Back to blog
ISO 27001 and IoT security in business environment, network-connected devices and risk management
iso-27001

ISO 27001 and IoT: Security in Practice

Ilkka Sillanpää
Ilkka SillanpääCEO
Published on March 29, 2026

Companies are adopting more and more IoT devices: cameras, sensors, access control, production meters, and smart building systems. The benefits are clear, but at the same time, the risk grows that devices appear on the network without being managed as rigorously as servers or workstations. This is exactly where many SMEs notice a problem: there are many devices, responsibilities are unclear, and security practices remain incomplete.

In this article, we will go through what ISO 27001 means in an IoT environment, the most common risks, and how you can proceed practically toward compliant operations. You will also get a clear roadmap for integrating IoT security into your company’s management system, rather than treating it as a disconnected technical project.

Why is IoT a special case from the ISO 27001 perspective?

IoT devices—connected to the internet or internal network—differ from traditional IT devices in one important way: they are often purchased to meet business needs, not through IT management processes. As a result, devices may enter the network with default passwords unchanged, outdated software versions, or without any logging at all.

ISO 27001 does not list specific IoT devices that must be protected in a certain way. Instead, the standard requires organizations to identify risks, define controls, and demonstrate systematic management. In practice, this means that IoT devices fall under the same security management as other data assets and systems.

In an IoT environment, you should check at least these basics:

  • Is there an up-to-date inventory of all network-connected devices?
  • Is ownership and maintenance responsibility clearly identified for each device?
  • Are default credentials changed before deploying devices?
  • Is the device firmware updated regularly, for example, within 30 days of a critical update?
  • Are IoT devices segregated into their own network segment or VLAN?
  • Are event logs retained for at least 90 days?

Note

ISO 27001 is not just an IT department standard. If IoT devices are acquired by the facilities team, production, or business units, their risks and responsibilities must also be integrated into the same management model.

Which IoT risks are emphasized in SMEs?

In SMEs, the problem often isn’t lack of technology but lack of control. There may be only 20–200 devices, but even that can make management complex if processes are missing. A single unmonitored camera or sensor with remote access can open a path for attackers into the internal network.

Typical IoT risks can be grouped into five categories:

RiskPractical ExampleBusiness ImpactRecommended Metric
Poor authenticationDefault password remains activeUnauthorized access to device or network100% of devices without default credentials
Missing updatesFirmware not updated for a yearKnown vulnerability remains openCritical updates within 30 days
Unclear ownershipNobody knows who is responsible for the deviceIncident handling and removals delayed100% devices with assigned owner
Inadequate network segmentationCamera on same network as finance systemsEasier lateral movement for attackers0 critical IoT devices on office network
Lack of lifecycle managementDecommissioned device remains connectedUnnecessary attack surface growsCredentials and connections removed within 24 hours of removal

When conducting risk assessment, don’t try to evaluate everything at once. Often, it suffices to identify 3–5 key risks per IoT category. For example, access control, video surveillance, and production sensors should be handled as separate categories because their impacts and requirements differ.

What does ISO 27001 practically require from an IoT environment?

A management system essentially means security is governed by agreed procedures, responsibilities, metrics, and continuous improvement. For IoT, this especially appears in asset management, risk management, access control, change management, and vendor management.

If your company uses IoT devices, these areas should be clearly described:

  • Scope: which IoT devices, networks, locations, and services are included
  • Asset inventory: what devices exist, where they are located, and what data they process
  • Responsibilities: who acquires, approves, maintains, and decommissions devices
  • Risk management: how risks are assessed and when reassessed
  • Access rights: who is authorized to manage devices and how rights are revoked
  • Vendor management: vendor or maintenance partner requirements
  • Incident management: procedures if a device behaves anomalously or is attacked

Many ask if heavy documentation is needed for each sensor. It isn’t. More important is a unified model. For example, temperature sensors from the same manufacturer can be handled as one device class if their purpose, risks, and controls are the same.

Tip

Start with one IoT category, such as cameras or access control devices. Once you have an owner, risks, update model, and removal process established for one category, it’s easy to replicate the model to other devices.

Vendors matter more than many realize

IoT security isn’t just about internal settings. Often, devices involve cloud services, mobile apps, remote maintenance, or external installation partners. That’s why vendor management is a critical part of ISO 27001 compliance.

Ask vendors at a minimum these questions before purchase:

  • How long will security updates be supported, e.g., 3 years or 5 years?
  • Can default credentials be changed and does the device support strong authentication?
  • Where is the data collected by the device stored?
  • Is remote access mandatory or can it be restricted?
  • Can logs be exported to centralized monitoring?
  • How are vulnerabilities reported to customers?

If a vendor cannot answer these basic questions, it indicates a genuine security risk, not just an unclear purchase. A poor vendor choice may lock your company into a device that can’t be updated, monitored, or safely removed.

Vendor CriteriaMinimum LevelGood LevelExcellent Level
Update support12 months36 months60 months
AuthenticationPassword change possibleRole-based credentialsMulti-factor authentication
LoggingBasic device loggingCentralized log exportReal-time monitoring integration
Remote maintenanceAlways onRestrictable by IPOn-demand, logged connection
Data locationNo precise infoEU/EEA locationContractually defined and auditable

How to proceed toward ISO 27001 compliant IoT security

Make IoT devices visible

Collect an inventory of all network-connected IoT devices over 2–4 weeks. Record at least device name, location, owner, network connection, vendor, and purpose. If you don’t know what’s on the network, you cannot manage risks or demonstrate compliance.

Assess risks by device category

Group devices into categories such as cameras, sensors, access control, and production devices. Identify 3–5 key risks per category and score them on impact and likelihood on a scale of 1–5. Then select controls only for the most significant risks to keep work manageable.

Define minimum requirements for deployment

Create a short checklist to follow for each new IoT device. The list should include at least changing default passwords, network segmentation, removing unnecessary services, activating logging, and verifying update status before production use. The goal is 100% of new devices follow the same approval process.

Establish a clear maintenance rhythm

Schedule monthly or at least quarterly reviews to check updates, exceptions, and devices to be decommissioned. A good practical goal is to address critical vulnerabilities within 30 days, and close credentials and network access of decommissioned devices within 24 hours.

Integrate IoT into your ISO 27001 management system

Document responsibilities, risks, controls, and metrics consistently with other security domains. When IoT appears in management reviews, internal audits, and incident handling, it becomes a controlled part of the overall system rather than an isolated technical silo.

Common mistakes slowing progress

The biggest mistake is thinking IoT is just a technical installation project. In reality, problems often emerge after deployment: devices aren’t updated, credentials aren’t removed during personnel changes, and vendor remote access remains permanently open.

Avoid especially these mistakes:

  • Devices are acquired without security approval
  • The same maintenance account is used by multiple vendors
  • IoT devices are placed on the same network as workstations
  • Decommissioned devices remain powered and connected for months
  • Documentation is done only for audit purposes and not used in daily operations

Warning

A common pitfall is copying ISO 27001 controls onto paper without linking them to actual devices, responsibilities, and deadlines. During audit, what matters is demonstrating practical implementation—not just general policy.

How to measure success?

Without metrics, IoT security easily relies on intuition. SMEs often benefit from a small but consistent set of metrics, reviewed monthly or quarterly.

A good starter package includes these metrics:

MetricTarget LevelReview Frequency
Inventoried IoT devices of total assessed95–100%Monthly
Devices with named owner100%Monthly
Critical updates within deadline90%+Monthly
Credentials revocation for decommissioned devices24 hAs needed
Incident resolution time1–5 working days depending on severityMonthly

If your company already has an ISO 9001 or other management system, align these metrics with your existing review cycle. This simplifies daily operations and reduces siloed processes. Tietoturvapankki helps precisely here: combining requirements, documentation, and practical execution into a single controlled whole.

A unified approach also eases work across corporate groups and partner environments. Solutions developed by Softapankki Oy and QMClouds Oy reflect this broader vision: Laatupankki — the product brand for corporate quality management systems — supports practical implementations, and in information security the same systematics help embed ISO 27001 into everyday practice.

Summary

  • IoT devices must be brought under the same management system scope as other IT to ensure risks, responsibilities, and controls are managed.
  • Start with visibility: inventory devices, assign owners, and identify 3–5 key risks per device category.
  • Define clear minimum requirements such as removing default credentials, network segmentation, and critical updates within 30 days.
  • Measure success concretely, for example by ownership coverage, update compliance, and credential removal within 24 hours.
  • ISO 27001 compliant IoT security isn’t created on paper but through repeatable practices that are continuously monitored and improved.

Need help with information security management?

Our experts are here to assist you.

Get in touch