review of external security models
play

Review of External Security Models Michael McCool Intel Osaka, W3C - PowerPoint PPT Presentation

Review of External Security Models Michael McCool Intel Osaka, W3C Web of Things F2F, 17 May 2017 Purpose WoT charter: The scope of the Working Group is restricted to APIs and security frameworks that are applicable across platforms. We will


  1. Review of External Security Models Michael McCool Intel Osaka, W3C Web of Things F2F, 17 May 2017

  2. Purpose WoT charter: The scope of the Working Group is restricted to APIs and security frameworks that are applicable across platforms. We will not define new security mechanisms but will use existing mechanisms and best practices. 1. Determine how to gather requirements for external security models and standards 2. Determine how to represent information in a common format  THEN b egin to review external security models and standards… 2/37

  3. Outline  List of external sources  External standards  Security models of important external IoT ecosystems WoT should interoperate with  Anything missing we should add?  Template for Threat model  Other templates to consider  Standards to review:  IIC Security Framework  IETF ACE Model 3/37

  4. Sources  See: https://github.com/w3c/wot/pull/319  Please create issues to suggest new references  External References:  Industrial Internet Consortium Security Framework: http://www.iiconsortium.org/IISF.htm  IETF ACE (Authentication and Authorization for Constrained Environments): https://tools.ietf.org/wg/ace/  IETF RFC 7252 (CoAP) Security model: https://tools.ietf.org/html/rfc7252  STRIDE Threat Model  OWASP IoT Attack Vectors  Liaison References:  OCF 1.0 Security Specification (Draft): https://openconnectivity.org/draftspecs/OCF_Security_Specification_v1.0.0.pdf  Will discuss this during OCF Review on May 17  oneM2M Security Solutions, TS-0003: http://www.onem2m.org/images/files/deliverables/Release2/TS-0003_Security_Solutions- v2_4_1.pdf 4/37

  5. Template for Threat Model  Stakeholders  Description, Role, Business-driven security goals, Interesting edge cases  Assets  Description, Who should have access (Trust Model), Attack Points  Adversaries  Persona, Motivation, Attacker type  Attack surfaces  System Element, Compromise Type(s), Assets exposed, Attack Method  Threats  Name, Adversary, Asset, Attack method and pre-conditions, priority  Security Objectives and Non-Objectives  Threats, Mitigation (if an objective), Reasoning (if not) 5/37

  6. Other Templates?  Protocol security frameworks and link  Configuration management security  Lifecycle management  TLS, DTLS, etc.  Logging and monitoring  Encryption standards  AES, RSA, etc.  Privacy frameworks  Identity, Authentication, and  Integrity protection Authorization  OAuth, etc. 6/37

  7. IIC Security Framework  See 7/37

  8. IETF ACE  See 8/37

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend