CityGov is proud to partner with Datawheel, the creators of Data USA, to provide our community with powerful access to public U.S. government data. Explore Data USA

Skip to main content
Stack the Odds: Comprehensive Security for AI, IoT, and Urban Infrastructure

Stack the Odds: Comprehensive Security for AI, IoT, and Urban Infrastructure

A full-stack security model begins with recognizing that each layer of smart city infrastructure - from physical devices to cloud-based analytics - represents a potential point of vulnerability. Traditional perimeter-based security no longer suffices when thousands of IoT sensors, AI-driven platforms, and cloud services are all communicating in real time. In this layered approach, security controls are embedded into every component: endpoint devices are secured with firmware validation, data flows are encrypted and monitored, and AI models are audited for anomalous behavior. This model is not theoretical - it is being deployed in practice. The National Institute of Standards and Technology (NIST) has published guidance on architectural considerations for secure IoT deployments, which can serve as a foundation for local governments building smart infrastructure systems from the ground up1.

For example, Dallas has adopted a tiered security framework to manage its traffic signal control system. By segmenting operational technology (OT) networks from information technology (IT) systems and implementing strict access controls, the city has reduced the risk of lateral attacks that could disable critical infrastructure2. This layered defense model enables continuous monitoring of both network activity and device behavior, allowing for early detection and rapid response to cyber threats. Cities evaluating their smart infrastructure should consider not only what technology is being deployed, but also how each layer of that stack is protected, governed, and maintained over time.

AI and IoT Require Continuous Governance

Artificial intelligence and the Internet of Things can significantly improve urban operations, from optimizing water usage to reducing emergency response times. However, these technologies require disciplined governance to avoid introducing systemic risk. AI systems, particularly those using machine learning, must be trained on accurate, representative data and regularly validated to ensure they are functioning as intended. A misconfigured traffic prediction algorithm or a biased public safety model can have direct consequences for residents. The U.S. Government Accountability Office has emphasized the importance of transparent AI governance in federal and local implementations, recommending formal oversight structures and regular audits3.

IoT devices, meanwhile, must be treated not as passive sensors but as active nodes in a network that can be exploited if not properly secured. Default passwords, outdated firmware, and unsecured communication protocols remain some of the most common vulnerabilities in smart city deployments. The Cybersecurity and Infrastructure Security Agency (CISA) advises cities to implement device authentication, secure update mechanisms, and network segmentation as baseline controls for IoT infrastructure4. These measures are not just technical standards - they are operational necessities. Without them, a single compromised sensor could provide attackers with a gateway into broader city systems.

Training Staff for AI, IoT, and Cloud Resilience

Technology is only as secure as the people managing it. As cities adopt AI and IoT systems at scale, staff must be equipped to understand how these technologies function and how they can fail. Training should go beyond traditional IT skills to include AI model interpretability, IoT risk management, and cloud-native security practices. The Center for Internet Security (CIS) and the National League of Cities have both noted that workforce development is a critical success factor in local cybersecurity strategies5. Without trained personnel, even the most advanced systems can become liabilities.

Cities should consider formalizing cybersecurity training as part of onboarding for infrastructure and planning teams. This includes regular updates on evolving threats, hands-on exercises like tabletop incident response simulations, and participation in regional cybersecurity information-sharing groups. Cloud platforms, which now underpin many smart city applications, require specialized knowledge in identity management, role-based access control, and configuration monitoring. Investing in staff capacity not only reduces operational risk but also builds institutional resilience, ensuring that knowledge does not leave the organization when individuals move on.

Embedding Cybersecurity into Procurement and Planning

Cybersecurity cannot be an afterthought in smart city development. Instead, it must be integrated into procurement policies and infrastructure planning from the earliest stages. Cities should require vendors to meet defined cybersecurity standards, such as those aligned with the NIST Cybersecurity Framework or ISO/IEC 27001, as conditions of contract award. These requirements should include provisions for secure software development, vulnerability disclosure, and lifecycle support. The Government Technology and Services Coalition has found that procurement clauses with enforceable security expectations significantly reduce downstream risk6.

Infrastructure planning documents should include cybersecurity impact assessments just as they include environmental or fiscal reviews. This approach aligns with the recommendations from the National Association of State Chief Information Officers (NASCIO), which encourages cities and states to treat cybersecurity as a key design parameter in all technology implementations7. Projects that do not plan for cyber risk often face higher long-term costs due to retrofits, compliance failures, or incident recovery. By embedding security into the planning process, cities can ensure that innovation does not come at the expense of stability or public trust.

Security-by-Design in Action: Practical Examples

Several cities have already integrated cybersecurity into their infrastructure initiatives with measurable results. In San Diego, the Smart Streetlights program was paused after privacy and security concerns were raised. Following a comprehensive review, the city implemented stricter data governance policies and device-level encryption protocols before resuming deployment8. This case illustrates the importance of aligning technical deployment with community expectations and regulatory compliance from the outset. By taking a security-by-design approach, the city avoided broader disruption and restored public confidence.

Another example is the Georgia Smart Communities Challenge, which supports local governments in piloting smart technologies with integrated cybersecurity oversight. Projects under this program are required to conduct risk assessments and include cybersecurity metrics in their evaluation criteria. In one initiative, Gwinnett County deployed connected vehicle infrastructure with embedded network monitoring tools and strict access controls, significantly lowering the risk of traffic system compromise9. These examples show that security-by-design is not a theoretical ideal but a practical strategy that can guide successful, secure innovation.

Next Steps for Smart Infrastructure Security

Agencies should begin by conducting a cybersecurity gap analysis of their current smart city plans. This review should cover device configurations, data handling practices, AI model governance, and incident response capabilities. Where gaps are identified, cities can develop a Smart Infrastructure Security Framework tailored to their operational environment, regional risk profile, and regulatory obligations. This framework should be a living document, updated regularly to reflect new threats, technologies, and lessons learned.

Cities are also encouraged to participate in regional panels and working groups focused on AI-integrated infrastructure. These forums provide opportunities to share best practices, coordinate with state and federal partners, and influence the development of national standards that reflect local needs. By engaging proactively, cities can ensure that their smart infrastructure delivers not only on innovation but on safety, integrity, and resilience.

Conclusion: Aligning Innovation with Security

A smart city is only as strong as the security that supports it. When cybersecurity and infrastructure strategy move together, cities can deliver innovation that is efficient, resilient, and worthy of public trust. Full-stack security models, rigorous oversight of AI and IoT systems, trained personnel, and integrated policy planning are not optional - they are essential components of future-ready urban governance. Cities that lead on cybersecurity today will not only protect their residents but also set the standard for what responsible innovation looks like.

Bibliography

  1. National Institute of Standards and Technology. “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks.” NISTIR 8228, June 2019. https://doi.org/10.6028/NIST.IR.8228.

  2. City of Dallas. “Cybersecurity Strategy and Initiatives in Transportation Systems.” Department of Transportation, 2021. https://dallascityhall.com.

  3. U.S. Government Accountability Office. “Artificial Intelligence: An Accountability Framework for Federal Agencies and Other Entities.” GAO-21-519SP, June 2021. https://www.gao.gov/products/gao-21-519sp.

  4. Cybersecurity and Infrastructure Security Agency. “Security Guidance for Internet of Things (IoT) Devices.” CISA, 2022. https://www.cisa.gov/resources-tools/resources/iot-device-security-guidance.

  5. National League of Cities and Center for Internet Security. “Cybersecurity Workforce Development for Cities.” NLC Report, April 2021. https://www.nlc.org/resource/cybersecurity-workforce-development-for-cities/.

  6. Government Technology and Services Coalition. “Cybersecurity in Government Procurement: Best Practices.” GTSC Report, 2020. https://www.gtscoalition.com/reports.

  7. National Association of State Chief Information Officers. “Cybersecurity Disruption: 2022 State CIO Survey.” NASCIO, 2022. https://www.nascio.org/publications/.

  8. City of San Diego. “Smart Streetlights Program Status and Privacy Policy Update.” Office of the Chief Operating Officer, 2021. https://www.sandiego.gov/smartstreetlights.

  9. Georgia Institute of Technology. “Georgia Smart Communities Challenge: Final Reports.” 2020. https://smartcities.ipat.gatech.edu/georgia-smart.