Finite StateFinite State
Finite StateFinite State
Product Security

Building a Modern IoT Security Stack: From Source to Firmware

Don’t just scan your source—secure your full IoT stack. Learn how to build a modern, layered security strategy from code to firmware and beyond.

Larry Pesce

Larry Pesce

VP of Services

June 2, 2025

The TL;DR of the First Three Posts

We’ve talked about a lot:

  • Why traditional scanners fall short for IoT
  • How compiled binaries tell the real story
  • Why open source components create blind spots

Now let’s turn all that into action—a roadmap for doing IoT security the right way.

What Modern IoT Security Actually Looks Like

Security for embedded and IoT devices isn’t about slapping a scanner onto your codebase and calling it a day. It’s about building visibility and validation into every layer of the development lifecycle.

Here’s what that stack should include:

1. Source Code Analysis (SAST)

  • Catch issues early
  • Annotate libraries and internal components
  • Flag unsafe logic before it compiles

2. Binary + Firmware Analysis

  • Inspect the actual output, not just the intention
  • Discover hidden third-party code, static libs, and hardcoded secrets
  • Analyze stripped binaries, even without debug symbols

3. SBOM Generation + Validation

  • Automatically generate SBOMs from builds
  • Validate SBOMs with binary analysis (trust but verify)
  • Include versioning, license, and reachability info (as a bonus)

4. Threat Intelligence + CVE Mapping

  • Constantly refresh vulnerability intelligence
  • Correlate it with real firmware content
  • Focus on exploitable paths, not just known flaws

5. Continuous Integration

  • Make all of this part of CI/CD
  • Scan everything at every build
  • Don’t wait for pen tests or compliance audits to find issues

Shift Left. Shift Right. See Everything.

"Shifting left" means catching issues earlier in the dev cycle, which is great, but in IoT, you also need to shift right, to the final compiled artifacts.

That means scanning:

  • Source code (left)
  • Compiled binaries (right)
  • Everything in between

What You’ll Get from Doing This Right

  • Real Risk Visibility: Know what’s exploitable, not just what exists
  • Faster Remediation: Fix vulnerabilities where they happen—in source, configs, or binaries
  • Better Compliance Posture: CRA, FCC, FDA, NIST—pick your acronym. They all want proof.
  • More Secure Products: Ship firmware that you can stand behind

Final Word

This isn’t just about checking a box. It’s about building trust. In your code. In your supply chain. In your ability to respond fast when threats emerge.

Modern IoT security isn’t one tool. It’s a layered strategy. Start where you are. Expand your visibility. And never, ever settle for scanning the surface.

{{cta('190840854344')}}

Larry Pesce

Larry Pesce

VP of Services

Larry Pesce is VP of Services at Finite State, where he leads product security research and vulnerability assessments across IoT, OT, and healthcare devices. With over 20 years of experience, he’s also a longtime SANS instructor and co-host of Paul’s Security Weekly, known for advancing vulnerability management practices industry-wide.

Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & Media
Contact Sales
X

Privacy PolicyTerms of UseCustomer Terms and Conditions