SlideShare a Scribd company logo
1 of 33
Download to read offline
#EEwebinar
Security Fundamentals for
IoT Devices; Creating the
Internet of Secure Things
#EEwebinar
q  This webinar will be available afterwards at
www.designworldonline.com & email
q  Q&A at the end of the presentation
q  Hashtag for this webinar: #EEwebinar
Before We Start
#EEwebinar
Aimee Kalnoskas
Design World EE Network
Moderator
Alan Grau
President & Co-founder
Icon Labs
Security Fundamentals for IoT Devices; Creating the Internet of Secure Things
Meet your Presenter
#EEwebinar
IoT security
•  Why do we care about the IoT
•  What do we mean by IoT/IIoT
•  Why worry about security
•  Security standards for Industrial Automation
•  Nuts and bolts of security for IIoT devices
o  Security challenges for the IoT
o  Framework/requirements for security
o  Implementing security for IIoT devices
•  Summary/Questions
#EEwebinar
The IoT is driving businesses
$15  Trillion  economic  value  created  by  IoT  over  next  
20  years	
GE	
250  million  connected  vehicles  by  2020	
Gartner	
75%  growth  in  wireless  devices  between  now  and  
2020,  reaching  40  billion  devices	
ABI  Research	
$3  Billion  IoT  investment	
IBM	
Managed  Services  to  jump  from  $14.75  billion  in  
2013  to  $265.05  billion  in  2018	
Solarwinds
#EEwebinar
IoT
•  IoT – Using Internet connectivity to capture data from a
cornucopia of “things”; then analyze the data to create new
efficiencies and business opportunities
6	
  
#EEwebinar
Why focus on security?
•  So your devices and systems are secure
o  Hopefully by now this is self evident
•  Competitive advantage
•  Enable managed services – create revenue opportunities
•  Required to meet regulator compliance and to protect
against lawsuits and bad PR
#EEwebinar
Growing threat of cyber-attacks
#EEwebinar
How are we doing?
•  70% of new IoT devices have significant security
weaknesses – HP Labs
•  Average new IoT device has 25 security vulnerabilities –
HP Labs
•  “We have been able to penetrate every system we’ve
targeted” – Kevin Mitnick
#EEwebinar
Security Standards
•  Industrial automation
o  ISA/IEC 62443:EDSA
•  www.isa.org/isa99/
•  Federal Mandate/NIST Cybersecurity Framework
o  US Federal Executive Order (EO) 13636
•  www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure-
cybersecurity
•  Power Grid/Smart Grid
o  NERC/CIP
•  www.nerc.com/pa/Stand/Pages/CIPStandards.aspx
10	
  
#EEwebinar
Regulatory Compliance: Major Driver
•  Regulatory compliance is frequently a driving force for
implementing security
o  Quantifiable
o  Understandable
•  Executives who struggle to understand nuanced security
tradeoffs CAN understand compliance
11	
  
#EEwebinar
Security Standards
•  Many standards, but common themes
o  Identity management
o  Mutual authentication/authorization
o  Audit
o  Protection
o  Secure communication
o  Attack detection and mitigation
o  Security management and visibility
12	
  
#EEwebinar
IoT Security Challenges
Scalability	
• 8/16  bit  MCU  based	
• 32  bit  RTOS  based	
• 32  bit  Linux/Android	
Fragmented  market	
• HW  vendors	
• SW  vendors	
• Vertical  markets	
• End  Users	
Diverse  
communication	
• Wi-­‐‑Fi,  Ethernet,  TCP/IP	
• ZigBee,  Bluetooth,  BLE	
Broad  a^ack  surfaces	
• Multiple  communication  
interfaces	
• Devices  accessible  to  
hackers
#EEwebinar
Classes of IoT Devices
#EEwebinar
Classes of IoT Devices
Class  1  device	
• Very  small  
devices  (light  
bulbs,  sensors)	
• 8/16  bit  MCU	
• ZigBee,  MESH  
networking  	
• Limited  CPU  
cycles,  memory	
• Bare  metal,  
scheduler  or  
kernel  such  as  
FreeRTOS  or  uC/
OS-­‐‑III	
Class  2  device	
• Small,  low  cost  
devices  but  
moderately  
powerful  devices  
(medical  devices,  
telematics)	
• 32  bit  MCU	
• Cellular,  BLE,  
Bluetooth,  
Ethernet,  or  WiFi	
• RTOS  only  –  not  
Linux	
Class  3  device	
• More  expensive,  
more  powerful  
devices  such  as  
larger  medical  
devices,  	
• 32  bit  MPU	
• Ethernet  or  WiFi	
• RTOS  or  
embedded  Linux	
Class  4  device	
• Gateway  or  
high-­‐‑end  
endpoints	
• 32/64  bit  MPU	
• Embedded  Linux  
or  Android	
• Multiple  
protocols  
including  
Ethernet,  WiFi  
and  ZigBee,  BLE  
or  Bluetooth
#EEwebinar
Perimeter security
•  One solution: More Perimeters
o  Expensive!
o  Doesn’t address fundamental issues
•  Security perimeters are only a partial solution
o  IoT devices may not be inside of a security perimeter
o  Perimeters can be compromised
o  Insider threats account for more than 50% of cyber-incidents
16	
  
