{"id":20701,"date":"2017-12-20T16:46:21","date_gmt":"2017-12-21T00:46:21","guid":{"rendered":"https:\/\/www.rambus.com\/?page_id=20701"},"modified":"2020-03-05T13:39:15","modified_gmt":"2020-03-05T21:39:15","slug":"industrial-iot","status":"publish","type":"page","link":"https:\/\/www.rambus.com\/iot\/industrial-iot\/","title":{"rendered":"Industrial IoT: Threats and Countermeasures"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"20701\" class=\"elementor elementor-20701\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-83cd005 elementor-section-stretched elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"83cd005\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ff26ca2\" data-id=\"ff26ca2\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bdb6016 elementor-widget elementor-widget-breadcrumbs\" data-id=\"bdb6016\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"breadcrumbs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p id=\"breadcrumbs\"><span><span><a href=\"https:\/\/www.rambus.com\/\">Home<\/a><\/span><\/span><\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-6ce3e2a elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6ce3e2a\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b19c248\" data-id=\"b19c248\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b051d2e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b051d2e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-7f1f190\" data-id=\"7f1f190\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-757b32c elementor-widget elementor-widget-text-editor\" data-id=\"757b32c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1>Industrial IoT: Threats and Countermeasures<\/h1><p>Industrial Internet of Things (IIoT) systems are improving service delivery and increasing productivity across a broad range of industries from manufacturing to health care. But as with anything connected to the internet, IIoT devices are subject to cyber threats. These include attacks on industrial control systems (ICS) such as distributed control systems (DCS), programmable logic controllers (PLC), supervisory control and data acquisition (SCADA) systems, and human machine interfaces (HMI). The adoption of increasingly powerful and complex IP-based devices, including the use of sophisticated microprocessors, comes with growing risk. Specific cyber-attacks aimed at IIoT infrastructure could include:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-fd222df elementor-widget elementor-widget-image\" data-id=\"fd222df\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-1024x576.png\" class=\"attachment-large size-large wp-image-21596\" alt=\"Industrial IoT Threats and Countermeasures\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-1024x576.png 1024w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-150x84.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-300x169.png 300w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-768x432.png 768w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-200x113.png 200w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-400x225.png 400w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-600x338.png 600w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-800x450.png 800w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures.png 1040w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-03c1d0f elementor-widget elementor-widget-text-editor\" data-id=\"03c1d0f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Man-in-the-middle<\/strong>: An attacker breaches, interrupts or spoofs communications between two systems. In an IIoT scenario, an attacker could assume control of a smart actuator and knock an industrial robot out of its designated lane and speed limit \u2013 potentially damaging an assembly line or injuring operators.<\/p><p><strong>Device hijacking<\/strong>: The attacker hijacks and effectively assumes control of a device. These attacks are quite difficult to detect because the attacker does not change the basic functionality of the device. Moreover, it only takes one device to potentially re-infect others, for example, smart meters connected to a grid. In an IIoT scenario, a hijacker could assume control of a smart meter and use the compromised device to launch ransomware attacks against Energy Management Systems (EMSs) or illegally siphon unmetered power lines.<\/p><p><strong>Distributed Denial of Service (DDoS)<\/strong>: A denial-of-service attack (DoS attack) attempts to render a machine or network resource unavailable to its intended users by temporarily or indefinitely disrupting services of a host connected to the Internet. In the case of a distributed denial-of-service attack (DDoS), incoming traffic flooding a target originates from multiple sources, making it difficult to stop the cyber offensive by simply blocking a single source. DoS and DDoS attacks can negatively affect a wide range IIoT applications, causing serious disruptions for utility services and manufacturing facilities.<\/p><p><strong>Permanent Denial of Service (PDoS)<\/strong>: Permanent denial-of-service attacks (PDoS), also known as phlashing, is an attack that damages the device so badly that it requires replacement or reinstallation of hardware. BrickerBot, coded to exploit hard-coded passwords in IoT devices and cause permanent denial of service, is one such example of malware that could be used to disable critical equipment on a factory floor, in a wastewater treatment plant, or in an electrical substation.