13
Secure Your Application From Design To Deployment Haydn Povey – Founder & CTO [email protected] Founding Member

Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

1

Secure Your Application From Design To Deployment

Haydn Povey – Founder & CTO

[email protected] Founding Member

Page 2: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

2

Secure Thingz

Secure Development Secure Lifecycle Secure Production

10+ Patents in Flight Global Security Leadership

Secure MCU Provision & Program Secure Element Provisioning

ARM PSA Launch Partner

Page 3: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

3

Complexity Ensures Vulnerabilities

He was aided, he says, by an unexpected leak of the company's source code he found on Github

ARM's "mbed TLS" software can be tricked into an authentication bypass and needs a patch.

Human Error Complex Standards Technological Inheritance

The eight Bluetooth-related vulnerabilities affect an estimated 5.3 billion Android, iOS, Linux, and Windows devices

Page 4: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

4

Hacking Isn’t The Only Risk

0 5000 10000 15000 20000 25000 30000

Jewellery (71)Pharmaceuticals (30)

Toys (95)Perfumery and cosmetics (33)

Clothing, non knitted or crocheted (62)Instruments, optical, medical etc. (90)

Watches (91)Electrical machinery and equipment (85)

Articles of leather (42)Clothing, knitted or crocheted (61)

Footwear (64)

Counterfeit Goods Seizures 2

1: OECD, April 2016. Trade in Counterfeit &Pirated Goods Mapping The Economic Impact 2: OECD, April 2015. http://dx.doi.org/10.1787/888933345913

Privacy & GDPR

Minimum fine €10M or 2% of annual turnover – whichever is larger

Deliberate actions fine €20M or 4% of annual turnover

Counterfeiting

$500B+ per year1

GDP of Ireland & Netherlands combined

Electronic devices highest by value

Page 5: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

5

Security Requirements for the IoT

40%

45%

46%

48%

51%

52%

55%

55%

57%

32%

39%

43%

39%

34%

21%

35%

31%

31%

Blackmail or ransom

Product Cloning

Denial of service

Theft of service

Product tampering

Theft of data

Injury or death

Theft of IP

Customer privacy (GDPR)

Critical IoT Security Concerns

Very Critical Somewhat Critical

35%

37%

40%

41%

45%

48%

50%

50%

41%

42%

42%

43%

40%

36%

37%

42%

Encrypted storage

Public key crypto

Secure boot

Hardware security tampering

Encrypted data

Encrypted communications

Secure firmware updates

Access Controls

Security Features for IoT Embedded Applications

Very Critical Somewhat Critical

Source: Embedded Revolutions survey. Embedded Design. Sept 2017(Bill Wong)

Page 6: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

6

A Holistic Approach To Security D

EVEL

OP

MANUFACTURE

MANAGE

Certificate Hierarchy

Development

Test

Mastering

OEM Management

System

User Management

System Cloud Provider Devices

Factory Management

System Desktop Factory

Trust Anchors

Page 7: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

7

Flexible Secure Boot Services

Embedded Trust

Supported on multiple secure MCUs

Implementation defined within IDE – Minimal size to maximum capability

Only signed & encrypted code accepted

– Programming & Updates

Supports versioning & anti-rollback

Supports modular updates – Ideal for resource limited systems – Reduced power on flash updates

Foundation Boot

Update Framework

Version Management

Modular Updates

Code & Credential Provisioning

Acc

ess

Co

ntr

ol

Ap

plic

atio

n I

sola

tio

n

Dyn

amic

Ap

plic

atio

n L

oad

ing

Sys

tem

In

teg

rity

Ch

eck

Fire

wal

l

Secure Key Storage and Management

Page 8: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

8

Certificate Hierarchy Management

Embedded Trust

Traditional certificate structure designed for robust IT – X.509, CRL, etc.

Self-Certificate Infrastructure – Certificate structures & templates unique – Ensure long-term cost effective ownership

Leverage 3rd party CA

Methodology for developing certificate hierarchy for IoT – Graphical development environment – Certificates & keys generated dynamically – PC or HSM based – Seamless transition from Development Certificates to Production – Supported within production provisioning process

Root CA

(OEM)

Intermediate CA

(Product Line)

Device Certificate

(Product)

Page 9: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

9

Simplifying Secure Development

Embedded Trust

Enable development, debug, mastering, provisioning and manufacturing in a single unified workflow

Easy selection of preconfigured secure worlds – Certificates, keys, Secure Boot Loader,

versioning policy for different use cases

Creation of OEM specific secure worlds

Bridging the gap to secure production

Page 10: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

10

OEM Application

Non-Secure6

RoT Keys & Certs3

OEM Keys & Certs4

Application Keys & Certs

Secure Loader3

Secure Key Storage

System Flash

Secure Device

Config Regs2

Arm v8-M (TrustZone-M) Boot Services Provisioning System1

Non-Secure

Secure Area

System RAM

Deploying Secure Applications

The OEM must ensure ownership of the device with their own keys & certificates

(1) Secure Provisioning & Programming

(2,3) Device has secure RoT hardware such as secure configuration(2) and Secure Keys, Certs and Loader(3)

(4) The OEM’s secure identity (signed certificates) and authentication keys are securely provisioned into the MCU. Inhibiting key theft and over-production.

(5) OEM’s Secure Services, Secure FW Update & uvisor are securely programmed into the MCU.

(6) The OEM application code is securely programmed into the MCU. Inhibiting IP theft.

OEM Secure Code (TZM)5

Page 11: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

11

Secure Application Development

Secure Integrated Development Environment

Secure Boot Manager

Device Targeting

Version Mgmt

Anti-Rollback

Modular Updates

On-boarding

End of life

App. Signature & Encryption

IP Protection Inhibit Malware

Production Criteria

Volume, Facility, Dynamic Provisioning

Identity & Certificate Provisioning

Pre-defined certificates Dynamic identity creation PUF harvesting

Secure Production Pre-Provisioned credentials Trusted relationships At Fab or in distribution

Secu

re

Prov

isio

ning

Secu

re

Prog

ram

min

g

Secu

re

Upd

ate

Page 12: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

12

Secure Thingz

Delivering Secure Foundations for the IoT

Simplifying Secure Design

Securing Provisioning & Programming

Enhancing Product Lifecycle Support

Enabling New Business Models

Working with trusted partners to secure the connected world, prevent malware injection and inhibit intellectual property theft

Page 13: Secure Your Application From Design To Deployment...Secure Application Development Secure Integrated Development Environment Secure Boot Manager Device Targeting Encryption Version

13

Thank You