#EEwebinar
Secure the devices
•  Don’t rely only on the perimeter
•  Build the required security into the device
o  Order of magnitude lower cost
o  Addresses basic security needs such as secure boot and security
management
17	
  
#EEwebinar
Challenge of IoT Device Security
•  IoT devices are embedded devices
o  Embedded Linux, Android or RTOS-based
o  Limited resources for security software
o  Traditional IT security solutions won’t work
•  Not just about data – protecting critical operations
•  Need new solutions designed for embedded devices
o  Build it yourself
o  Find a commercial solution
18	
  
#EEwebinar
OT devices, IT security
•  All devices must be
o  Protected
o  Trusted
o  Authenticated
o  Secured
o  Managed
o  Visible
19	
  
#EEwebinar
Security Requirements
•  Harden the device
o  Hypervisor, secure boot, intrusion detection
o  Leverage hardware security features
•  Data protection
o  Data at rest, data in motion
o  key and password obfuscation
•  Secure communication
o  Security protocols, mutual authentication, firewall
•  Visibility and management
o  Management system integration (policy updates, events)
20	
  
#EEwebinar
Security Framework
21	
  
o  Designed for
embedded use
o  Portable
o  Small footprint
o  Minimal
performance
overhead
#EEwebinar
Hardening the device
•  Leverage hardware security features
o  TPM/TEE
o  Secure device ID
o  Crypto acceleration
•  Hypervisor
•  Secure boot
•  Intrusion detection
22	
  
#EEwebinar
Leverage HW Security
Features
•  Trusted Platform Module (TPM)
o  International standard for a secure
cryptographic processor
o  Dedicated microprocessor designed
to enable secure devices
o  Secure key storage
o  Key generation
o  Encryption/decryption
•  Provides foundation for security
#EEwebinar
Hypervisor
•  Enables partitioning to increase security
o  Security processing & management isolated from user processing
•  Security breach in one partition cannot impact other
partitions
24	
  
#EEwebinar
Secure Boot
Before loading software, verify
•  it came from the OEM
•  it has not been tampered with
Hardware  TPM/TEE  can  provide	
•  Protected  key  storage	
•  Protected  signature  storage	
•  Signature  generation
#EEwebinar
IDS/IPS for Embedded Devices
•  Communication based IDS/IPS
o  Report firewall rules violations
o  Protocol specific DPI
o  Detect scans, probing
•  Configuration based IDS/IPS
o  Detect unauthorized changes to
firmware, libraries and data files
•  Report events to a security management
system
#EEwebinar
•  Data at rest: device is off, how is the data protected?
o  Encrypted files, full disk encryption
•  Data in use: while generated or being processed - is it secured?
o  Obfuscation, MMU based protection methods, user privileges
o  Protect against memory scraping attacks
•  Data in transit: leaving the device, is it being hijacked?
o  Security protocols
Securing Device Data
#EEwebinar
Secure Communication
•  Security protocols
o  IPsec/IKE (VPN)
o  SSH / SSL/TLS/DTLS
•  Authentication
o  X.509 / Kerberos
o  RADIUS
o  TACACS+
o  802.1X
#EEwebinar
Embedded Firewall
•  Endpoint firewall for
embedded/RTOS systems
•  Rules based filtering (IP
addresses, ports, protocols)
•  Stateful packet inspection
•  Threshold filtering
•  Protocol specific deep packet
inspection
•  IDS alerts
#EEwebinar
Management and visibility
•  Policy management
•  Event reporting
•  Situational awareness
•  Status monitoring
•  Secure firmware updates
30	
  
