Is your distributed system secure?

Preview:

DESCRIPTION

Securing your distributed system for the IIoT.

Citation preview

The Industrial Internet of Things is kind of a big deal.

You may have heard of it. Basically it’s going to enable things like flying cars, smart houses, and intelligent

systems that are actually, well… intelligent.

The IIoT is a massive distributed system.In fact, the IIoT is inherently distributed.

And this massive distributed system

has 3 key requirements:

1. Real-Time Performance

2. Scalability3. Security

To meet those 3 requirements, you need to start doing things differently.

But today?Today is your lucky day.

Yes. It’s true.

Because building real-time, decentralized,

distributed, scalable systems that boast both

security & reliability?

It’s in our DNA.

So we built a product that empowers you to defend your systems

and protect your data.

(See, I told you that today was your lucky day.)

RTI Connext DDS SecureTM

RTI Connext DDS Secureprovides you with the power

to build real-time IIoT systems that are Scalable,

Secure, & Reliable.

Connext DDS Secure runs overany Connext DDS transport.

UDP TCP

Shared Memory

Even unreliable transports with low-bandwidth. Also: multicast to support scalability and low-latency.

#winning

The architecture is distributedand decentralized.

translation: high-performance and no single points of failure

Connext DDS DataBus

And using the SDK, youcan build your own plug-ins.

Read: customizable and allows for integration with your existing security infrastructure.

Connext DDSLibrary

Authentication

Access Control

Encryption

Data Tagging

Logging

Application

Transport

SEC

UR

ITY P

LUG

-IN

S

Interested? Want moretechnical details?

No problem.

RTI Connext DDS Secure: Standard CapabilitiesAuthentication

– X.509 Public Key Infrastructure (PKI) with a pre-configured shared Certificate Authority (CA)

– Digital Signature Algorithm (DSA) with Diffie-Hellman and RSA for authentication and key exchange

Access Control– Specifications via permissions

file signed by shared CA– Control over ability to join DDS

Domains and Partitions, read or write Topics

– Control on individual objects and Quality of Service (QoS) via plugins

Cryptography– Protected key distribution– AES128 and AES256 for

encryption– HMAC-SHA1 and HMAC-

SHA256 for message authentication and integrity

Data Tagging– Used to specify security

metadata, such as classification level

– Sent during endpoint discovery

– Can be used to determine access privileges (via plugin)

Logging– Log security events to a local

file or distribute securely over Connext DDS

RTI Connext DDS Secure: Features & Benefits• Provides authentication, authorization, non-repudiation, confidentiality and integrity

• Protects discovery information, metadata and data

• Defends against unauthorized access, tampering and replay

• Operates without centralized servers for high performance, scalability and availability

• Runs over any transport including TCP, UDP, multicast and shared memory

• Integrates with existing security infrastructures and hardware acceleration

• Secures unmodified existing DDS applications

RTI Connext DDS Secure• Product Data Sheet

http://www.rti.com/products/secure.html

• Product Page http://www.rti.com/docs/RTI_DDS_Secure.pdf

• Press Release http://www.rti.com/company/news/secure-messaging-for-iiot.html

• RTI Blog http://blogs.rti.com/2014/06/17/connext-dds-secure/

RTI Connext DDS Secure

Your systems. Working As One.

Securely.

Recommended