Blueprint for creating a Secure IoT Product

Preview:

Citation preview

Guy Vinograd, CEO

A Blueprint for Creating a Secure IoT Product

Million-user scale, 10000s devices◦AWS & Google GCP partner

Secure IoT clouds for device vendors◦Device vendors - focus on your core◦Customers - global $Bn companies to start-ups

Your trusted advisor - IoT, security, and clouds

About Me and Softimize

ICS-Cert 2014 report◦ 245 incidents involving IoT platforms◦ 55% Advanced Persistent Threats (APT)◦ 42% targeted communication, water, transport

<40% IoT vendors implemented measures

Security - The #1 concern for IoT

What is IoT Security?

Breach prevention◦Software - cloud & apps◦Environment – cloud, physical, network◦Devices

Privacy◦Let your users control their data

Trust◦Create customer confidence

The 3 Goals of IoT Security

Create Trust withSecurity Standards

Company-level standards

ISO 27001 - Information security◦ ISO 27799 – Health guidelines

ISO 9001 – Quality management◦ ISO 13485 – Health guidelines

Certification◦~4 months (SMB), ~40 hours overhead◦Post overhead - ~10 hours/month◦Yearly audit◦Consulting companies. ~ILS 30K

The ISOs

Health care◦Medical devices and much more

American◦EU: Data Protection Directive 1995/46/EC

PHI – Protected Health Information

BAA - Business associate agreement 

Self declaratory◦Audit comes later

HIPAA – a Product-level Standard

◦ DB - RDS (MySQL), DynamoDB, Redshift◦ Files - EBS, S3, Glacier◦ Process – EC2, ELB, EMR◦ Utils – KMS, CloudWatch

◦ DB – CloudSQL, BigQuery, Genomics◦ Files – Cloud Storage◦ Process – Compute Engine◦ Utils – Logging (Beta)

◦ Active Directory, API Management, Automation, Backup, Batch, BizTalk Services, Cloud Services, DocumentDB, Express Route, HDInsight, Key Vault, Machine Learning, Management Portal, Media Services, Mobile Services, Multi-Factor Authentication, Notification Hub, Operational Insights, Redis Cache, RemoteApp, Rights Management Service, Scheduler, Service Bus, Site Recovery, SQL Database, Storage, StorSimple, Stream Analytics, Traffic Manager, Virtual Machines, Virtual Network, Visual Studio Team Services, Web Sites, and Workflow Manager.

◦ Compute - SoftLayer

HIPAA & Clouds Architecture

REST

Zoom on IoT - What to Secure?

HTTP | MQTT | CoAP | XMPP

IoT Backend Service

GW

Cloud – the ideal◦Protects IP◦Data Privacy GW knows only raw signal No processed info = less risk Caching on GW is a risk

GW ("fog") – the reality◦Offline – Get security policy from cloud and

execute

Zoom on IoT – Where to put Data/Logic

The Softimize Way for Designing a

Secure IoT Product

Security Users/Devices

Data Streaming Vendor Services

Management

Things Building Blocks (TBBTM)

Push notificationsDevice Interaction

Access Control – laas, SaaSVendor and cloud provider protectionEncryption, Tenant isolation

Site management – Multi device Licensing – per Tenant. Trial licenseBulk versioned FW updates

Complex event processingReal-time, sub second latency

Users | Devices and hierarchies

Back-office, AuditAnalytics – Failures, Usage patternsPrediction – Churn, Upsell

Discover & Config – w/o wifi | Real time streaming | FW updateSecurity – Encrypt, Auth | Reduce energy & bandwidth

On Premise

MQTT, HTTP

Cloud AbstractionMulti CloudAbstraction Layers for managed servicesNO DevOps-hungry open sources

Cloud◦Physical◦Access control - Policy / role based

System – Cloud & GW◦Dedicated servers◦Micro services separation based on purpose◦App/Data access - User / group / role based

User interface◦“Need to know” basis◦Re-require password for export/sensitive

Security-First Design

Authentication and authenticity◦Temporary tokens when possible

Encryption

Validation

Security-First Design - Data in Transit

“Need to know” basis◦Microservices◦DB access Policy◦Fully identifiable, pseudonymized anonymized,

fully anonymized

Per-tenant encryption◦Key management◦DB query of indexed data

Purge when expires (7 years / user request)

Routine integrity checks

Security-First Design - Data at Rest

Traceability◦Everything - access, input, data & operations◦Centralized logging/auditing - Cloud & GW

Availability◦Redundancy◦Backup

Plausibility checks◦Failure◦Penetration

Security-First Design

Guy Vinogradguy@softimize.co

Need an IoT Cloud?

Use

Recommended