confidential 1
play

CONFIDENTIAL 1 How to Secure Devices in a Smart City IoT devices - PowerPoint PPT Presentation

CONFIDENTIAL 1 How to Secure Devices in a Smart City IoT devices in a Zero-Trust manufacturing and operational environment. CONFIDENTIAL 2 IoT market Gartner predicts: 20.4 billion connected things by 2020 7.4 billion of these are


  1. CONFIDENTIAL 1

  2. How to Secure Devices in a Smart City IoT devices in a Zero-Trust manufacturing and operational environment. CONFIDENTIAL 2

  3. IoT market Gartner predicts: 20.4 billion connected “things” by 2020 7.4 billion of these are business/industrial devices Many IoT devices today are badly broken Managed IoT Industrial & Central infrastructure Personal & National security CONFIDENTIAL 3

  4. Threats Smart City Malicious attacks on e.g. water treatment could increase chemicals at dangerous levels Smart Grid Malicious attacks could lead to unstable energy flow and major blackouts. Automation Malicious attacks on service or surgical robots could lead to personal damages or even fatalities. CONFIDENTIAL 4

  5. You can’t trust the data if you can’t trust the device ! The environments at contract manufacturer and in operation must be considered “ Zero-Trust ” The Goal: Protect the device during the entire life-cycle from manufacturing to operations At the Contract Manufacturer (CM) it must be ensured that overproduction, cloning and counterfeit of devices cannot happen rogue firmware and spy chips cannot be installed your company IP secrets cannot be stolen, firmware and secret keys are not compromised And in the operational environment it must be ensured that only genuine firmware can execute devices can be upgraded certificates and keys for authentication to cloud are protected CONFIDENTIAL 5

  6. The seven properties of highly secure devices Hardware-based Root of Trust : Does the device have a unique, • unforgeable identity that is inseparable from the hardware? Small Trusted Computing Base : Is most of the device’s software • outside the device’s trusted computing base? Defense in Depth : Is the device still protected if the security of one layer • of device software is breached? Compartmentalization : Does a failure in one component of the device • require a reboot of the entire device to return to operation? Certificate-based Authentication : Does the device use certificates • instead of passwords for authentication? Renewable Security : Is the device’s software updated automatically? • Failure Reporting : Does the device report failures to its manufacturer? • Source: Microsoft CONFIDENTIAL 6

  7. How to establish the security properties? FirmwareGuard + • Protected design IP, and validated authentic SW application SW, update in the field (Over The Air) IoT device developer Product • Product configured features can be monetized configuration • Unique & protected identity, trusted device Certificates authentication and communication Cryptera Cryptographic • Protected keys for storage and secure keys exchange of data Secure Boot • Verifies the SW authenticity and integrity at Loader start up. Establishes Root of Trust Chip Security chip vendor • Secure boot capabilities and secure key storage CONFIDENTIAL 7

  8. Forward – How? Currently • Many suppliers – many “standards” • Immature business in regards to security Going forward • Do not wait for common standards – they might not come soon ….. • Focus on secure chips so you can establish root of trust • Secure you own devices – do not trust others • Learn from other industries – e.g. payments CONFIDENTIAL 8

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend