Network Security is not something that can be simply built into a device, it's a concept involving technical and procedural measures involving the whole network (and its users).
If you rely on the security functions of a simple device like a scope or power supply then you've already lost.
Very wise words! It summarizes the topic well.
Robust approaches to security involve defense in depth. Makers (and buyers) of networked devices are shirking their responsibility if they treat security as someone elses problem.
[quote author=Matje link=topic=47025.msg663054#msg663054 date=1430347729
Such instruments are not intended/designed to go anywhere near an externally reachable network, or a private, but not trusted, network either.
Implementing security for such a use case would be prohibitive. Think proper TLS support, with certificates needing to be replaced every 1 or 2 years, instruments needing to be properly put into DNS using official, routable IPs (can't easily do real TLS with private IPs), bugs needing to be patched all the time, a real account/permission/role management in the instruments, the works. Nobody even marginally sane will open that can of worms - for basically zero benefit in the common use cases.
[/quote]
Again, most robust network security depends on defense in depth. When networked devices have absolutely no support for any type of network security they make securing any use case even more prohibitive. In some environments, network administrators may choose to ban them from the network, making them effectively useless for any networked use case.
As for the difficulty of certificate management, I think you overstate it. In a managed environment, certificate management is centralized and automated after initial enrollment, and doesn't necessarily depend on routable IPs. Remember too, a lot of test equipment is already on an annual schedule for calibration, so its not exactly unprecedented for masses of test equipment to be attended to manually.
Options for securing devices on small networks are more problematic, but the option of some security is often better than no option at all.
In the end, good security design, like any design, is an art of making smart compromises. Forgoing the option of using any security features on network devices doesn't strike me as a smart compromise.