blueprint for creating a secure iot product

18
Guy Vinograd, CEO A Blueprint for Creating a Secure IoT Product

Upload: guy-vinograd-

Post on 08-Jan-2017

109 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Blueprint for creating a Secure IoT Product

Guy Vinograd, CEO

A Blueprint for Creating a Secure IoT Product

Page 2: Blueprint for creating a Secure IoT Product

Million-user scale, 10000s devices◦AWS & Google GCP partner

Secure IoT clouds for device vendors◦Device vendors - focus on your core◦Customers - global $Bn companies to start-ups

Your trusted advisor - IoT, security, and clouds

About Me and Softimize

Page 3: Blueprint for creating a Secure IoT Product

ICS-Cert 2014 report◦ 245 incidents involving IoT platforms◦ 55% Advanced Persistent Threats (APT)◦ 42% targeted communication, water, transport

<40% IoT vendors implemented measures

Security - The #1 concern for IoT

Page 4: Blueprint for creating a Secure IoT Product

What is IoT Security?

Page 5: Blueprint for creating a Secure IoT Product

Breach prevention◦Software - cloud & apps◦Environment – cloud, physical, network◦Devices

Privacy◦Let your users control their data

Trust◦Create customer confidence

The 3 Goals of IoT Security

Page 6: Blueprint for creating a Secure IoT Product

Create Trust withSecurity Standards

Page 7: Blueprint for creating a Secure IoT Product

Company-level standards

ISO 27001 - Information security◦ ISO 27799 – Health guidelines

ISO 9001 – Quality management◦ ISO 13485 – Health guidelines

Certification◦~4 months (SMB), ~40 hours overhead◦Post overhead - ~10 hours/month◦Yearly audit◦Consulting companies. ~ILS 30K

The ISOs

Page 8: Blueprint for creating a Secure IoT Product

Health care◦Medical devices and much more

American◦EU: Data Protection Directive 1995/46/EC

PHI – Protected Health Information

BAA - Business associate agreement 

Self declaratory◦Audit comes later

HIPAA – a Product-level Standard

Page 9: Blueprint for creating a Secure IoT Product

◦ DB - RDS (MySQL), DynamoDB, Redshift◦ Files - EBS, S3, Glacier◦ Process – EC2, ELB, EMR◦ Utils – KMS, CloudWatch

◦ DB – CloudSQL, BigQuery, Genomics◦ Files – Cloud Storage◦ Process – Compute Engine◦ Utils – Logging (Beta)

◦ Active Directory, API Management, Automation, Backup, Batch, BizTalk Services, Cloud Services, DocumentDB, Express Route, HDInsight, Key Vault, Machine Learning, Management Portal, Media Services, Mobile Services, Multi-Factor Authentication, Notification Hub, Operational Insights, Redis Cache, RemoteApp, Rights Management Service, Scheduler, Service Bus, Site Recovery, SQL Database, Storage, StorSimple, Stream Analytics, Traffic Manager, Virtual Machines, Virtual Network, Visual Studio Team Services, Web Sites, and Workflow Manager.

◦ Compute - SoftLayer

HIPAA & Clouds Architecture

Page 10: Blueprint for creating a Secure IoT Product

REST

Zoom on IoT - What to Secure?

HTTP | MQTT | CoAP | XMPP

IoT Backend Service

GW

Page 11: Blueprint for creating a Secure IoT Product

Cloud – the ideal◦Protects IP◦Data Privacy GW knows only raw signal No processed info = less risk Caching on GW is a risk

GW ("fog") – the reality◦Offline – Get security policy from cloud and

execute

Zoom on IoT – Where to put Data/Logic

Page 12: Blueprint for creating a Secure IoT Product

The Softimize Way for Designing a

Secure IoT Product

Page 13: Blueprint for creating a Secure IoT Product

Security Users/Devices

Data Streaming Vendor Services

Management

Things Building Blocks (TBBTM)

Push notificationsDevice Interaction

Access Control – laas, SaaSVendor and cloud provider protectionEncryption, Tenant isolation

Site management – Multi device Licensing – per Tenant. Trial licenseBulk versioned FW updates

Complex event processingReal-time, sub second latency

Users | Devices and hierarchies

Back-office, AuditAnalytics – Failures, Usage patternsPrediction – Churn, Upsell

Discover & Config – w/o wifi | Real time streaming | FW updateSecurity – Encrypt, Auth | Reduce energy & bandwidth

On Premise

MQTT, HTTP

Cloud AbstractionMulti CloudAbstraction Layers for managed servicesNO DevOps-hungry open sources

Page 14: Blueprint for creating a Secure IoT Product

Cloud◦Physical◦Access control - Policy / role based

System – Cloud & GW◦Dedicated servers◦Micro services separation based on purpose◦App/Data access - User / group / role based

User interface◦“Need to know” basis◦Re-require password for export/sensitive

Security-First Design

Page 15: Blueprint for creating a Secure IoT Product

Authentication and authenticity◦Temporary tokens when possible

Encryption

Validation

Security-First Design - Data in Transit

Page 16: Blueprint for creating a Secure IoT Product

“Need to know” basis◦Microservices◦DB access Policy◦Fully identifiable, pseudonymized anonymized,

fully anonymized

Per-tenant encryption◦Key management◦DB query of indexed data

Purge when expires (7 years / user request)

Routine integrity checks

Security-First Design - Data at Rest

Page 17: Blueprint for creating a Secure IoT Product

Traceability◦Everything - access, input, data & operations◦Centralized logging/auditing - Cloud & GW

Availability◦Redundancy◦Backup

Plausibility checks◦Failure◦Penetration

Security-First Design

Page 18: Blueprint for creating a Secure IoT Product

Guy [email protected]

Need an IoT Cloud?

Use