and black-box devices. GAFAM such as Microsoft Azure [3], along with other major companies such as Zscaler [4] provides their own solutions, sometimes with little description of the actual enforcement provided, as well as to the respect of the ZT standard. On the other hand, just a few academic works are actually dedicated to overcoming the challenges of applying Zero Trust to systems integrating SPD. This paper aims to provide an industrial literature review of ongoing or recent work in this field. The rest of this paper is organized as follows: first, section 2 gives an overview of Zero Trust, and IoT specificities that strongly impact the implementation of ZT in such a context. Then in section 3, we give the challenges associated to such an implementation, and main trends of how vendors take into account those challenqes. In section 4, we give industrial actual solutions to 38 Proceedings of the 30th C&ESAR (2023) L. Bobelin overcome the listed challenges, and conclude in section 5. 2. Context 2.1. Zero Trust Zero Trust is a security model relying on the idea that perimeter-based security is inefficient when the so-called perimeter is breached; as nowadays attack campaigns are more and more common, it is likely that a user will compromise at least one of the resources enclosed within this perimeter, and by doing so, will compromise the whole system. It is then mandatory to never grant trust to other resources by default, which is the case in perimeter-based defense. Zero Trust model (ZT, also coined as Zero Trust Network (ZTN) or Zero Trust Network Architecture (ZTNA) or Zero Trust Architecture (ZTA)), relies on this simple motto ”Never Trust, Always Verify”. Since the seminal Google project BeyondCorp [5], the concept has been refined and nowadays can be considered as mature for the industry. NIST provided a recommended architecture [1], and introductory as well as advanced literature targeting administrators [6] [7] can easily be found. Most major actors in cybersecurity have developed their own solutions. We just briefly introduce the main concepts used later in this paper. Readers may refer to the NIST standard or to the books cited above for a more in-depth vision of ZT. The ZT model define guidelines to follow [6]: • All network flows MUST be authenticated before being processed. • All network flows SHOULD be encrypted before being transmitted. • Authentication and encryption MUST be performed by the endpoints in the network. • All network flows MUST be enumerated so that access can be enforced by the system. • The strongest authentication and encryption suites SHOULD be used within the network. • Authentication SHOULD NOT rely on public PKI providers. Private PKI systems should be used instead. • Devices SHOULD be regularly scanned, patched, and rotated. In order to comply to these guidelines, the NIST recommended the logical architecture depicted in figure 1. The standard identifies the issuer of the request as a subject that can be either a (human) user or an application/service. This subject uses a device to issue the request. This device may or may not be hosting an agent, part of the ZT architecture, that will secure the asset and information provided by this device. The request of access targets a protected resource (that may be thought of as data or service). Policy Enforcement Point (PEP) is often implemented as a gateway: it enforces decisions about whether or not to grant trust to a flow by the Policy Decision Point (PDP). The separation between PEP and PDP relies on the separation between control plane (that makes decisions on how to handle the traffic) and data plane, widely used in Software Defined Networking (SDN). PEP belongs to the data plane while PDP relies on the control plane. The PDP decision-making is done using as many data sources as possible, in order to make the wisest decision: information about the system state, the users, policies deployed, threat intelligence, etc. Proceedings of the 30th C&ESAR (2023) 39 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... Figure 1: Zero Trust Architecture PDP itself in NIST standard includes the Policy Engine (PE) component, which is the decision- making component, and the Policy Administration (PA) component, which is responsible for coordinating the actions of the PEP so as to reflect the decisions of the PE. Some authors and companies (see for instance [6]) adds a Trust Engine component (TE). TE is responsible for running a Trust Algorithm (TA), interacting with the different data sources to evaluate risk. PE in this case makes its decision based on the risk evaluation returned by TE and the policies applying to the system. It is then not responsible for evaluating the risk per se. Google ZT solution BeyondCorp has pioneered the use of TE: it helps to maintain a lower complexity of the system policy, by discarding edge cases and unknown/unaddressed cases. 2.2. Specificities of Smart Peripheral Devices With Major Impact on ZT Application of Zero Trust to SPD platforms is not straightforward, as it is thought first with the vision of an enterprise network; we here give a review of reasons why IoT use induces challenges for a ZT environment: which component are impacted by these features, how do they impact the different components of the ZT architecture. 2.2.1. Userless Devices Many SPD is userless. Implementations of Zero Trust most of the time rely on strong authenti- cation of the user using multi-factor authentication, thus ensuring that the user has access to, at least, a true device, and not a virtual clone. The combination of the trusts granted in both device and user gives a strong authentication, in the sense both user and device are ensuring a mutual authentication: user is guaranteeing that the device used looks genuine, and reciprocally the device guarantees possibly an authentication of user, that can be multi-factorial and/or biometrical. This mutual authentication adds guarantees to the safety of the flow request coming 40 Proceedings of the 30th C&ESAR (2023) L. Bobelin from these 2 entities. When no human/user is part of the process, it is then mandatory to use other means to ensure at least strong authentication. Strong authentication for these userless devices then may rely only on certificates and TPM, as it is done for server resource [8], but may suffer more frequently in the IoT context cloning or replay attacks if not implemented correctly. Low resource combined with possibly black-box devices increase the risk. A company [9] developed authenticators to deploy into TPM to increase the number of different authentication factors by the device, and by doing so, achieve MFA for IoT. However, deploying these solutions may be challenging for low-capability resources. Impact: Agent, PA and PEP are components strongly impacted by userless devices, as authentication process may require additional, specific measures (userless MFA for example). But as stated upper, the absence of user makes the authentication lower. Lower means of authentication induce that the trust score of those components may be lower compared to standard ones. This is impacting the Trust Engine, Moreover, trust score calculation methods based on user profiling and the request context are by definition not suited to this case. In case a TE is used, the risk evaluation may be done based on the correlation between observed behavior and the one from a digital twin. 2.2.2. Low Capability By nature, most of IoT devices have low resources (computation, memory, energy). This lack of resource induces low capability for those resources. Low capability of IoT devices may force to use lightweight encryption, which is opposite to the recommended encryption of ZT. It is also challenging, with low-capability devices, to store certificates, and provide TPM to ensure strong authentication. Impact: It impacts the agent implementation, as resources are scarce, and so means to audit the device may be limited. It also limits the possibilities given to the PA to define strong end-to-end enforcement between the IoT resource and the service, thus increasing the risk for the system to be compromised, and necessitates specific procedures from the PEP. 2.2.3. Brownfield Devices Most devices of IoT are provided with legacy software and components, with little to no support to deploy new software or devices. Such legacy devices are sometimes coined as brownfield devices, as opposed to greenfield devices that allow to deploy software and/or to rely on TPM. As strong authentication is mandatory and encryption is recommended in ZT, brownfield devices are complex to integrate in a ZT system. Impact: Brownfield devices often impede the implementation of an Agent to deploy on the devices. If agent implementation/deployment is impossible, solutions usually either isolate resources or make use of other sources of trust enforcement techniques in the component (such as digital twin, agentless scanning and asset discovery) or deploying a gateway component that will be responsible for this device. We will discuss in the next section the pro and cons of those solutions. Proceedings of the 30th C&ESAR (2023) 41 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... 2.2.4. Short-lived Devices Many type of IoT are by nature supposed to be short-lived. Mechanically, the cost of enrolling, maintaining and deploying an agent on those devices is high compared to more long-lived resources. The cost then may be prohibitive to use ZT in this context. Impact: Short-lived devices are one of the resources that fits well with the ZT vision, than includes certificate, possibly complex enrolment, constant monitoring to setup, and potentially long-term profiling of devices. Along with the induced cost of the handling of the shorter life cycle, several problem then may arise when it comes to profile such devices: the low complexity of behavior may make the digital twin inefficient. The massive turn-over of resource may challenge the scalability of the authentication and enrolment systems. Once again a solution that may be considered is the isolation of the resources from other parts of the systems with agentless scanning /asset discovery, with the pro and cons associated with this solution. 2.3. Mobility SPD includes cellular phones or other complex devices. 