www.internetsociety.org
Collaborative Security
Reflections about Security and the Open Internet NLUUG Najaarsconferentie 2015 19 November 2015
Collaborative Security Reflections about Security and the Open - - PowerPoint PPT Presentation
Collaborative Security Reflections about Security and the Open Internet NLUUG Najaarsconferentie 2015 19 November 2015 www.internetsociety.org Mission: To promote the open development, evolution, f o e c and use of the Internet r u t
www.internetsociety.org
Collaborative Security
Reflections about Security and the Open Internet NLUUG Najaarsconferentie 2015 19 November 2015
Collaborative Security | NLUUG | November 2015
http://www.internetsociety.org/get-involved/individuals
2
i n d e p e n d e n t s
r c e
l e a d e r s h i p f
I n t e r n e t p
i c y , t e c h n
y s t a n d a r d s , a n d f u t u r e d e v e l
m e n t Mission: To promote the open development, evolution, and use of the Internet for the benefit of all people throughout the world. F
n d e d i n 1 9 9 2 b y I n t e r n e t P i
e e r s Global and Inclusive Independent and Not-for-Profit Organizational home for the IETF
www.internetsociety.org
The Open Internet
What was that about again?
Collaborative Security | NLUUG | November 2015 4
Collaborative Security | NLUUG | November 2015 5
https://www.flickr.com/photos/worldbank/4725033296/in/album-72157634090168746/
Collaborative Security | NLUUG | November 2015 6
G l
a l R e a c h & I n t e g r i t y
h t t p : / / w w w . i n t e r n e t s
i e t y .
g / i n t e r n e t
n v a r i a n t s
h a t
e a l l y
a t t e r s
G e n e r a l P u r p
e P e r m i s s i
l e s s I n n
a t i
A c c e s s i b l e Accessible Interoperability & mutual agreement Collaboration Interoperable Building Blocks No Permanent Favorites
Collaborative Security | NLUUG | November 2015 7
Collaborative Security | NLUUG | November 2015 8
Open Platform Open for attack and intrusion Permission less innovation Malware development & deployment Global Reach Attacks and crime are cross-border Voluntary collaboration Hard to mandate
Collaborative Security | NLUUG | November 2015 9
Collaborative Security | NLUUG | November 2015 10
Collaborative Security | NLUUG | November 2015 11
F
t e r i n g C
f i d e n c e a n d P r
e c t i n g O p p
t u n i t i e s C
l e c t i v e R e s p
s i b i l i t y E v
u t i
a n d C
s e n s u s Fundamental Properties and Values Think Globally Act Locally
Collaborative Security | NLUUG | November 2015
Where the rubber meets the road.
12
Collaborative Security | NLUUG | November 2015
OARC Ops-t
Researchers
13
Development OPS Devops SDOs Orgs
NSP Security
Collaborative Security | NLUUG | November 2015 14
Collaborative Security | NLUUG | November 2015 15
Stimulate visible improvements in security and resilience of Internet Routing by changing towards a culture of collective responsibility
Collaborative Security | NLUUG | November 2015
common problems to be addressed
16
incorrect routing information traffic with spoofed source IP addresses coordination and collaboration between network
1 The organization (ISP/network operator) recognizes the interdependent nature of the global routing system and its own role in contributing to a secure and resilient Internet. 2 The organization integrates best current practices related to routing security and resilience in its network management processes in line with the Actions. 3 The organization is committed to preventing, detecting and mitigating routing incidents through collaboration and coordination with peers and
4 The organization encourages its customers and peers to adopt these Principles and Actions.
Principles
Collaborative Security | NLUUG | November 2015 17
Prevent propagation of incorrect routing information. Prevent traffic with spoofed source IP addresses. Facilitate global operational communication and coordination between network operators. Facilitate validation of routing information on a global scale.
A c t i
1 A c t i
2 A c t i
3 A d v a n c e d A c t i
4
Collaborative Security | NLUUG | November 2015 18
Please have this conversation with your stakeholders
C
t a c t r
t i n g m a n i f e s t
I S O C .
g
Collaborative Security | NLUUG | November 2015 19
Collaborative Security and the Internet of Things
http://www.internetsociety.org/iot/
Collaborative Security | NLUUG | November 2015 20
Living in a World of Decentralized Data
Senior Vice President and CTO, Verisign NDSS Workshop on Security of Emerging Networking Technologies (SENT) February 8, 2015
Collaborative Security | NLUUG | November 2015 21
Establishing Trust in the Object L a c k
P h y s i c a l T r u s t I d e n t i c a l d e v i c e s ‘use’ beyond design criteria L
g L i v e d ( 5
y r ) R a n d
n e s s
Collaborative Security | NLUUG | November 2015 22
Courtesy: Tschofenig et al, IETF 92 Technical Plenary
Deployment Implementation Protocol Specifications and Architecture Cryptographic Primitives
Improved algorithms for integer factorization, too small key size. No end-to-end security, complexity in specifications, insecure authentication protocols Buffer overflow attacks, poor UI
choice of hardware Enabled debug ports, missing deployment of security mechanisms
Examples of Problems
Understanding the distributed nature of the development process is essential for tackling security problems.
22
Collaborative Security | NLUUG | November 2015 23
6/11/15
23
Collaborative Security | NLUUG | November 2015 24
Can you do responsible security on a € 0.04 margin device?
Collaborative Security | NLUUG | November 2015
Re-use Internet security technologies:
▪
Use state-of-the-art key length
▪
Always use well-analysed security protocols.
▪
Use encryption to improve resistance against pervasive monitoring.
▪
Support automatic key management and per-device keys.
Additional IoT relevant security aspects:
▪
Crypto agility is a hard decision and you need to think deeply about it.
▪
Integrate a software update mechanism and leave enough “head room”.
▪
Include a hardware-based random number generator.
▪
Threat analysis must take physical attacks into account.
▪
Use modern operating system concepts to avoid system-wide compromise due to a single software bug.
25
6/11/15 25
S
e P r a c t i c a l R e c
m e n d a t i
s See RFC7452
The Internet Society 6/11/15 26
These objects will have a profound impact on our lives. Important Security Questions have not been answered while we deploy. The Collaborative Security Approach has properties that will help to make a positive impact
www.internetsociety.org
Kolkman@isoc.org twitter: @kolkman
Chief Internet Technology Officer
Olaf M. Kolkman