38
1 Secure and Reliable Data Exchange with Devices Session 5, February 20, 2017 Amit Trivedi, Program Manager- Healthcare ICSA Labs

Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

1

Secure and Reliable Data Exchange with Devices

Session 5, February 20, 2017

Amit Trivedi, Program Manager- Healthcare

ICSA Labs

Page 2: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

2

Speaker Introduction

Amit Trivedi

Program Manager, Healthcare

ICSA Labs

Page 3: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

3

Conflict of Interest

Amit Trivedi

Has no real or apparent conflicts of interest to report.

Page 4: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

4

Agenda

• Introduction to the Internet of Things (IoT)

• Healthcare and IoT Security

• Best Practices, guidance and recommendations

• Additional Resources

• Key Points

• Q/A

Page 5: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

5

Learning Objectives

• Demonstrate the current and projected growth of the ‘internet of things’ and

‘plug and play’ interoperability landscape

• Discuss the importance of securing data exchange with medical device

security compliance

• Identify the value that interoperability certification programs, such as

ConCert by HIMSS, bring to the forefront of addressing today’s access and

security needs

Page 6: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

6

Agenda

• Introduction to the Internet of Things (IoT)

• Healthcare and IoT Security

• Best Practices, guidance and recommendations

• Additional Resources

• Key Points

• Q/A

Page 7: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

7

What is the IoT?

Page 8: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

8

More than 20 Billion “Things”

5.5 million devices were connected to the IoT every day

Projections range from 26-34 billion connected endpoints by 2020.

Page 9: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

9

Mobile Apps are a Gateway to the IoT

“Take out your smartphone – if you are like most people it’s never more than a few feet away– and tell me what you see.

A phone, yes. But also a bank. A credit card. A filing cabinet holding medical records, tax returns, personal correspondence, social security numbers. Maybe a home security system or keys to your house.

Apps that reflect what you watch, what you read, who you talk to, what you think.”

- Lowell McAdams

Page 10: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

10

It’s Happening Now

Connecting “things” in the real world. Changing how we live and work:

• Fitness trackers

• Utility meters

• Household appliances

• Connected cars

• Smart buildings

Forcing us to change existing approaches to safety and risk, privacy and security…and we’ve barely scratched the surface.

Page 11: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

11

Page 12: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

12

Agenda

• Introduction to the Internet of Things (IoT)

• Healthcare and IoT Security

• Best Practices, guidance and recommendations

• Additional Resources

• Key Points

• Q/A

Page 13: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

13

IoT and HealthcareIn healthcare – insecure medical devices are one of the biggest causes of concern.

• Implantable Cardioverter Defibrillators (ICD)

• Insulin Pump

• Drug infusion pumps

• X Ray systems / centralized storage

• Blood refrigeration Units

• CT Scanning equipment

• Remote monitoring systems

• Clinical Data Repositories

Page 14: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

14

Why IoT devices make good targets

• Many companies entering the IoT market lack experience in security.

• Some IoT devices are highly sophisticated, but many are inexpensive and

essentially disposable. If and when vulnerabilities are discovered after

manufacture, it becomes difficult or impossible to update the software or

apply a patch.

• Companies – particularly those developing low end devices - lack

economic incentives to provide support or software security updates at all,

leaving consumers with unsupported or vulnerable devices shortly after

purchase.

Page 15: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

15

What makes IoT in healthcare a target?

Most medical devices are more vulnerable to cyber-attacks than normal IT endpoints.

Unlike regular IT components used in the healthcare environment, medical devices are not only mission-critical, they are also safety-critical.

However, at the same time many factors contribute to making medical devices less secure, including:

– A generally low cyber-security maturity.

– A long useful life often resulting in the use of end-of-support software components.

– Slow security patch deployment.

Page 16: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

16

Fundamental differences in priorities lead to challenges addressing security

• Traditional IT security postures often describe priorities using the acronym

C-I-A. Confidentiality – Integrity – Availability.

• In the healthcare environment, which reflects a different nature of mission

and business critical function, taking patient safety as a paramount

concern - the priorities are reversed: Availability – Integrity –

Confidentiality.

• This reflected in the hospital-internal processes and priorities, such as the

different job functions of IT and Biomedical Engineering, and it also results

in very different regulatory frameworks and guidance.

Page 17: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

17

IoT security risks can be exploited

As we install more smart devices in our

homes, hospitals, and workplaces we increase

the number of vulnerabilities an intruder could

use to compromise personal information.

Digital compromise may lead to risks to

personal and physical safety.

Page 18: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

18

IoT privacy risks arise through the collection of information over time

Privacy risks may flow from the collection of

personal information, habits, locations, and

physical conditions over time.

Companies might use this data to make

credit, insurance, and employment

decisions.

Criminals could use this data for nefarious

purposes.

Page 19: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

19

Sensitive behavior patterns

Existing smartphone sensors can be used to infer:

• a user’s mood

• stress levels

• personality type

• bipolar disorder

• demographics (e.g., gender, marital status, age)

• smoking habits

• progression of Parkinson’s disease

• sleep patterns

• happiness

• levels of exercise

Page 20: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

20

Securing Mobile and IoT Devices

Consumers

Fitness BandsFitness Bands - Source: https://securityintelligence.com/are-fitness-bands-secure-theres-more-to-it-than-just-the-clasp/ &

http://lacklustre.net/bluetooth/Ryan_Bluetooth_Low_Energy_USENIX_WOOT.pdf

Automobiles

SmartHomes (ZigBee Door Locks) – Source: http://blog.deepsec.net/deepsec-video-zigbee-smart-homes-a-hackers-open-house/

Nissan Leaf – Source: https://www.youtube.com/watch?v=Nt33m7G_42Q&feature=youtu.be

SmartHomes

Page 21: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

21

Commercial

CCTV Botnets in DDoS

CCTV Botnet in DDoS – Source: https://blog.sucuri.net/2016/06/large-cctv-botnet-leveraged-ddos-attacks.html

SSDP DDoS Reflection (No Botnet required!) – Source: https://blogs.akamai.com/2016/06/q1-2016-soti-security-preview-reflection-ddos-attacks-q1-2015-q1-2016.html

IoT Device SSDP DDoS

SSDP-> Q1 2015

Q2 2015

Q3 2015

Q4 2015

Q1 2016

Page 22: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

22

Industrial

Waterworks Control System Smart Tower in Israel

Page 23: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

23

Agenda

• Introduction to the Internet of Things (IoT)

• Healthcare and IoT Security

• Best Practices, guidance and recommendations

• Additional Resources

• Key Points

• Q/A

Page 24: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

24

What are we doing about it?

• We live in a world where we are constantly weighing risks/benefits. There is no doubt that IoT can provide tremendous benefits, which come with risks.

We can’t eliminate risk, can only identify, manage and mitigate it.

• There are resources available (FTC, FDA, NIST, and IHE, for example) – but the industry needs to adopt a laser focus on security by design.

We can’t “achieve” security, we can only improve it.

Page 25: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

25

FTC: Recommendations and a Challenge

• FTC Report on Internet of Things urges companies to adopt best

practices to address privacy and security risks.

• Report recognizes that the rapid growth of connected devices offers

societal benefits, but also risks that could undermine consumer

confidence

Page 26: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

26

FTC Recommendations

FTC staff also recommends that companies notify consumers and

give them choices about how their information will be used,

particularly when the data collection is beyond consumers’

reasonable expectations.

There is no one-size-fits-all approach to how that notice must be

given to consumers, particularly since some Internet of Things

devices may have no consumer interface.

Page 27: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

27

The Federal Trade Commission (FTC) is hosting a prize competition that

challenges the public to create a technical solution (“tool”) that

consumers can use to guard against security vulnerabilities in software

found on the Internet of Things (IoT) devices in their homes.