#EEwebinar
Summary
•  Common requirements
o  Industry standards help define security requirements
o  Many standards, but common requirements
•  Utilize a security framework that provides building blocks
to enable and support the various standards
•  Integrate security into the device itself – don’t just rely on a
secure perimeter
#EEwebinar
Aimee Kalnoskas
Moderator
Design World EE Network
akalnoskas@wtwhmedia.com
@DW_Aimee
Alan Grau
President & Co-founder
Icon Labs
Alan.grau@iconlabs.com
Questions?
Security Fundamentals for IoT Devices; Creating the Internet of Secure Things
#EEwebinar
Thank You
q  This webinar will be available at
designworldonline.com & email
q  Tweet with hashtag #EEwebinar
q  Connect with Design World
q  Discuss this on EngineeringExchange.com

More Related Content

What's hot

Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of ThingsChristopher Frenz
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay KumarOWASP Delhi
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of ThingsBryan Len
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoTWSO2
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process EC-Council
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsJeff Katz
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against themNick Allott
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESManisha Luthra
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prustyamarprusty
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Securityshiriskumar
 

What's hot (20)

IOT Security
IOT SecurityIOT Security
IOT Security
 
Securing the Internet of Things
Securing the Internet of ThingsSecuring the Internet of Things
Securing the Internet of Things
 
IoT Security by Sanjay Kumar
IoT Security by Sanjay KumarIoT Security by Sanjay Kumar
IoT Security by Sanjay Kumar
 
Iot Security, Internet of Things
Iot Security, Internet of ThingsIot Security, Internet of Things
Iot Security, Internet of Things
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Security challenges for IoT
Security challenges for IoTSecurity challenges for IoT
Security challenges for IoT
 
IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process IoT Security – Executing an Effective Security Testing Process
IoT Security – Executing an Effective Security Testing Process
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
IoT Security: Cases and Methods
IoT Security: Cases and MethodsIoT Security: Cases and Methods
IoT Security: Cases and Methods
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Privacy and Security in the Internet of Things
Privacy and Security in the Internet of ThingsPrivacy and Security in the Internet of Things
Privacy and Security in the Internet of Things
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IoT Security Middleware: evaluating the threats and protecting against them
 IoT Security Middleware: evaluating the threats and protecting against them IoT Security Middleware: evaluating the threats and protecting against them
IoT Security Middleware: evaluating the threats and protecting against them
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURESON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
ON THE SECURITY AND PRIVACY OF INTERNET OF THINGS ARCHITECTURES
 
Iot security amar prusty
Iot security amar prustyIot security amar prusty
Iot security amar prusty
 
Internet of Things (IoT) Security
Internet of Things (IoT) SecurityInternet of Things (IoT) Security
Internet of Things (IoT) Security
 

Viewers also liked

Open Source For Self Classification of Data Stream in the Internet Of Things.
Open Source For Self Classification of Data Stream in the Internet Of Things. Open Source For Self Classification of Data Stream in the Internet Of Things.
Open Source For Self Classification of Data Stream in the Internet Of Things. MeshDynamics
 
BUTLER project presentation
BUTLER project presentationBUTLER project presentation
BUTLER project presentationbutler-iot
 
BUTLER project overview
BUTLER project overviewBUTLER project overview
BUTLER project overviewbutler-iot
 
Internet of things –
Internet of things –Internet of things –
Internet of things –Mathews Job
 
Building the Internet of Things with open source and Eclipse IoT projects (Be...
Building the Internet of Things with open source and Eclipse IoT projects (Be...Building the Internet of Things with open source and Eclipse IoT projects (Be...
Building the Internet of Things with open source and Eclipse IoT projects (Be...AGILE IoT
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility ForensicsSabidur Rahman
 
Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)Salahuddin ElKazak
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of thingsMonika Keerthi
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystemrahulbindra
 
Embedded Security and the IoT
Embedded Security and the IoTEmbedded Security and the IoT
Embedded Security and the IoTteam-WIBU
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforcePriyanka Aash
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityPriyanka Aash
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security OverviewAmazon Web Services
 
Internet of Things (IoT) protocols COAP MQTT OSCON2014
Internet of Things (IoT) protocols  COAP MQTT OSCON2014Internet of Things (IoT) protocols  COAP MQTT OSCON2014
Internet of Things (IoT) protocols COAP MQTT OSCON2014Vidhya Gholkar
 

Viewers also liked (20)

Open Source For Self Classification of Data Stream in the Internet Of Things.
Open Source For Self Classification of Data Stream in the Internet Of Things. Open Source For Self Classification of Data Stream in the Internet Of Things.
Open Source For Self Classification of Data Stream in the Internet Of Things.
 
BUTLER project presentation
BUTLER project presentationBUTLER project presentation
BUTLER project presentation
 
BUTLER project overview
BUTLER project overviewBUTLER project overview
BUTLER project overview
 
Internet of things –
Internet of things –Internet of things –
Internet of things –
 
Building the Internet of Things with open source and Eclipse IoT projects (Be...
Building the Internet of Things with open source and Eclipse IoT projects (Be...Building the Internet of Things with open source and Eclipse IoT projects (Be...
Building the Internet of Things with open source and Eclipse IoT projects (Be...
 
IoT Mobility Forensics
IoT Mobility ForensicsIoT Mobility Forensics
IoT Mobility Forensics
 
Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)Research in Internet of Things' Operating Systems (IoT OS's)
Research in Internet of Things' Operating Systems (IoT OS's)
 
Security challenges for internet of things
Security challenges for internet of thingsSecurity challenges for internet of things
Security challenges for internet of things
 
Security in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) EcosystemSecurity in Internet of Things(IoT) Ecosystem
Security in Internet of Things(IoT) Ecosystem
 
Embedded Security and the IoT
Embedded Security and the IoTEmbedded Security and the IoT
Embedded Security and the IoT
 
Keynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security TaskforceKeynote Session : Internet Of Things (IOT) Security Taskforce
Keynote Session : Internet Of Things (IOT) Security Taskforce
 
Keynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring SecurityKeynote Session : NIST - Cyber Security Framework Measuring Security
Keynote Session : NIST - Cyber Security Framework Measuring Security
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
IoT End-to-End Security Overview
IoT End-to-End Security OverviewIoT End-to-End Security Overview
IoT End-to-End Security Overview
 
Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
Internet of Things (IoT) protocols COAP MQTT OSCON2014
Internet of Things (IoT) protocols  COAP MQTT OSCON2014Internet of Things (IoT) protocols  COAP MQTT OSCON2014
Internet of Things (IoT) protocols COAP MQTT OSCON2014
 

Similar to Security Fundamental for IoT Devices; Creating the Internet of Secure Things

Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...ClicTest
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is HereLancope, Inc.
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking BadNUS-ISS
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iPrecisely
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT deviceAbhijeet Rane
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial ThingsSenrio
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!Justin Black
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practiceteam-WIBU
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cCharles Li
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT SuccessElectric Imp
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranKoenig Solutions Ltd.
 

Similar to Security Fundamental for IoT Devices; Creating the Internet of Secure Things (20)

Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
IoT security
IoT securityIoT security
IoT security
 
Security Issues in Internet of Things
Security Issues in Internet of ThingsSecurity Issues in Internet of Things
Security Issues in Internet of Things
 
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
 
The Internet of Everything is Here
The Internet of Everything is HereThe Internet of Everything is Here
The Internet of Everything is Here
 
IoT – Breaking Bad
IoT – Breaking BadIoT – Breaking Bad
IoT – Breaking Bad
 
Understanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM iUnderstanding Zero Trust Security for IBM i
Understanding Zero Trust Security for IBM i
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
IIoT Endpoint Security
IIoT Endpoint Security IIoT Endpoint Security
IIoT Endpoint Security
 