4G and 5G address the mobility problem by using either MME (4G) or AMF/network slicing (5G). Both approaches relies on the idea of a trusted network core/infrastructure, that has been recently questioned by the US ban (and possible ban in Europe) of Chinese 5G equipment manufacturers Huawei and ZTE [10]. Impact: The notion of mobility is not considered most of the time in the ZT solutions, as it is not in the ZT initial scope. Mobility impacts the whole chain of component in ZT, as it necessitates adequate authentication, interoperability between systems to achieve end-to-end security, knowledge sharing about access control, monitoring, trust between systems, and so on. 2.4. Heterogeneity Heterogeneity is one of the aspect of SPD/IoT systems: many sensors and actuators are specifi- cally designed for a given task, and so the diversity in IoT systems may be important. As it is a very active industry, there are a lot of vendors, that multiply the products and variants of them. Moreover, if resource are scarce in those devices, authentication and security implementation may be specifically implemented for a given product version, thus increasing the heterogeneity. Impact: Heterogeneity is multiplying the possible versions of agent in case of greenfield device, if no standard TPM is provided. In case of brownfield devices, heterogeneity is multiply- ing the authentication means and implementations. Apart from the increasing attack surface, it also complexify the quantification of trust one can give in authentication and encryption means provided by a given device. It is therefore complicated to write comprehensive policies for a system including a large variety of devices. This risk may be mitigated by the use of a Trust Engine based on Machine Learning, that may embrace automatically this complexity, at the cost of the learning phase that may leave the system relatively vulnerable, even in the case of non-zero day attacks. Combined with volatility, heterogeneity of devices may lessen the accuracy of ML/Deep Neural Network techniques deployed on TE. 42 Proceedings of the 30th C&ESAR (2023) L. Bobelin 3. Challenges and Industrial Solutions Proposed From the previously listed specificities, we derived the challenges listed below. After having briefly identified those challenges, we list solutions families proposed by the industry to respond those challenges. 3.1. Challenges • Agentless Solutions Brownfield IoT breaks the ZT assumption that one can deploy an Agent on the device, breaking the ZT architecture. The challenge here is to grant trust to a device, without fully being able to strongly verify its health, identity, and compromise. It is therefore mandatory, to include such IoT in a ZT system, either to isolate them or to provide agentless solution providing sufficient trust in those devices. Agentless solutions is particularly challenging for the PDP, as it question the way trust can be modeled. Without agent, one may grant lower trust to device and flows coming and outgoing from those devices. To do so, the ZT policy must reflect this lower trust, either by providing means to express this lower trust, or by the definition of restricted access groups for suspicious devices, for example. The core question about agentless solution in the ZT context is then the integration of agentless knowledge in the ZT trust evaluation process. • Heterogeneity of Trust in Devices Heterogeneity of devices themselves and their possibly low capabilities, combined with the different authentication and encryption capabilities, and the fact that some devices are userless or agentless, multiplies the trust level one can grant to a device: the different authentication means differs in the trust on can grant to. It therefore both complexifies the task of the Trust Engine, as well as the ZT system policy definition by administrators. A good balance must be found between the definition of particular cases definition in policies, increasing the policy complexity but providing clear explainability of the PDP decisions, and the trust the administrator must grant to TE evaluation, in case of use of an non-explainable ML/DNN-based TE. • Mobility Mobility is a challenge per se, that has been addressed by 4G/5G systems since their beginning. However, those systems relies on the assumption that the network core can be trusted, and that trust can be granted to the different systems where the end user may roam. This break the assumption that a central entity can monitor and secure the whole system, thus delegating the trust to other (possibly non ZT) systems. It then can be considered as a challenge in the way PDP can model and interact with external systems. • Interoperability Interoperability is a challenging issue in ZT, as interoperability requires that systems grant trust to others. For example, deploying a network component means to trust its provider [11]. In the case of IoT, one may want to federate heterogeneous agentless systems and/or solutions provided by an industrial to secure those systems. It can be compared to the problem of trust that the system has to grant to agentless devices, but for a whole, external system. • Volatility Heterogeneity combined with short-lived devices, constantly renewed, may lead to a volatility of devices, and then a fast turn over in the IoT device types. this may be an issue for PDP as well as PEP, the former necessitating fast update in policies in PE Proceedings of the 30th C&ESAR (2023) 43 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... and procedure in PA to adapt to new device types, and the latter necessitating updates in their capabilities to enforce end-to-end security for those devices. 3.2. Industrial Solutions Proposed To overcome these challenges, different solutions and tools have been implemented by vendors. some of them are in all (real) support offered, such as agentless scanning, asset discovery, or classic IoT defense. We give in the following sections an overview of the different types of solutions and tools proposed by industrials. 3.2.1. Agentless Scanning and Asset Discovery Agentless scanning involves the process of evaluating the security posture of IoT devices with- out requiring the installation of dedicated software agents on each device. Agentless scanning utilizes network-based techniques to identify, assess, and potentially remediate vulnerabilities, configuration weaknesses, or anomalies present in IoT devices. By leveraging existing network infrastructure and protocols, agentless is a scalable method to continuously monitor the secu- rity of IoT devices. This approach reduces the burden of managing and updating agents on numerous devices and can streamline vulnerability assessment and management processes in IoT ecosystems. This approach is particularly suited for the diverse and resource-constrained nature of IoT environments. While not offering the control of an agent-based approach, the approach relies on the maturity of such solution in the industry. The approach is supported by many vendors, combined with asset discovery. Asset discovery is the systematic process of identifying and cataloging all devices and re- sources within an IoT ecosystem. Given the sprawling nature and diversity of IoT deployments, in a ZT context, comprehensive asset discovery is essential for effective security management. This process involves actively scanning networks, probing for active devices, and gathering information about their characteristics, communication protocols, and associated metadata. Automated asset discovery tools play a pivotal role in identifying devices that might have been inadvertently added or forgotten, minimizing security blind spots of the ZT system. Asset discovery may be used as the foundation for establishing a robust ZT system. Integration into IoT and ZT system: As it is an existing solution for IoT security, the question is how these tools are integrated to the ZT system. It is mostly about (1) security enforcement by PEP/PA and (2) taking into account at the PDP/TE level the lower trust one can grant to agentless devices. While many vendors claim to offer the support for PEP/PA - that is, as the devices does not include agent, simply initiating communication flow with the strongest encryption offered by the IoT device - we did not find in industrial literature an explicit statement of lower trust granted to IoT systems just integrated using agentless scanning and asset discovery. This may be either let to the vendor’s client to write a specific policy for such devices, or supposedly under the TE responsibility to discard anomalous traffic coming from those devices. 44 Proceedings of the 30th C&ESAR (2023) L. Bobelin Figure 2: Brownfield device gateway 3.2.2. Digital Twins Digital twins are used to predict behavior, and by doing so, evaluate the potential abnormal behavior of a device. While further analysis may be mandatory to determine the root causes of the abnormal behavior, device twins are sometimes associated with quarantine groups that isolate potentially compromised devices. Some vendors may name it those device twins with different names (device shadows for example for AWS). In some configuration, the digital twin may be used as an information source replacing the agent, but with lower trust in the information provided. Integration into IoT and ZT system: Device twin is a trendy concept, not limiting its application scope to IoT systems. Integration into an IoT system is then quite easy, as the solution is quite mature. However, the same comment as for agentless scanning/asset discovery holds for digital twin, as we did not find any explicit statement of lower trust granted to those devices compared as other. 3.2.3. IoT Devices Isolation Some vendors actually leave the IoT devices outside de ZT-administrated zone, thus increasing the complexity of the operation of the system. As the shift from perimeter defense to ZT can be incremental by adding progressively the different network segments [6], this may be a solution for non-critical IoT sub-systems [12]. However, in many cyberphysical systems, IoT is the core critical systems. Integration into IoT and ZT system: This solution offers the simplest integration in both systems. Obviously this solution does not provide the security of an integration of IoT system into ZT. 3.2.4. Single Device Gateways Gateway is a solution provided by Azure to overcome the brownfield problem. The basic idea is to provide a hardware module responsible for WiFi communication that will either replace or isolate the actual communication module of the brownfield device. The module includes a TPM and an OS, and thus ensures complete compliance of the brownfield device to ZT requirements, as pictured in figure 2. The drawbacks of such an approach are numerous: it increases the attack surface, adds devices to the infrastructure, increases maintenance complexity, and increases energy consumption. Proceedings of the 30th C&ESAR (2023) 45 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... Moreover, it may be unfeasible to bypass the WiFi connection of an existing device, thus duplicating the attack surface of a device. Integration into IoT and ZT system: Integrating the device gateway into an existing IoT system may be cumbersome: devices have to be physically modified to include the gateway. However, as it can tunnel the direct communication in between devices, a reconfiguration of the IoT system may not be mandatory. On the ZT systems, the advantage of such an approach is that it offers a seemless integration of brownfield devices. 