Page 28: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

28

Network of Things Model

• The Network of Things (NoT) model is based on four

fundamentals at the heart of IoT— sensing, computing,

communication and actuation.

• The model's five building blocks, called "primitives," are

core components of distributed systems. They provide a

vocabulary to compare different NoTs that can be used to

aid understanding of IoTs.

Page 29: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

29

IoT Guidance

• SP-800-160: urges organizations -- including federal

agencies and commercial equipment and service

providers -- to address security throughout the systems

engineering process rather than "bolting on" firewalls,

encryption and monitoring systems to operating systems

and applications after they are purchased.

Page 30: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

30

FDA Releases Final Guidance

December 2016

Post-market Management of Cybersecurity in Medical

Devices - Guidance for Industry and Food and Drug

Administration Staff

Page 31: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

31

Guidance and recommendations

Medical Equipment Management (MEM): Medical Device Cyber Security –

Best Practice Guide (Draft)

IHE PCD in Cooperation with MDISS White Paper: Medical Device Patching

• How today’s medical devices are used and incorporated in our IT environments.

• What type of cyber-threats they are exposed to and how these threats can affect

the medical device ecosystem.

• A review of best practices to design security into medical devices and reliable

medical device networks, ranging from asset and configuration management

access control, to cyber-security protective measures.

Page 32: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

32

Agenda

• Introduction to the Internet of Things (IoT)

• Healthcare and IoT Security

• Best Practices, guidance and recommendations

• Additional Resources

• Key Points

• Q/A

Page 33: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

33

Standards, Conformance Testing, and Certification

Page 34: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

34

Additional Resources

- Open Web Application Security Project (OWASP): The OWASP Internet of Things Project is

designed to help manufacturers, developers, and consumers better understand the security issues

associated with the Internet of Things, and to enable users in any context to make better security

decisions when building, deploying, or assessing IoT technologies. The project looks to define a

structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top

Vulnerabilities.

Page 35: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

35

Agenda

• Introduction to the Internet of Things (IoT)

• Healthcare and IoT Security

• Best Practices, guidance and recommendations

• Additional Resources

• Key Points

• Q/A

Page 36: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

36

IoT and Managing Risk: Key Points• Security by Design – Whether an appliance, software, toy or electronics, the manufacturer

should integrate security into the design process. It is important that security is implemented into

the design of each product throughout the product’s lifecycle.

• Encryption is Essential – Manufacturers need to have a strong policy that utilizes encryption.

When a data breach happens, if the data is encrypted, a number of “safe harbor” type provisions

may apply. For example if the data is encrypted, then its loss is generally not considered a breach.

• Built-In Risk Analysis Program – How often does the manufacturer conduct risk analysis and

are they standard in the product’s development lifecycle? It is important to gauge the maturity of a

manufacturer’s information security program.

• Authorize Connected Devices - Devices connected to the Internet should require some type of

authorization such as authentication via digital certificates to confirm identity as well as its access.

Allowing access to a small part of a system, may provide access to all of it. Authentication can

help contain these types of breaches.

Page 37: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

37

• Monitor connected devices throughout their expected life cycle, and where feasible, provide

security patches to cover known risks.

• Train employees about the importance of security, and ensure that security is managed at an

appropriate level in the organization;

• Consider data minimization – limiting the collection of consumer data, and retaining that

information only for a set period of time, and not indefinitely.

• Require Independently Tested and Certified Products - All product manufacturers should have

their security independently tested and certified by a third-party provider. This adds a layer of

protection as the products go through rigorous testing, and adhere to security standards

IoT and Managing Risk: Key Points

Page 38: Secure and Reliable Data Exchange with Devices€¦ · 5.5 million devices were connected to the IoT every day Projections range from 26-34 billion connected endpoints by 2020. 9

38

Questions

Reminder: Please complete an online session evaluation!

Amit TrivediProgram Manager, Healthcare

ICSA Labs

www.icsalabs.com | @a3vedi