How to create a secure IoT device
How to create a secure IoT deviceHow to create a secure IoT device
How to create a secure IoT device
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
The Insecurity of Industrial Things
The Insecurity of Industrial ThingsThe Insecurity of Industrial Things
The Insecurity of Industrial Things
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
Hack one iot device, break them all!
Hack one iot device, break them all!Hack one iot device, break them all!
Hack one iot device, break them all!
 
pptt.pptx
pptt.pptxpptt.pptx
pptt.pptx
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Io t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425cIo t security defense in depth charles li v1 20180425c
Io t security defense in depth charles li v1 20180425c
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 
IoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.PrabhakaranIoT Security, Threats and Challenges By V.P.Prabhakaran
IoT Security, Threats and Challenges By V.P.Prabhakaran
 

More from Design World

Best practices for optimizing performance and reducing costs when selecting a...
Best practices for optimizing performance and reducing costs when selecting a...Best practices for optimizing performance and reducing costs when selecting a...
Best practices for optimizing performance and reducing costs when selecting a...Design World
 
Five Steps to Optimize Casting and Eliminate Defects
Five Steps to Optimize Casting and Eliminate DefectsFive Steps to Optimize Casting and Eliminate Defects
Five Steps to Optimize Casting and Eliminate DefectsDesign World
 
Meeting the Motion Needs of Flexible Automation
Meeting the Motion Needs of Flexible AutomationMeeting the Motion Needs of Flexible Automation
Meeting the Motion Needs of Flexible AutomationDesign World
 
Proper coupling selection: what you’re probably missing
Proper coupling selection: what you’re probably missingProper coupling selection: what you’re probably missing
Proper coupling selection: what you’re probably missingDesign World
 
Curved Motion System Design for Machinery and Automation
Curved Motion System Design for Machinery and AutomationCurved Motion System Design for Machinery and Automation
Curved Motion System Design for Machinery and AutomationDesign World
 
See How the SOLIDWORKS Ecosystem Delivers on Design Innovation
See How the SOLIDWORKS Ecosystem Delivers on Design InnovationSee How the SOLIDWORKS Ecosystem Delivers on Design Innovation
See How the SOLIDWORKS Ecosystem Delivers on Design InnovationDesign World
 
Proper Hose Assembly Guidelines
Proper Hose Assembly GuidelinesProper Hose Assembly Guidelines
Proper Hose Assembly GuidelinesDesign World
 
Product Development Ecosystems: Defining Your Value in the Digital Age
Product Development Ecosystems: Defining Your Value in the Digital AgeProduct Development Ecosystems: Defining Your Value in the Digital Age
Product Development Ecosystems: Defining Your Value in the Digital AgeDesign World
 
Challenges & Emerging Solutions through Micro Molding
Challenges & Emerging Solutions through Micro MoldingChallenges & Emerging Solutions through Micro Molding
Challenges & Emerging Solutions through Micro MoldingDesign World
 
Encoder integration in 2016: New modes of installation, networking, and more
Encoder integration in 2016: New modes of installation, networking, and moreEncoder integration in 2016: New modes of installation, networking, and more
Encoder integration in 2016: New modes of installation, networking, and moreDesign World
 
Why should you make tooling with 3D printing?
Why should you make tooling with 3D printing?Why should you make tooling with 3D printing?
Why should you make tooling with 3D printing?Design World
 
Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...
Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...
Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...Design World
 
New Innovations in Linear Guides for Transportation and Automation
New Innovations in Linear Guides for Transportation and AutomationNew Innovations in Linear Guides for Transportation and Automation
New Innovations in Linear Guides for Transportation and AutomationDesign World
 
Clean-in-place: how to ensure food safety while maintaining equipment effecti...
Clean-in-place: how to ensure food safety while maintaining equipment effecti...Clean-in-place: how to ensure food safety while maintaining equipment effecti...
Clean-in-place: how to ensure food safety while maintaining equipment effecti...Design World
 
Advanced Motor Control Technologies – Part 2
Advanced Motor Control Technologies – Part 2Advanced Motor Control Technologies – Part 2
Advanced Motor Control Technologies – Part 2Design World
 
Advanced Motor Control Technologies – Part 1
Advanced Motor Control Technologies – Part 1Advanced Motor Control Technologies – Part 1
Advanced Motor Control Technologies – Part 1Design World
 
Understanding Hydraulic Pump Designs
Understanding Hydraulic Pump DesignsUnderstanding Hydraulic Pump Designs
Understanding Hydraulic Pump DesignsDesign World
 