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-76a2d01 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"76a2d01\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7792c6a\" data-id=\"7792c6a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d458165 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d458165\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-182fba7\" data-id=\"182fba7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-b5c008f elementor-widget elementor-widget-text-editor\" data-id=\"b5c008f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Securing the Industrial IoT<\/h2><p>IIoT infrastructure should be protected by a comprehensive set of security solutions that do not disrupt operations, service reliability or profitability. A practical and simple, yet secure solution that can be easily and widely adopted by IIoT device makers and their customers is more effective than a \u2018super solution\u2019 that fails to gain serious traction. Security solutions should include the following capabilities:<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-cc5e6c8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc5e6c8\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-d8f76a6\" data-id=\"d8f76a6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-133e320 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"133e320\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-89a521a\" data-id=\"89a521a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-32e8fa8\" data-id=\"32e8fa8\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-bde677e elementor-widget elementor-widget-image\" data-id=\"bde677e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot.png\" class=\"attachment-large size-large wp-image-20855\" alt=\"Firmware integrity and secure boot icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/firmware-integrity-and-secure-boot-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-c946188\" data-id=\"c946188\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-952b60d elementor-widget elementor-widget-text-editor\" data-id=\"952b60d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Firmware integrity and secure boot<\/span><\/h3>\nSecure boot utilizes cryptographic code signing techniques, ensuring that a device only executes code generated by the device OEM or another trusted party. Use of secure boot technology prevents hackers from replacing firmware with malicious instruction sets, thereby preventing attacks. Unfortunately, not all IIoT chipsets are equipped with secure boot capabilities. In such a scenario, it is important to ensure that IIoT devices can only communicate with authorized services to avoid the risk of replacing firmware with malicious instruction sets.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-1360db9\" data-id=\"1360db9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-c1b2017 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c1b2017\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-f800b25\" data-id=\"f800b25\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-7aacc78\" data-id=\"7aacc78\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-ba093f9 elementor-widget elementor-widget-image\" data-id=\"ba093f9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication.png\" class=\"attachment-large size-large wp-image-20856\" alt=\"Mutual authentication icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/mutual-authentication-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-467e061\" data-id=\"467e061\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-12c8bef elementor-widget elementor-widget-text-editor\" data-id=\"12c8bef\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Mutual authentication<\/span><\/h3><p>Every time a smart actuator in the manufacturing floor connects to the network it should be authenticated prior to receiving or transmitting data. This ensures that the data originates from a legitimate device and not a fraudulent source. Secure, mutual authentication\u2014where two entities (device and service) must prove their identity to each other\u2014helps protect against malicious attacks. Cryptographic algorithms involving symmetric keys or asymmetric keys can be utilized for two-way authentication. For example, the Secure Hash Algorithm (SHA-x) along with hash-based message authenticated code (HMAC) can be used for symmetric keys and Elliptic Curve Digital Signature Algorithm (ECDSA) for asymmetric keys.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-0caae97\" data-id=\"0caae97\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-d8936a4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d8936a4\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-98a47f6\" data-id=\"98a47f6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-bf4cac0\" data-id=\"bf4cac0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6547c08 elementor-widget elementor-widget-image\" data-id=\"6547c08\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication.png\" class=\"attachment-large size-large wp-image-20858\" alt=\"Secure communication icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/secure-communication-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d5eb4c1\" data-id=\"d5eb4c1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-dd6bc92 elementor-widget elementor-widget-text-editor\" data-id=\"dd6bc92\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Secure communication (end-to-end encryption)<\/span><\/h3>\nSecure communication capabilities protect data in transit between a device and its service infrastructure (the cloud). Encryption ensures that only those with a secret decryption key can access transmitted data. For example, a smart actuator that sends usage data to the SCADA must be able to protect information from digital eavesdropping.\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-351fc2d\" data-id=\"351fc2d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-0934236 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"0934236\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-d108906\" data-id=\"d108906\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-cb2821f\" data-id=\"cb2821f\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-0fcb3fb elementor-widget elementor-widget-image\" data-id=\"0fcb3fb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis.png\" class=\"attachment-large size-large wp-image-20857\" alt=\"Security monitoring and analysis\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/01\/security-monitoring-_and-analysis-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-edb489a\" data-id=\"edb489a\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-86432a2 elementor-widget elementor-widget-text-editor\" data-id=\"86432a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Security monitoring and analysis<\/span><\/h3><p>Security monitoring captures data on the overall state of an industrial system, including endpoint devices and connectivity traffic. Data is then analyzed to detect possible security violations or potential system threats. Once detected, a broad range of actions formulated in the context of an overall system security policy should be executed, such as revoking device credentials or quarantining an IoT device based on anomalous behavior. This automatic monitor-analyze-act cycle may execute in real time or at a later date to identify usage patterns and detect potential attack scenarios. It is critical to ensure that endpoints devices are secured from possible tampering and data manipulation, which could result in the incorrect reporting of events.