3.2.5. Greenfield-Oriented Software Many actors provide SDK in order to implement agents that will be deployed on (greenfield) devices. Most of them imply the support of a TPM and/or a TEE, that will provide support for strong authentication and certificate storage. Azure provides a specific OS (Azure Sphere), others like AWS often recommend the use of some OS (for example FreeRTOS [13]). Integration into IoT and ZT system: In the context of a volatile and heterogeneous IoT platform, the development cost of a dedicated agent may be high . Moreover, deployment may induce physical management of devices. On the ZT system side, it offers the possibility to integrate in the system easily, with the possible complexity induced by the heterogeneity of authentication and encryption methods offered by the devices. 3.3. Analysis As next section states, most actors, when providing solutions for IoT integration into ZT, use a combination of these solutions. Those approaches mainly address the data plane perspective of the problem, responding to the agentless challenge for the PEP and PA only. The challenge of volatility is addressed as non-ZT IoT systems respond it, by agentless scanning and asset discovery. The main question is the integration of the solutions provided, that comes from the IoT world, into the ZT system: modeling and handling different trust levels to grant to different information sources concerning devices, and including this into a consistent policy. The TA/TE/PDP problem of the heterogeneity of trust in devices is the same underlying problem common to interoperability, mobility: the modeling/handling of various level of trust to grant to different device types. It is most of the time omitted from the industrial literature, with the exception of quarantine groups in AWS solution, that allows to restrict access on a per device base, waiting for an administrator to either stop restriction or stop the attack. (Manual) policy definition may also allow the administrator to define such quarantine groups, at the expensive cost of administrator (non error-proof) work. It is unclear from many vendors documentation if this problem is ignored and let under the administrator responsibility, or if TE is supposed to be able to efficiently deal with it. In the case it is ignored, it means that there is an important work to do to take into account those challenge and enable mobility and interoperability of ZT+IoT systems. In the case this problem is supposed to be solved by TE, it questions its role: TE is supposed to marginally help the policy by discarding and managing blind spots in policies, not to handle a large part of the ZT security, where non-explainable automatic decisions may lead to instability of the system. 46 Proceedings of the 30th C&ESAR (2023) L. Bobelin Finally, implementing mobility and interoperability of ZT+IoT system may also require specific handling by the data plane ; interoperability between different ZT systems may require the adaptation to ZT mechanics used for the interoperability of security between different IoT system such as the one specified by the OneM2M framework [14]. 4. Overview of Main Industrial Solutions In this section we provide an analysis of the solutions of the 17 main actors we identified as possible providers of ZT+IoT solutions. After the description of our methodology to identify actors in section 4.1, we provide an overview of the different solution in section 4.2. We finally provide a short description of solutions for actors providing support for ZT+IoT in section 4.3, and list the actors not providing support for ZT+IoT in section 4.4. 4.1. Identification of Main Actors Zero Trust, as well as IoT, are both really active domains, both in terms of marketing and actual use. There is therefore a plethora of offers, with various credibility in terms of reality to their offers and effective compliance to ZT model and support for IoT. We used 4 search criteria to identify industrial actors: (1) Top actors in terms of revenue in cybersecurity (2) Major actors of Cloud-based hosting (3) GAFAM (4) Renowned actors in cybersecurity. We used 2023 ranking in terms of revenue to identify the 10 main actors in this domain [15], namely Microsoft Corporation, IBM, Cisco Systems, Inc., Oracle Corporation , Juniper Networks, Synopsys, Palo Alto Networks, McAfee, Fortinet, CyberArk. As of 2022 top 10 major cloud provisioners [16] includes Amazon Web Services (AWS), Microsoft Azure, Google Cloud Platform (GCP), Alibaba Cloud, Oracle Cloud, IBM Cloud (Kyndryl), Tencent Cloud, OVHcloud, DigitalOcean, and Linode (Akamai). Only the 4 firsts are providers with more than 5% of market share. Out of GAFAM only Facebook and Apple are not actors of cloud provisioning and are then discarded. This let us with the following 17 actors: Microsoft (Azure), IBM Cloud (Kyndryl), Oracle, Juniper, Synospsys, Palo Alto Networks, McAfee, Fortinet, CyberArk, AWS, Google (GCP, BeyondCorp), Alibaba Cloud, Tencent Cloud, OVHCloud, DigitalOcean, Linode (Akamai). We added to the list Zscaler, SentinelOne, and NetFoundry as renowned actors, based on the internet research we have done with the sentence Zero trust IoT. We give here an overview of solutions - when existing - of the actors in this list, and give a brief overview of what we found when the actors did not provide nowadays solutions to integrate IoT in ZT architecture. 4.2. Solutions Overview From our list, and despite the intensive communication, we found out that only 5 out of the 17 actors actually provide support for ZT+IoT, if we exclude guidelines and white papers. Those 5 actors are Azure, Palo Alto Networks, Fortinet, AWS and NetFoundry. Any of those 5 actors provide a common core features for IoT: agentless scanning and asset discovery. The level of integration of those standard IoT tools into ZT architecture is unclear in Proceedings of the 30th C&ESAR (2023) 47 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... most solution description. It is however explicitly stated in AWS documentation that there is some integration between the agentless scanning and the ZT security. Device twin is explicitly stated as a provided feature by all solutions except for Netfoundry. As well, AWS is the only product that mention integration of this feature in the ZT tools provided. Greenfield SDK is provided by Microsoft, AWS and NetFoundry. We did not find such tool for Fortinet, while Palo Alto white paper state explicitly their solutions is agentless. Finally, Azure is the only solution providing IoT hardware for both greenfield and brownfield devices. The most complete solution - in the sense it covers most of the use case - seems then to be Azure. However, from the description given by actors, AWS and Palo Alto seems to provide better integration of their ZT and IoT tools, as those actors both provide either hints and/or technical details about their integration. In general, while there is an addition of tools to manage either ZT or IoT, there is no emphasis - and sometimes no mention - on how those tools are integrated. It is unclear if those system simply coexists or does form a consistent system - with the exception of NetFoundry. NetFoundry is the only documentation that clearly integrates IoT and ZT tools, by providing means to coordinate greenfield SDK, brownfield agentless solutions, and ZT policies. 4.3. Actors Providing Support for IoT in a ZT Context 4.3.1. Azure Azure proposes a whole ecosystem, ranging from IoT hardware to Cloud services to provide ZT for IoT. In their white paper [3], the approach recommended is to start from an existing Cloud/Edge ZT-secured infrastructure relying on Azure tools, then evaluate which of your IoT devices belongs to greenfield/brownfield, and then deploy solutions based on their chipsets. Tools provided to implement Cloud/Edge Azure-based ZT IoT includes tools to manage your IoT devices, secure your communications and updates, and SIEM/SOAR. To secure the IoT devices, Azure proposes two different hardware: one dedicated to greenfield, called Azure Sphere, which is a hardware and OS relying on a TPM to manage strong trust in the device itself, and Azure Sphere Guardian, which is a hardware module to integrate on top of brownfield devices. The module acts as a gateway to connect the brownfield device to the network and includes both chipsets and OS to act like the greenfield devices. 4.3.2. Palo Alto Networks Palo Alto Networks is a cybersecurity enterprise, working for strategic organisms like DoD. They describe their support for IoT in ZT environment in a white paper [17]. They do so by providing tools to discover and assess risk, enforcing least (network) access, and continuous monitoring. Anomaly detection techniques include device twins. 4.3.3. Fortinet Fortinet [18] is a cybersecurity enterprise providing various solutions, including ZT [19]. Their solution brief claims to support IoT integration into ZT architecture, by providing using 48 Proceedings of the 30th C&ESAR (2023) L. Bobelin FortiNAC [20] for network access control, an agent solution named FortiClient, and usual tools for asset discovery and vulnerability detection. 4.3.4. AWS AWS IoT Core provides means to connect IoT to AWS Cloud, based on MQTT protocol. AWS approach does not include physical devices to secure IoT. It relies on the assumption that devices will be able to provide strong authentication using x509 certificates or other legacy means. AWS provides a client to interact with the AWS platform. AWS Device Defender is used to realize audit, and one can use device shadows to detect misbehavior from your device and/or synchronize the device state. Based on anomaly detection of behavior detected at AWS IoT Core using rules defined by the administrator, possibly compromised IoT devices can be put in a quarantine group with limited access to other resources. 4.3.5. NetFoundry NetFoundry [21] is a company developing both free, open source software as well as legacy one. They aim to provide Zero trust networking to a large set of devices and entities, from servers and services to IoT. Their support of IoT consists in providing SDK for greenfield devices and address the problem of brownfield devices by providing usual agentless scanning [22] and asset discovery. Their SDK relies on OpenZiti, a programmable network overlay and associated edge components for application-embedded, zero-trust networking [23]. Their solution differs significantly from other, as it provides a clear integration of IoT and ZT tools into a consistent framework. 