30
Industrial IoT Security accelerate Digital Transformation Takashi Amano Technology Executive General Manager, Industrial ICT Security Center Toshiba Digital Solutions Corporation © 2017 Toshiba Digital Solutions Corporation

Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Industrial IoT Security

accelerate Digital Transformation

Takashi Amano

Technology Executive

General Manager, Industrial ICT Security Center

Toshiba Digital Solutions Corporation

© 2017 Toshiba Digital Solutions Corporation

Page 2: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

© 2017 Toshiba Corporation 2

01 Industrial IoT Architecture

02 Industrial IoT Security

Page 3: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

01 Industrial IoT Architecture

‘SPINEX’

Page 4: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

4

Evolution of Digital Transformation

Equipment

Community

Enterprise

Whole facility

Devices

Evolution of digital transformation

visualize optimize automate autonomy

New business value

creation through

digitalization

〇〇〇TECH

Page 5: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

5

140-year Accumulated Knowledge of “Products” =Field Capability (Operation Technology)

Thermal

Power Plant Geothermal

Plant

Hydroelectric

Power Plant Accumulated

1975facilities

Global share

No.1 Global share

No.1

Energy Transmission &

Distribution

Share in Japan

No.1

Elevator Large-scale chiller

Air-conditioner Lighting

Monitor/electric system

Buildings/Facilities

Social Infrastructure

Public Infrastructure

Facility lighting

Security/Automation System OCR Letter Sorting Machine

Share in Japan

No.1 Share in Japan

20%

Building Energy UPS*

Share in Japan

26%

Share in Japan

22%

Central system

Roads

Share in Japan

No.1 Share in Japan

No.1

Water treatment

Share in Japan

No.1

Broadcasting

Share in Japan

50% * Source: Toshiba research.

*

*Variable-speed pumped-storage:

cumulative No. of plant installed

*Uninterruptable Power System

Page 6: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

6

Improving Manufacturing Process by AI (Toshiba Semiconductor Fab)

Rate of defect classification 83% 49%

Processes 2bil. data sets per day through AI

Time to identify problem causes 2hrs 6hrs

2016 The Japanese Society

of Artificial Intelligence Gold Field Innovation

Award

Manufacturing Process

50 models 20,000 process

Production Equipment

200 types 4,000 machines

Page 7: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

7

Utilizing IoT Data Generated from Toshiba Office Facility(Lazona Kawasaki Toshiba Building)

Collected 30Bil. Records of data

35.2% Energy saving

achievement

CO2 Reduction 54.0% For whole building

FY2016

Energy Conservation

Grand Prize Awarded Chairman Prize of ECCJ*

BEMS for total

optimization Operation Start Time

November 2013

Number of sensors

35,000 sensors

30Bil. data + AI analysis

*ECCJ: Energy Conservation Center, Japan

Page 8: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Manufacturing system

Building & Facilities Logistics Social

Infrastructure Energy system

スパインエックス

Toshiba IoT Architecture

Digital Twin

Analytics AI Communication AI

Edge Computing

Industrial IoT Security

Autonomy Automation Optimization Visualization

To

shib

a G

rou

p S

yn

erg

y

Do

main

K

no

w H

ow

IC

T

Kn

ow

led

ge

Page 9: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

9

SPINEX_digital twin

Bill of

material Standard

variance

Process/step

Production

plan

Production

direction Production

condition Inspection

condition

Customer

Info.

Design value Surrounding

environment Product

operation

Individual

condition Device

operation ratio Operation

environment Repair/parts exchange

record

Man-power

Operation ratio

Bottle-neck of IoT

implementation

Sensor data generated need to be

structuralized before utilization.

Page 10: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

10

SPINEX_digital twin

Bottle-neck of IoT Implementation

Integrated Data Model

IoT implementation time can be dramatically

reduced by using an integrated data model

correlating IoT data and operations data.

Operations

Data

IoT data Correlating data

& storing by time series

Page 11: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

11

SPINEX_digital twin

Operations

data

IoT data Correlating data

& storing by time series

Toshiba’s

Manufacturing

Knowledge

IoT implementation time can be dramatically

reduced by using an integrated data model

correlating

IoT data and operations data. AI/Algorism

Demand

forecast

Anomaly

prediction

Yield

analysis

Identify

root cause ・・・・・・

Simulation Model

Versatility

Integrated Data Model

Page 12: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

12

SPINEX_digital twin

Operation data IoT data Correlating data

& storing by time series

AI/Algorism

Simulation Model

Integrated Data Model

Demand

forecast

Anomaly

prediction

Yield

analysis

Identify

root cauise ・・・・・・

Versatility

Toshiba’s

Manufacturing

Knowledge

Duplicate & predict

complicated factors

beyond time and space

Page 13: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

13

SPINEX_ai service

Voice/Image/language & knowledge

Human

AI related patent

2,000 AI for humans

RECognize with AI + us(people) 140-year accumulated knowledge of

“Products”

Things

AI for things

Solutions by AI Technologies for anaLYSis

Announced on

30/10/2017

Toshiba IoT Architecture

Page 14: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

14

Being Connected : Philosophy of Sta

nd

ard

s A

llia

nce

Op

en

In

no

vati

on

Glo

bal Part

ners

hip

Co-

creation

Customers,

Partners

Digital Twin

AI

Edge Computing

Toshiba IoT Architecture

Page 15: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

02 Industrial IoT Security

Page 16: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Industrial IoT Security

OT Operation

Technology

IT Information

Technology

IIoT Industrial

Internet

of Things IoT Internet

of Things

CIA

CIA

CIA+HSE

Visualization

Optimization

Automation

Autonomy

CIA:

Confidentiality

Integrity

Availability

HSE:

Health

Safety

Environment

Page 17: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Security in Digital Transformation era

Every Things and Systems connect to the network

Treats of cyber attack expand

from information leakage

to physical damage

Sustainable security is needed

for social infrastructure

and control system

Page 18: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Values and Threats in Digital Transformation

Production

Improve-

ment

Business

Improve-

ment

Business

Creation

Evolution

of

Services

Attacks

from

External

Unknown

Risks

Evolution-

ary

risks

Internal

Crime Unexpected

Usage

Unreliable

System

Connection

Page 19: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

What to protect at Industrial IoT

Things Normal operation of devices and systems,

Early detection and restoration of cyber attacks

People Health, Safety, Environment

Data Manufacturing know-how, craftsmanship, production data, recipe, ...

Page 20: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Security

Level

見える化 最適化 自動化 自律化

Script Kiddy

Specialist

Organization

Nation

Evolution of IoT systems

Attacker skill

General Systems

Social

Infrastructure

Critical

Infrastructure

Imp

orta

nce o

f the sy

stem

High

Middle

Low

TOSHIBA Industrial IoT Security Reference Architecture

Depend on the progress and importance of the system Required

and sufficient security measures

considering cost balance

Autono

my

Automati

on

Optimizati

on

Visualizatio

n

Digital Transformation

Page 21: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Application

Middleware

OS

Firmware

Hardware

External

boundary

Internal

boundary

Internal

node

IoT System Layer(Extent)

IoT System

Product

Low

Middle

High

System

runaway

System

shutdown

Environmental

destruction

Multi-layer defense “Extent” and “Depth”

Pro

du

ct L

ayer (D

ep

th)

Page 22: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Low Middle High

Application

Middleware ~ Firmware Tampering with firmware

and drivers

Hardware/ Whole System Platform vulnerability

Security Software ( Malware countermeasure / white listing, firewall,

IDS / IPS, device authentication, etc. )

Secure boot with

HW security

TrustZone

measure

measure

Basic measures

Risk of

advanced attacks

Risks of

clever and complex attacks

Multi-layer defense “Product Layer”

Protection against edge device threats

Page 23: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Application

Middleware

OS

Firmware

Hardware

External

boundary

Internal

boundary

Internal

node

IoT System Layer(Extent)

IoT System

Product

Low

Middle

High

System runaway

Malfanction

System

shutdown

Environmental

destruction

Multi-layer defense “Extent” and “Depth”

Pro

du

ct L

ayer (D

ep

th)

Page 24: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Multi-layer defense “IoT System Layer”

①Out-Of-Bound ②TOUCH ③INLINE

Visualization Optimization

External

connection point

of OT, limited

function

Control system security measures

The security model changes

as IoT system Layer evolves

Separate OT and IoT

Data integrity

Device

authentication

White list type

command execution

Functional safety

Malware Intrusion detection

Device hardening

Physical security

External boundary Internal boundary Internal node

Automation Autonomy

Page 25: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

①OOB(Out-Of-Bound) Model

One way communication

Cloud

IoT Gateway

Sensor

Observation of field device from

the outside and Visualization

Sep

ara

te

OT IT/IoT

Sensing

Separate OT and IoT

It does not directly affect the control process

Autonomy Automation Optimization Visualization

Page 26: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

IoT Gateway

②TOUCH Model

OT IT / IoT

Limited external connections and functions

It does not affect important functions of

the control process

Obtain data necessary for analysis and

optimization of field devices on demand

In

terfa

ce

Un

it

Limited External Conduits

Limited function

Limited Commands

Process Data for Analysis

PLC

Sensor

Autonomy Automation Optimization Visualization

Page 27: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

③INLINE Model

Define system zone, Localize the damage

by measures of conduits exceeding the zone

Measures compliant with control system regulation

• Zoning inside the system as functional unit

• Understand conduits between zones

• For zones close to the field,

measures against HW level

conduit

conduit

Safety Zone

conduit

conduit

conduit

zone

Automatic and autonomy

operation of control system

Safety & Security

Autonomy Automation Optimization Visualization

Page 28: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

© 2017 Toshiba Corporation

Measures for legacy devices (A case of INLINE Security)

Security enhancement

for legacy endpoint is required

Secure security without changing existing

system by inserting

Secure Proxy Device just before

endpoint legacy device

1. Protect endpoints from malware /

ransomware

2. Secure endpoint communication

(mutual authentication between devices)

3. Secure endpoints on behalf of security

functions such as key management and

signature verification

Private

CA

Page 29: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information

Life Time Protection for Social Infrastructure

Design

Security

Operation

Evaluation

Incident

response

Monitoring

Defense Verification

Readiness

social infrastructure /

control system

Knowledge of cyber

world attacks and

threats

Knowledge of

Real world

system and things

Cooperation with internal

and external companies

Detect threats from both

cyber and real

Security Operation Center

Fast adaptation to unknown

attacks and incidents

CSIRT/PSIRT

Multi-layer defense in two axes

according to the evolution

and importance of the system

Adaptive evaluation and

verification for future threats

Penetration test

Cyber security exercise

Security Assessment

Security by Design

Page 30: Industrial IoT Security accelerate Digital …Security in Digital Transformation era Every Things and Systems connect to the network Treats of cyber attack expand from information