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-a5fd9e1\" data-id=\"a5fd9e1\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-25255e1 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"25255e1\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-2dc8ed6\" data-id=\"2dc8ed6\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-22af6c4\" data-id=\"22af6c4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e4449fa elementor-widget elementor-widget-image\" data-id=\"e4449fa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"160\" height=\"160\" src=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management.png\" class=\"attachment-large size-large wp-image-20305\" alt=\"Security Lifecycle Management icon\" srcset=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management.png 160w, https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management-150x150.png 150w, https:\/\/www.rambus.com\/wp-content\/uploads\/2015\/08\/security-lifecycle-management-66x66.png 66w\" sizes=\"(max-width: 160px) 100vw, 160px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-daa191c\" data-id=\"daa191c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2f0a026 elementor-widget elementor-widget-text-editor\" data-id=\"2f0a026\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h3><span style=\"font-weight: normal;\">Security lifecycle management<\/span><\/h3><p>The lifecycle management feature allows service providers and OEMs to control the security aspects of IoT devices when in operation. Rapid over the air (OTA) device key(s) replacement during cyber disaster recovery ensures minimal service disruption. In addition, secure device decommissioning ensures that scrapped devices will not be repurposed and exploited to connect to a service without authorization.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-25 elementor-inner-column elementor-element elementor-element-499d35c\" data-id=\"499d35c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-f7538eb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"f7538eb\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1458eb0\" data-id=\"1458eb0\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-6f8d429 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6f8d429\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-inner-column elementor-element elementor-element-dc74bae\" data-id=\"dc74bae\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-e8de40f elementor-widget elementor-widget-text-editor\" data-id=\"e8de40f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>Rambus Security Solutions for Industrial IoT<\/h2><p>Rambus offers a comprehensive suite of security solutions for safeguarding the chips and devices critical to IIoT. These include:<\/p><p><a href=\"https:\/\/www.rambus.com\/security\/root-of-trust\/\">Root of Trust<\/a> solutions provide the hardware-level foundation for security enabling functions such as secure boot, secure execution of applications, tamper detection and protection, and secure storage and handling of keys.<\/p><p><a href=\"https:\/\/www.rambus.com\/security\/protocol-engines\/\">Protocol Engines<\/a> secure network communications between IIOT devices and the cloud without altering the traffic. They enable secure end-to-end communications while maintaining vital network performance.<\/p><p><a href=\"https:\/\/www.rambus.com\/security\/provisioning-and-key-management\/\">Provisioning and Key Management<\/a> secure supply chain solutions for chip and IIoT device manufacturers enable secure key insertion and cloud-based device key management services.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>The Rambus CryptoManager IoT Security Service is a turnkey solution for Industrial IoT service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).<\/p>\n","protected":false},"author":6,"featured_media":0,"parent":15280,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-full.php","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"tags":[],"class_list":{"0":"post-20701","1":"page","2":"type-page","3":"status-publish","5":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.9 (Yoast SEO v26.9) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Industrial IoT: Threats and Countermeasures - Rambus<\/title>\n<meta name=\"description\" content=\"Industrial Internet of Things (IIoT) systems are improving service delivery and increasing productivity across a broad range of industries from manufacturing to health care. But as with anything connected to the internet, IIoT devices are subject to cyber threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.rambus.com\/iot\/industrial-iot\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Industrial IoT: Threats and Countermeasures\" \/>\n<meta property=\"og:description\" content=\"The Rambus CryptoManager IoT Security Service is a turnkey solution for Industrial IoT service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.rambus.com\/iot\/industrial-iot\/\" \/>\n<meta property=\"og:site_name\" content=\"Rambus\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/RambusInc\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-05T21:39:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-1024x576.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@rambusinc\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/\",\"url\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/\",\"name\":\"Industrial IoT: Threats and Countermeasures - Rambus\",\"isPartOf\":{\"@id\":\"https:\/\/www.rambus.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-1024x576.png\",\"datePublished\":\"2017-12-21T00:46:21+00:00\",\"dateModified\":\"2020-03-05T21:39:15+00:00\",\"description\":\"Industrial Internet of Things (IIoT) systems are improving service delivery and increasing productivity across a broad range of industries from manufacturing to health care. But as with anything connected to the internet, IIoT devices are subject to cyber threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.rambus.com\/iot\/industrial-iot\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/#primaryimage\",\"url\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures.png\",\"contentUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures.png\",\"width\":1040,\"height\":585,\"caption\":\"Industrial IoT Threats and Countermeasures\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.rambus.com\/iot\/industrial-iot\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.rambus.