Finite StateFinite State
Finite StateFinite State
Product Security

Building a Modern IoT Security Stack: From Source to Firmware

Don’t just scan your source—secure your full IoT stack. Learn how to build a modern, layered security strategy from code to firmware and beyond.

Larry Pesce

Larry Pesce

VP of Services

June 2, 2025

The TL;DR of the First Three Posts

We’ve talked about a lot:

  • Why traditional scanners fall short for IoT
  • How compiled binaries tell the real story
  • Why open source components create blind spots

Now let’s turn all that into action—a roadmap for doing IoT security the right way.

What Modern IoT Security Actually Looks Like

Security for embedded and IoT devices isn’t about slapping a scanner onto your codebase and calling it a day. It’s about building visibility and validation into every layer of the development lifecycle.

Here’s what that stack should include:

1. Source Code Analysis (SAST)

  • Catch issues early
  • Annotate libraries and internal components
  • Flag unsafe logic before it compiles

2. Binary + Firmware Analysis

  • Inspect the actual output, not just the intention
  • Discover hidden third-party code, static libs, and hardcoded secrets
  • Analyze stripped binaries, even without debug symbols

3. SBOM Generation + Validation

  • Automatically generate SBOMs from builds
  • Validate SBOMs with binary analysis (trust but verify)
  • Include versioning, license, and reachability info (as a bonus)

4. Threat Intelligence + CVE Mapping

  • Constantly refresh vulnerability intelligence
  • Correlate it with real firmware content
  • Focus on exploitable paths, not just known flaws

5. Continuous Integration

  • Make all of this part of CI/CD
  • Scan everything at every build
  • Don’t wait for pen tests or compliance audits to find issues

Shift Left. Shift Right. See Everything.

"Shifting left" means catching issues earlier in the dev cycle, which is great, but in IoT, you also need to shift right, to the final compiled artifacts.

That means scanning:

  • Source code (left)
  • Compiled binaries (right)
  • Everything in between

What You’ll Get from Doing This Right

  • Real Risk Visibility: Know what’s exploitable, not just what exists
  • Faster Remediation: Fix vulnerabilities where they happen—in source, configs, or binaries
  • Better Compliance Posture: CRA, FCC, FDA, NIST—pick your acronym. They all want proof.
  • More Secure Products: Ship firmware that you can stand behind

Final Word

This isn’t just about checking a box. It’s about building trust. In your code. In your supply chain. In your ability to respond fast when threats emerge.

Modern IoT security isn’t one tool. It’s a layered strategy. Start where you are. Expand your visibility. And never, ever settle for scanning the surface.

{{cta('190840854344')}}

Larry Pesce

Larry Pesce

VP of Services

Larry Pesce is a lifelong hacker, educator, and leader in embedded and connected device security. As the Vice President of Services, Larry drives strategic security initiatives across the software supply chain, helping product teams build resilient devices from the ground up. With over 15 years of hands-on penetration testing experience spanning IoT, healthcare, ICS/OT, and wireless technologies, he combines deep technical knowledge with real-world expertise. Larry is also a renowned SANS instructor and co-host of the long-running Paul’s Security Weekly podcast, shaping the next generation of security professionals.


Ready to Level Up Your Security Knowledge?

Join thousands of security professionals learning from the best in the industry

Start Learning TodayStart Learning Today
Finite StateFinite State

Finite State is the Product Security Automation Platform that functions as an autonomous Product Security OS: design → verify → prove, grounded in what you ship.

Platform

Platform Overview
Ground Truth Inventory
Exploitability-Based Prioritization
Design-Time Architecture Security
Automated Evidence-Backed Compliance

Solutions

Device Manufacturers
Automotive
Medical Devices
Energy & Utilities
Government
Industrial

Resources

Blog
Resource Library
Webinars & Videos
Events
Documentation

Company

About Us
CareersHIRING
Press & News
Contact Sales
Media Inquiries
X

Privacy PolicyTerms of UseCustomer Terms and Conditions