Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things
T
- w
- war
ards s Trust stwor worthy thy In Intern ernet et of Th Things ings for
- r Miss
for or Miss ssion ion-Cri Critic tical al Appl pplications - - PowerPoint PPT Presentation
T ow owar ards s Trust stwor worthy thy In Intern ernet et of Th Things ings for or Miss ssion ion-Cri Critic tical al Appl pplications ications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is
Lido Stone Works
Get started quickly with preconfigured solutions for common IoT scenarios. Leverage a worldwide ecosystem of experienced IoT partners to tailor IoT solutions to your needs.
Connect millions of devices and integrate your business systems with new insights to transform your business. azure.microsoft.com/solutions/iot-suite/
And more Real-time
systems
SAP SalseForce Office 365 Oracle DB2 WebSphere Informix Dynamics Device Registry Rules and Actions Analytics Dashboards & Visualization Twitter
Modify existing rules and alerts Fine-tuned to specific assets and processes Integrate with back-end systems Highly visual for your real-time operational data Get started in minutes Add your devices and begin tailor to your needs
Devices
Azure IoT Suite Remote Monitoring
Back end systems and processes
C# simulator
Event Hub Storage blobs DocumentDB Web/Mobile App Stream Analytics Logic Apps Azure Active Directory IoT Hub Web Jobs Power BI
azure.microsoft.com/documentation/articles/securing-iot-ground-up/
Securely connect millions of devices . . . Over a secure internet connection . . . To Microsoft Azure – built with security from the ground up
Volume and Impact
Script Kiddies BLASTER, SLAMMER Motive: Mischief
2003-2004
2005-PRESENT
Organized Crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Script Kiddies BLASTER, SLAMMER Motive: Mischief
2003-2004
2005-PRESENT
Organized Crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Script Kiddies BLASTER, SLAMMER Motive: Mischief
2012 - Beyond
Nation States, Activists, Terror Groups BRAZEN, COMPLEX, PERSISTENT Motives: IP Theft, Damage, Disruption
2003-2004
www.bbc.com/news/technology-35642749 www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
North Carolina Highway Signs Compromised By a Foreign Hacker* Penetration of a Water Treatment Facility by a Foreign Hacker* *NSTAC Report to the President on the Internet of Things. www.dhs.gov/sites/default/files/publications/
IR-40 facility in Arak, Iran
https://en.wikipedia.org/wiki/Nuclear_program_of_Iran
*en.wikipedia.org/wiki/Information_technology
Ho How?
features
interaction with the world
man-made disasters Mission of OT Design and maintain machines which run reliably, and safely (do not cause injury or harm to
the environment)
Machine‘s control sequece modified without access control (lack of information integrity)
Modified operation controls can cause machines to become less reliable (malicious outsider or insider threat)
Realtime business process details stolen (confidentiality of information)
Security Privacy Reliability Safety
Component Threat Mitigation Risk Implementation Device S Assigning identity to the device and authenticating the device Replacing device or part
know we are talking to the right device? Authenticating the device, using Transport Layer Security (TLS) or IPSec. Infrastructure should support using pre-shared key (PSK) on those devices that cannot handle full asymmetric cryptography. Field Gateway S Authenticating the Field gateway to Cloud Gateway If someone can spoof Field Gateway, then it can present itself as any device TLS RSA/PSK, IPSe, RFC 4279. All the same key storage and attestation concerns of devices in general Device TID TLS (PSK/RSA) to encrypt the traffic. Reading data in transit between devices. Tampering with the data. Overloading the device with new connections Security on the protocol level (HTTP(S)/AMQP/MQTT/CoAP .
state of OS, malware, IP attack surface. Upload data to Azure Security Center
accurate with more data)
attack vectors, e.g. tampering, moving device from one location to another, insider attack to take physical control of device
Internet of Things is the next big thing For IoT hacks it is not about if, but when and how Security in IoT is an ecosystem play There is promise in data science based security anomaly detection How do you sell security investments?