Guy Vinograd, CEO
A Blueprint for Creating a Secure IoT Product
Million-user scale, 10000s devices◦AWS & Google GCP partner
Secure IoT clouds for device vendors◦Device vendors - focus on your core◦Customers - global $Bn companies to start-ups
Your trusted advisor - IoT, security, and clouds
About Me and Softimize
ICS-Cert 2014 report◦ 245 incidents involving IoT platforms◦ 55% Advanced Persistent Threats (APT)◦ 42% targeted communication, water, transport
<40% IoT vendors implemented measures
Security - The #1 concern for IoT
What is IoT Security?
Breach prevention◦Software - cloud & apps◦Environment – cloud, physical, network◦Devices
Privacy◦Let your users control their data
Trust◦Create customer confidence
The 3 Goals of IoT Security
Create Trust withSecurity Standards
Company-level standards
ISO 27001 - Information security◦ ISO 27799 – Health guidelines
ISO 9001 – Quality management◦ ISO 13485 – Health guidelines
Certification◦~4 months (SMB), ~40 hours overhead◦Post overhead - ~10 hours/month◦Yearly audit◦Consulting companies. ~ILS 30K
The ISOs
Health care◦Medical devices and much more
American◦EU: Data Protection Directive 1995/46/EC
PHI – Protected Health Information
BAA - Business associate agreement
Self declaratory◦Audit comes later
HIPAA – a Product-level Standard
◦ DB - RDS (MySQL), DynamoDB, Redshift◦ Files - EBS, S3, Glacier◦ Process – EC2, ELB, EMR◦ Utils – KMS, CloudWatch
◦ DB – CloudSQL, BigQuery, Genomics◦ Files – Cloud Storage◦ Process – Compute Engine◦ Utils – Logging (Beta)
◦ Active Directory, API Management, Automation, Backup, Batch, BizTalk Services, Cloud Services, DocumentDB, Express Route, HDInsight, Key Vault, Machine Learning, Management Portal, Media Services, Mobile Services, Multi-Factor Authentication, Notification Hub, Operational Insights, Redis Cache, RemoteApp, Rights Management Service, Scheduler, Service Bus, Site Recovery, SQL Database, Storage, StorSimple, Stream Analytics, Traffic Manager, Virtual Machines, Virtual Network, Visual Studio Team Services, Web Sites, and Workflow Manager.
◦ Compute - SoftLayer
HIPAA & Clouds Architecture
REST
Zoom on IoT - What to Secure?
HTTP | MQTT | CoAP | XMPP
IoT Backend Service
GW
Cloud – the ideal◦Protects IP◦Data Privacy GW knows only raw signal No processed info = less risk Caching on GW is a risk
GW ("fog") – the reality◦Offline – Get security policy from cloud and
execute
Zoom on IoT – Where to put Data/Logic
The Softimize Way for Designing a
Secure IoT Product
Security Users/Devices
Data Streaming Vendor Services
Management
Things Building Blocks (TBBTM)
Push notificationsDevice Interaction
Access Control – laas, SaaSVendor and cloud provider protectionEncryption, Tenant isolation
Site management – Multi device Licensing – per Tenant. Trial licenseBulk versioned FW updates
Complex event processingReal-time, sub second latency
Users | Devices and hierarchies
Back-office, AuditAnalytics – Failures, Usage patternsPrediction – Churn, Upsell
Discover & Config – w/o wifi | Real time streaming | FW updateSecurity – Encrypt, Auth | Reduce energy & bandwidth
On Premise
MQTT, HTTP
Cloud AbstractionMulti CloudAbstraction Layers for managed servicesNO DevOps-hungry open sources
Cloud◦Physical◦Access control - Policy / role based
System – Cloud & GW◦Dedicated servers◦Micro services separation based on purpose◦App/Data access - User / group / role based
User interface◦“Need to know” basis◦Re-require password for export/sensitive
Security-First Design
Authentication and authenticity◦Temporary tokens when possible
Encryption
Validation
Security-First Design - Data in Transit
“Need to know” basis◦Microservices◦DB access Policy◦Fully identifiable, pseudonymized anonymized,
fully anonymized
Per-tenant encryption◦Key management◦DB query of indexed data
Purge when expires (7 years / user request)
Routine integrity checks
Security-First Design - Data at Rest
Traceability◦Everything - access, input, data & operations◦Centralized logging/auditing - Cloud & GW
Availability◦Redundancy◦Backup
Plausibility checks◦Failure◦Penetration
Security-First Design