for or Miss ssion ion-Cri Critic tical al Appl pplications - - PowerPoint PPT Presentation

for or miss ssion ion cri critic tical al appl
SMART_READER_LITE
LIVE PREVIEW

for or Miss ssion ion-Cri Critic tical al Appl pplications - - PowerPoint PPT Presentation

T ow owar ards s Trust stwor worthy thy In Intern ernet et of Th Things ings for or Miss ssion ion-Cri Critic tical al Appl pplications ications Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things Internet of Things is


slide-1
SLIDE 1

Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

T

  • w
  • war

ards s Trust stwor worthy thy In Intern ernet et of Th Things ings for

  • r Miss

ssion ion-Cri Critic tical al Appl pplications ications

slide-2
SLIDE 2
slide-3
SLIDE 3

Internet of Things is a game changer

slide-4
SLIDE 4

Organizations are benefiting from IoT today

Lido Stone Works

slide-5
SLIDE 5

However, IoT projects can be complex

Long timelines Hard to scale Difficult to customize

slide-6
SLIDE 6

Scale

# devices >> # humans, and growing fast Volume of data generated (and network traffic)

Pace

Innovation pressure: analysis, command and control Skill pressure: data science, other (niche) specialties

Environment

Extreme heterogeneity IT/OT collaboration Internet security and privacy Emerging standards & regulations New competitors

IoT Challenges

slide-7
SLIDE 7

Get started quickly with preconfigured solutions for common IoT scenarios. Leverage a worldwide ecosystem of experienced IoT partners to tailor IoT solutions to your needs.

Azure IoT Suite

Connect millions of devices and integrate your business systems with new insights to transform your business. azure.microsoft.com/solutions/iot-suite/

slide-8
SLIDE 8

Analyze and act

  • n new data

Integrate and transform business processes Connect and scale with efficiency

And more Real-time

  • perating

systems

SAP SalseForce Office 365 Oracle DB2 WebSphere Informix Dynamics Device Registry Rules and Actions Analytics Dashboards & Visualization Twitter

slide-9
SLIDE 9

Accelerate time to value with preconfigured solutions

Modify existing rules and alerts Fine-tuned to specific assets and processes Integrate with back-end systems Highly visual for your real-time operational data Get started in minutes Add your devices and begin tailor to your needs

slide-10
SLIDE 10

Devices

Azure IoT Suite Remote Monitoring

Azure IoT Suite architecture

Back end systems and processes

C# simulator

Event Hub Storage blobs DocumentDB Web/Mobile App Stream Analytics Logic Apps Azure Active Directory IoT Hub Web Jobs Power BI

slide-11
SLIDE 11

Security from the ground up

Microsoft Cloud Largest online services in the world Centers of excellence Operational Security Assurance (OSA) process Security Development Lifecycle (SDL)

azure.microsoft.com/documentation/articles/securing-iot-ground-up/

slide-12
SLIDE 12

Defense in depth Device Security Connection Security Cloud Security

Securely connect millions of devices . . . Over a secure internet connection . . . To Microsoft Azure – built with security from the ground up

slide-13
SLIDE 13

THE EVOLUTION OF ATTACKS

Volume and Impact

Script Kiddies BLASTER, SLAMMER Motive: Mischief

2003-2004

slide-14
SLIDE 14

THE EVOLUTION OF ATTACKS

2005-PRESENT

Organized Crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Script Kiddies BLASTER, SLAMMER Motive: Mischief

2003-2004

slide-15
SLIDE 15

THE EVOLUTION OF ATTACKS

2005-PRESENT

Organized Crime RANSOMWARE, CLICK-FRAUD, IDENTITY THEFT Motive: Profit Script Kiddies BLASTER, SLAMMER Motive: Mischief

2012 - Beyond

Nation States, Activists, Terror Groups BRAZEN, COMPLEX, PERSISTENT Motives: IP Theft, Damage, Disruption

2003-2004

slide-16
SLIDE 16

Insecure design

Unauthorized control of Jeep Unauthorized control of Nissan Leaf

www.bbc.com/news/technology-35642749 www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

slide-17
SLIDE 17

North Carolina Highway Signs Compromised By a Foreign Hacker* Penetration of a Water Treatment Facility by a Foreign Hacker* *NSTAC Report to the President on the Internet of Things. www.dhs.gov/sites/default/files/publications/

slide-18
SLIDE 18

State sponsored attacks

IR-40 facility in Arak, Iran

https://en.wikipedia.org/wiki/Nuclear_program_of_Iran

slide-19
SLIDE 19

Why is IoT vulnerable?

slide-20
SLIDE 20

How?

  • Secure Development Lifecycle
  • Secure Network Technologies
  • Threat & Vulnerability Mitigation
  • Monitoring and Alerting
  • Software/Firmware Auto-Updates
  • Privacy Models

Mission of IT Design and maintain software, hardware and network resources which run securely and privately In Information Technology (IT (IT) - th the ap appli lication of

  • f computers an

and tele lecommunications equip ipment to

  • store, retrieve, tr

transmit an and man anipulate data*

*en.wikipedia.org/wiki/Information_technology

slide-21
SLIDE 21

Ho How?

  • Robust machines, with built-in safety

features

  • Automated monitoring and control
  • Isolate and control – cut off all

interaction with the world

  • Design to protect against natural and

man-made disasters Mission of OT Design and maintain machines which run reliably, and safely (do not cause injury or harm to

  • ther machines, humans, and

the environment)

Operations Technology (O (OT) - collects information and causes changes in the physical world through the direct monitoring and control of physical devices in industrial contexts

slide-22
SLIDE 22

Information T echnology Specialists Operational T echnology Specialists

System of Systems

slide-23
SLIDE 23

Integration of IT and OT

Complex merger of security aspects between IT and OT

Compromise of safety because of lack of security

Machine‘s control sequece modified without access control (lack of information integrity)

Compromise of reliablity because of lack of security

Modified operation controls can cause machines to become less reliable (malicious outsider or insider threat)

Leakage of business process secrets

Realtime business process details stolen (confidentiality of information)

slide-24
SLIDE 24

Trustworthy IoT

Security Privacy Reliability Safety

Environment Threats System faults Human Errors

slide-25
SLIDE 25

The STRIDE model

Spoofing Identity: T ampering with Data: Repudiation: Information Disclosure: Denial of Service: Elevation of Privilege: aka.ms/iotarch

slide-26
SLIDE 26

Component Threat Mitigation Risk Implementation Device S Assigning identity to the device and authenticating the device Replacing device or part

  • f the device with some
  • ther device. How do we

know we are talking to the right device? Authenticating the device, using Transport Layer Security (TLS) or IPSec. Infrastructure should support using pre-shared key (PSK) on those devices that cannot handle full asymmetric cryptography. Field Gateway S Authenticating the Field gateway to Cloud Gateway If someone can spoof Field Gateway, then it can present itself as any device TLS RSA/PSK, IPSe, RFC 4279. All the same key storage and attestation concerns of devices in general Device TID TLS (PSK/RSA) to encrypt the traffic. Reading data in transit between devices. Tampering with the data. Overloading the device with new connections Security on the protocol level (HTTP(S)/AMQP/MQTT/CoAP .

slide-27
SLIDE 27
  • Protecting physical devices
slide-28
SLIDE 28

IoT solution operator IoT solution deployer IoT solution developer IoT hardware manufacturer and integrator

slide-29
SLIDE 29

Telemetry based IoT security

  • Near real-time monitoring for on-device security properties, such as

state of OS, malware, IP attack surface. Upload data to Azure Security Center

  • Analysis in the cloud with global intelligence for attacks
  • Present security status to device owner in a user friendly and usable
  • fashion. Suggest mitigations

Security state monitoring

  • Train ML models for normal behavior based on telemetry data (more

accurate with more data)

  • Detect anomalous behavior based on known physical and security

attack vectors, e.g. tampering, moving device from one location to another, insider attack to take physical control of device

  • Examples scenarios: Device tampering, sleep, context based anomalies

Anomaly detection based on telemetry data

slide-30
SLIDE 30

Challenges of telemetry-based IoT security monitoring

  • Constantly adapt telemetry models
  • Generalize telemetry models
  • Mapping between real-world and cyber context

Technical

  • Business model
  • Sharing of threat information – ISAC (DHS) and Infoguard (FBI)
  • Standards for sharing vulnerabilities
  • IoT Device Security Certification – is it even possible

Implementation

slide-31
SLIDE 31

In closing

Internet of Things is the next big thing For IoT hacks it is not about if, but when and how Security in IoT is an ecosystem play There is promise in data science based security anomaly detection How do you sell security investments?

slide-32
SLIDE 32

Thank you

slide-33
SLIDE 33