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"IoT\",\"item\":\"https:\/\/www.rambus.com\/iot\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Industrial IoT: Threats and Countermeasures\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.rambus.com\/#website\",\"url\":\"https:\/\/www.rambus.com\/\",\"name\":\"Rambus\",\"description\":\"At Rambus, we create cutting-edge semiconductor and IP products, providing industry-leading chips and silicon IP to make data faster and safer.\",\"publisher\":{\"@id\":\"https:\/\/www.rambus.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.rambus.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.rambus.com\/#organization\",\"name\":\"Rambus\",\"url\":\"https:\/\/www.rambus.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png\",\"contentUrl\":\"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png\",\"width\":200,\"height\":62,\"caption\":\"Rambus\"},\"image\":{\"@id\":\"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/RambusInc\",\"https:\/\/x.com\/rambusinc\",\"https:\/\/www.linkedin.com\/company\/rambus\",\"https:\/\/www.youtube.com\/user\/RambusWeb\"],\"description\":\"Rambus is a provider of industry-leading chips and silicon IP.\",\"email\":\"ebiz@rambus.com\",\"telephone\":\"+1-408-462-8000\",\"legalName\":\"Rambus Inc.\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"501\",\"maxValue\":\"1000\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Industrial IoT: Threats and Countermeasures - Rambus","description":"Industrial Internet of Things (IIoT) systems are improving service delivery and increasing productivity across a broad range of industries from manufacturing to health care. But as with anything connected to the internet, IIoT devices are subject to cyber threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.rambus.com\/iot\/industrial-iot\/","og_locale":"en_US","og_type":"article","og_title":"Industrial IoT: Threats and Countermeasures","og_description":"The Rambus CryptoManager IoT Security Service is a turnkey solution for Industrial IoT service providers and OEMs. Our one-stop-shop solution provides seamless device-to-cloud secure connectivity, device lifecycle management, and advanced device monitoring capabilities to protect service high-availability and help mitigate a variety of attacks including distributed denial of service (DDoS).","og_url":"https:\/\/www.rambus.com\/iot\/industrial-iot\/","og_site_name":"Rambus","article_publisher":"https:\/\/www.facebook.com\/RambusInc","article_modified_time":"2020-03-05T21:39:15+00:00","og_image":[{"url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-1024x576.png","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_site":"@rambusinc","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.rambus.com\/iot\/industrial-iot\/","url":"https:\/\/www.rambus.com\/iot\/industrial-iot\/","name":"Industrial IoT: Threats and Countermeasures - Rambus","isPartOf":{"@id":"https:\/\/www.rambus.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.rambus.com\/iot\/industrial-iot\/#primaryimage"},"image":{"@id":"https:\/\/www.rambus.com\/iot\/industrial-iot\/#primaryimage"},"thumbnailUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures-1024x576.png","datePublished":"2017-12-21T00:46:21+00:00","dateModified":"2020-03-05T21:39:15+00:00","description":"Industrial Internet of Things (IIoT) systems are improving service delivery and increasing productivity across a broad range of industries from manufacturing to health care. But as with anything connected to the internet, IIoT devices are subject to cyber threats.","breadcrumb":{"@id":"https:\/\/www.rambus.com\/iot\/industrial-iot\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.rambus.com\/iot\/industrial-iot\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rambus.com\/iot\/industrial-iot\/#primaryimage","url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures.png","contentUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2018\/08\/IIoT-Threats-and-Countermeasures.png","width":1040,"height":585,"caption":"Industrial IoT Threats and Countermeasures"},{"@type":"BreadcrumbList","@id":"https:\/\/www.rambus.com\/iot\/industrial-iot\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.rambus.com\/"},{"@type":"ListItem","position":2,"name":"IoT","item":"https:\/\/www.rambus.com\/iot\/"},{"@type":"ListItem","position":3,"name":"Industrial IoT: Threats and Countermeasures"}]},{"@type":"WebSite","@id":"https:\/\/www.rambus.com\/#website","url":"https:\/\/www.rambus.com\/","name":"Rambus","description":"At Rambus, we create cutting-edge semiconductor and IP products, providing industry-leading chips and silicon IP to make data faster and safer.","publisher":{"@id":"https:\/\/www.rambus.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.rambus.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.rambus.com\/#organization","name":"Rambus","url":"https:\/\/www.rambus.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png","contentUrl":"https:\/\/www.rambus.com\/wp-content\/uploads\/2025\/09\/Rambus_Logo.png","width":200,"height":62,"caption":"Rambus"},"image":{"@id":"https:\/\/www.rambus.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/RambusInc","https:\/\/x.com\/rambusinc","https:\/\/www.linkedin.com\/company\/rambus","https:\/\/www.youtube.com\/user\/RambusWeb"],"description":"Rambus is a provider of industry-leading chips and silicon IP.","email":"ebiz@rambus.com","telephone":"+1-408-462-8000","legalName":"Rambus Inc.","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"501","maxValue":"1000"}}]}},"_links":{"self":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/20701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/comments?post=20701"}],"version-history":[{"count":0,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/20701\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/pages\/15280"}],"wp:attachment":[{"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/media?parent=20701"}],"wp:term":[{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.rambus.com\/wp-json\/wp\/v2\/tags?post=20701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}