4.4. Actors not Providing Support for IoT in ZT Context Beyond Corp Google designed its ZT tool suite, BeyondCorp [5], in a agentless manner, without the IoT use case in mind. While large SPD will be used seamlessly in BeyondCorp, there is little to no support for IoT. BeyondCorp design relies on the portal-based architecture [1] derived from ZT [24]. In BeyondCorp, HTTPS browser-based access to services is assumed; it is then not designed to handle machine-to-machine communications. IBM Cloud does not seem to offer solutions for ZT-IoT based system, while their research blog and web site do contain statements concerning the mandatory use of ZT in IoT context [25], [26]. Kyndril (IBM spin-off) does provide tools to secure SPD endpoints, based on asset discovery, agentless scanning, vulnerability detection [27]. Oracle Cloud is the solution offered by Oracle to achieve Zero Trust in their infrastructure. While providing guidelines on how to implement ZT in their infrastructure, they do not mention IoT in their white paper dedicated to IoT [28]. Juniper Network provides network, data center-oriented ZT solutions [29]; according to their website, they only support IoT protection using threat intelligence [30]. Synopsys, inc [31] is a company that focuses on silicon design and verification, silicon intellectual property, and software security. While they do promote the use of the ZT model and do provide secure IoT chips, it seems both activities are independent of each other. Proceedings of the 30th C&ESAR (2023) 49 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... McAfee [32] is a company well-known from the general public. They have announced they have developed their own ZT solution in 2021, and were at that time actually providing some IoT-related defense tools. Since 2021 they have been bought by Symphony Technology Group, and their activities dedicated to enterprise have been split in 2022 between Trellix and Skyhigh Security, the latter providing ZT solutions without mentioning IoT as part of their targeted platform [33]. It seems that their support has stopped. CyberArk [34] is a cybersecurity enterprise specializing in identity management. In their white paper about Zero Trust [35] they do not mention specific support for IoT. Alibaba Cloud offers both ZT guidelines [36] and IoT solutions [37], but the solutions are independent. OVHCloud offers ZT support [38] but does not mention IoT. DigitalOcean [39] relies on NetFoundry solutions [40] for Zero Trust. Akamai offers ZT guidelines [41] but do not provide ZT support. SentinelOne [42] is a company selling Machine Learning based cybersecurity. In their Zero Trust guidelines, they specify that IoT base should not be considered in the ZT system [12]. Zscaler [4] is a company selling a Zero Trust solution named Zero Trust Exchange [43]. While there are some hints about how their solution works, the architecture is not disclosed. They seem to have the same portal-based as the BeyondCorp solution. The only support we found for IoT is the ability to have remote privileged access to IoT based on roles. 5. Conclusion and Future Works In this paper, we gave an overview of the main industrial solutions to integrate Iot/SPD devices in ZT-secured systems. This work is actually a snapshot of the offered solutions in early 2023, and as the topic is quite active, solutions may evolve quickly. It appears that by now the support is really varying depending on the actors, ranging from no support to complete one, including the whole hardware and software chain. Most of the time, in the main actors list we considered, no support is offered for ZT for IoT, while most websites mention the importance of applying ZT principles to IoT. Future work will be to do an academic literature review on this topic; by now the domain is not intensively covered, but it is expected that the attention on Zero Trust rise drastically in the near future. Based on some preliminary academic paper reviews we have done, there is a significant gap between the actual solutions proposed by the industry and the research produced, both in terms of subjects that are considered challenging and in the actual integration of the work into a whole ecosystem. Acknowledgments This work was partially funded by MERIAVINO European project. We gratefully acknowledge ERA-NET ICTAGRI-FOOD, and national research agencies ANR, UEFISCDI, and GSRI for their support. 50 Proceedings of the 30th C&ESAR (2023) L. Bobelin References [1] S. Rose, O. Borchert, S. Mitchell, S. Connelly, Zero trust architecture, 2020. URL: https:// tsapps.nist.gov/publication/get_pdf.cfm?pub_id=930420. doi:https://doi.org/10.6028/ NIST.SP.800- 207 . [2] C. NSA, Security Guidance for 5G Cloud Infrastructures, Technical Re- port, CISA NSA, 2021. URL: https://www.cisa.gov/resources-tools/resources/ security-guidance-5g-cloud-infrastructures. [3] M. Azure, Zero trust cybersecurity for the internet of things, 2021. URL: https://azure.microsoft.com/mediahandler/files/resourcefiles/ zero-trust-cybersecurity-for-the-internet-of-things/Zero%20Trust%20Security% 20Whitepaper_4.30_3pm.pdf. [4] Zscaler, Zscaler website, 2023. URL: https://www.zscaler.com/. [5] Google, Beyondcorp, 2023. URL: https://cloud.google.com/beyondcorp. [6] G. Evan, B. Doug, Zero Trust Networks: Building Secure Systems in Untrusted Networks 1st Edition, O’Reilly, 2021. [7] T. A. of Service, Zero Trust Security A Complete Guide, Zero Trust Security Publishing, 2020. [8] F. Chabaud, Setting Hardware Root-of-Trust from Edge to Cloud, and How to Use it, in: [44], 2022, pp. 115–130. URL: http://ceur-ws.org/Vol-3329/paper-07.pdf. [9] Corsha, Corsha: Mfa for api, 2023. URL: https://corsha.com/. [10] L. Chadwick, Banning chinese companies huawei and zte from 5g networks ’justified’, eu says, 2023. URL: https://www.euronews.com/embed/2298228. [11] M. Compastié, S. Sisinni, S. Gurung, C. Fernández, L. Jacquin, I. Mlakar, V. Šafran, A. Lioy, I. Pedone, PALANTIR: Zero-Trust Architecture for Managed Security Service Provider, in: [44], 2022, pp. 83–98. URL: http://ceur-ws.org/Vol-3329/paper-05.pdf. [12] SentinelOne, Moving to an endpoint-centric zero trust security model with sentinelone, 2022. URL: https://assets.sentinelone.com/zero-trust-security/zero-trust-security-model# page=1. [13] FreeRTOS, Freertos, 2023. URL: https://www.freertos.org/. [14] O. security group, OneM2M Security Solutions, Technical Report, ONEM2M, 2023. URL: https://onem2m.org/technical/published-specifications/release-4. [15] E. Research, Top 10 leading cybersecurity companies in the world, 2023. URL: https://www. emergenresearch.com/blog/top-10-leading-cybersecurity-companies-in-the-world. [16] D. Infra, Top 10 cloud service providers, 2022. URL: https://dgtlinfra.com/ top-10-cloud-service-providers-2022/. [17] PaloAlto, The right approach to zero trust security for enterprise iot devices, 2022. URL: https://www.paloaltonetworks.com/resources/whitepapers/right-approach-zero-trust-iot. [18] Fortinet, Fortinet, 2023. URL: https://www.fortinet.com/. [19] Fortinet, Zero-trust access for comprehensive visibility and control, 2023. URL: https://www.fortinet.com/content/dam/fortinet/assets/solution-guides/ sb-zero-trust-network-access-for-visibility-and-control.pdf. [20] F. Network-Access-Control, Fortinac, 2023. URL: https://www.fortinet.com/products/ network-access-control. Proceedings of the 30th C&ESAR (2023) 51 Zero Trust in the Context of IoT: Industrial Literature Review, Trends, a... [21] NetFoundry, Netfoundry website, 2023. URL: https://netfoundry.io/. [22] NetFoundry, Simple, secure iot networking, 2023. URL: https://netfoundry.io/ iot-zero-trust-networking/. [23] OpenZiti, Openziti on github, 2023. URL: https://github.com/openziti. [24] R. Ward, B. Beyer, Beyondcorp: A new approach to enterprise security, USENIX Vol. 39, No. 6 (2014) 6–11. [25] I. security intelligence, Bringing it all back home: Why you should apply enterprise network security policies to your smart home, 2023. URL: https://securityintelligence.com/ bringing-it-all-back-home-why-you-should-apply-enterprise-network-security-policies-to-your-smart-home/ [26] I. web site, The evolution of zero trust and the frameworks that guide it, 2023. URL: https:// www.ibm.com/cloud/blog/the-evolution-of-zero-trust-and-the-frameworks-that-guide-it. [27] K. web site, Zero trust solutions, 2023. URL: https://www.kyndryl.com/us/en/services/ cyber-resilience/zero-trust. [28] K. G. Paul Toal, Approaching zero trust security with oracle cloud infrastructure, 2022. URL: https://www.oracle.com/a/ocom/docs/whitepaper-zero-trust-security-oci.pdf. [29] Juniper, Juniper zero trust data center, 2023. URL: https://www.juniper.net/us/en/solutions/ data-center/secure-data-center.html. [30] Juniper, Juniper advanced threat prevention, 2023. URL: https://www.juniper.net/us/en/ products/security/advanced-threat-prevention.html. [31] Synopsys, Synopsys website, 2023. URL: https://www.synopsys.com/. [32] McAfee, Mcafee website, 2023. URL: https://www.mcafee.com/. [33] Skyhigh, Skyhigh security private access, 2023. URL: https://www.skyhighsecurity.com/ wp-content/uploads/2023/01/sb-private-access.pdf. [34] CyberArk, Cyberark website, 2023. URL: https://www.cyberark.com/. [35] cyberark, The ciso view: Protecting privileged access in a zero trust model, 2022. URL: https://www.cyberark.com/resources/white-papers/ the-ciso-view-protecting-privileged-access-in-a-zero-trust-model. [36] A. Cloud, Overview of zero trust security, 2022. URL: https://www.alibabacloud.com/help/ en/alibaba-cloud-service-mesh/latest/zerotrustsecurityoverview. [37] A. Cloud, Iot solution, 2023. URL: https://www.alibabacloud.com/solutions/IoT. [38] OVH, Sddc advanced security pack, 2023. URL: https://www.ovhcloud.com/en-gb/ enterprise/products/hosted-private-cloud/safety-compliance/sddc/. [39] DigitalOcean, Digitalocean, 2023. URL: https://www.digitalocean.com/. [40] DigitalOcean, Digitalocean network tools, 2023. URL: https://docs.digitalocean.com/ products/marketplace/categories/network-tools/. [41] Akamai, Zero trust security model, Our thinking blog, 2023. URL: https://www.akamai. com/our-thinking/zero-trust/zero-trust-security-model. [42] SentinelOne, Sentinelone website, 2023. URL: https://www.sentinelone.com/. [43] Zscaler, The zero trust exchange – the only road to zero trust, Zscaler Blog, 2023. URL: https: //www.zscaler.com/blogs/product-insights/zero-trust-exchange-only-road-zero-trust. [44] G. Le Guernic (Ed.), Proceedings of the 29th Computer & Electronics Security Application Rendezvous (C&ESAR): Ensuring Trust in a Decentralized World, number 3329 in CEUR Workshop Proceedings, Aachen, 2022. URL: http://ceur-ws.org/Vol-3329/. 52 Proceedings of the 30th C&ESAR (2023)