12
1 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

11

Aiming to be the Global Leader in Cyber Security, starting from Japan

Safety for the Connected World

Page 2: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

2

AppGuard and TRUSTICA

2

CloudNative

Computing

Endpoints Servers

SGX, TXT, VBSSEV SME

TPMHW Protected Key Store

TRUST and Privacy Framework: Attestation, EPID, Small Crypto Footprint

Page 3: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

3

3

Old Way: Perimeter Defense

Perimeter Melt down: 0-Trust network and 0-Trust Peers

Data Privacy is sealed at the origin

IDS/IPSAnti-VirusSignature and constant Signature UpdatesDetection Oriented

Page 4: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

• Sensitive Data sharing among “Circle of Trust” members:

– Data is encrypted the moment it is created

– Can only be viewed by Group Members: Financial Transactions, Shared Video, Shared Evidence

• Allows each member share information with designated group members without exposing the information to outside.

• Anonymity: No other group member can know the originator unless the publisher of the data wants to reveal

Trust and Attestation: Patterns

4 4Copyright © 2019 Blue Planet-works, Inc. All Rights Reserved

Page 5: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

Foundation for End-to-End IoT Security:“Operating System for the

IoT Eco System”

5

Page 6: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

• Immutable Identity for Every IoT Device• IoT Onboarding with “call-home” and provisioning• Establishes Platform Identity• Based on Hardware root of Trust: Private key is in Silicon (i.e. TPM’s

Endorsement Key)• Rich Privacy Protection

– Mapping Attack Defense– Anonymous Trusted Business Transactions

• Authenticates “platform” identity through remote attestation using asymmetric (public and private key) crypto.

• Built-in Identity for Device Registration and Provisioning

Trust and Attestation: Key Elements

6 6Copyright © 2019 Blue Planet-works, Inc. All Rights Reserved

Page 7: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

TRUSTICA Management System:Trust and Control

7

Group IdentityTCG Remote AttestationDial-Home on boardingAnonymity Preserved within

7Copyright © 2019 Blue Planet-works, Inc. All Rights Reserved

Page 8: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

TRUSTICA Management System: Trust and Control

8

IoTGuard Management System Establishes Trust for:

• Discovery/Revoke

• Device Identity, Credentials, Authentication

• Attestation

• Data-At-Rest (Containers)

• Data-In-Motion with Standard Protocols

• Policy Management

• Auditing

• Monitoring

• Alerting

Page 9: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

Management SystemAdheres to IoT Standards

9

IoT Service Platform (TLS, AMQPS and MQTTS)

Authentication OnboardingProvisioning

Remote Attestation

Event Bus Trust BusPolicy Bus

IoTEventHub

Page 10: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

10Proprietary

Safety for the Connected World

◼ Kakogawa City and Kobe City◼ Bus Location, Taxi, Traffic Flow Safety

◼ Safety Monitoring

◼ Crime Reduction for Safe City: For Children and Elderly

◼ Car Sharing-TRUSTICA Mobile as a Secure Platform for Virtual Keys

TRUSTICA10

10Copyright © 2019 Blue Planet-works, Inc. All Rights Reserved

Page 11: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

Copyright © 2018 Blue Planet-works, Inc. All Rights Reserved 11

App for mobile devices (Android and iOS)✓ Highly secure end-to-end communication and data exchanges✓ Continuous device validity, safety, and integrity check via remote and dynamic

attestation✓ Complete Data protection of information stored in TRUSTICA Mobile’s

TrustSpace

MOBILE

Technology: Uses open protocols

Binding user information with Device H/W credentials Distributed key management Remote and Dynamic Attestation technologies: device validity, safety, and integrity Isolation Technology for secure data containment: complete data protection Policy enforcement via assurance levels: high degrees of authentication Trust relationship management: TRUST Circles

Page 12: Safety for the Connected World - Cyber Security and ... · 1 Aiming to be the Global Leader in Cyber Security, starting from Japan Safety for the Connected World

TRUSTICA Final Word

◼ OS for the Connected World

◼ Data privacy and integrity the moment is created [SSL, TLS, etc. not secure]

◼ Working examples◼ Two cities in Japan

◼ V2I

◼ Currently working with Car Sharing to store Virtual Key

◼ TRUSTICA Mobile for Multi-Factor Authentication for Banking applications

Copyright © 2017 Blue Planet-works, Inc. All Rights Reserved 12