Prototype Smarter – transitioning to production faster and more effectively
 Prototype Smarter – transitioning to production faster and more effectively Prototype Smarter – transitioning to production faster and more effectively
Prototype Smarter – transitioning to production faster and more effectivelyDesign World
 
How to Build Rotary Indexing Tables for Specific Applications
How to Build Rotary Indexing Tables for Specific ApplicationsHow to Build Rotary Indexing Tables for Specific Applications
How to Build Rotary Indexing Tables for Specific ApplicationsDesign World
 
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance StormWe Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance StormDesign World
 

More from Design World (20)

Best practices for optimizing performance and reducing costs when selecting a...
Best practices for optimizing performance and reducing costs when selecting a...Best practices for optimizing performance and reducing costs when selecting a...
Best practices for optimizing performance and reducing costs when selecting a...
 
Five Steps to Optimize Casting and Eliminate Defects
Five Steps to Optimize Casting and Eliminate DefectsFive Steps to Optimize Casting and Eliminate Defects
Five Steps to Optimize Casting and Eliminate Defects
 
Meeting the Motion Needs of Flexible Automation
Meeting the Motion Needs of Flexible AutomationMeeting the Motion Needs of Flexible Automation
Meeting the Motion Needs of Flexible Automation
 
Proper coupling selection: what you’re probably missing
Proper coupling selection: what you’re probably missingProper coupling selection: what you’re probably missing
Proper coupling selection: what you’re probably missing
 
Curved Motion System Design for Machinery and Automation
Curved Motion System Design for Machinery and AutomationCurved Motion System Design for Machinery and Automation
Curved Motion System Design for Machinery and Automation
 
See How the SOLIDWORKS Ecosystem Delivers on Design Innovation
See How the SOLIDWORKS Ecosystem Delivers on Design InnovationSee How the SOLIDWORKS Ecosystem Delivers on Design Innovation
See How the SOLIDWORKS Ecosystem Delivers on Design Innovation
 
Proper Hose Assembly Guidelines
Proper Hose Assembly GuidelinesProper Hose Assembly Guidelines
Proper Hose Assembly Guidelines
 
Product Development Ecosystems: Defining Your Value in the Digital Age
Product Development Ecosystems: Defining Your Value in the Digital AgeProduct Development Ecosystems: Defining Your Value in the Digital Age
Product Development Ecosystems: Defining Your Value in the Digital Age
 
Challenges & Emerging Solutions through Micro Molding
Challenges & Emerging Solutions through Micro MoldingChallenges & Emerging Solutions through Micro Molding
Challenges & Emerging Solutions through Micro Molding
 
Encoder integration in 2016: New modes of installation, networking, and more
Encoder integration in 2016: New modes of installation, networking, and moreEncoder integration in 2016: New modes of installation, networking, and more
Encoder integration in 2016: New modes of installation, networking, and more
 
Why should you make tooling with 3D printing?
Why should you make tooling with 3D printing?Why should you make tooling with 3D printing?
Why should you make tooling with 3D printing?
 
Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...
Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...
Ethernet or EtherCAT for Motion Control: Choosing the Right Network for Your ...
 
New Innovations in Linear Guides for Transportation and Automation
New Innovations in Linear Guides for Transportation and AutomationNew Innovations in Linear Guides for Transportation and Automation
New Innovations in Linear Guides for Transportation and Automation
 
Clean-in-place: how to ensure food safety while maintaining equipment effecti...
Clean-in-place: how to ensure food safety while maintaining equipment effecti...Clean-in-place: how to ensure food safety while maintaining equipment effecti...
Clean-in-place: how to ensure food safety while maintaining equipment effecti...
 
Advanced Motor Control Technologies – Part 2
Advanced Motor Control Technologies – Part 2Advanced Motor Control Technologies – Part 2
Advanced Motor Control Technologies – Part 2
 
Advanced Motor Control Technologies – Part 1
Advanced Motor Control Technologies – Part 1Advanced Motor Control Technologies – Part 1
Advanced Motor Control Technologies – Part 1
 
Understanding Hydraulic Pump Designs
Understanding Hydraulic Pump DesignsUnderstanding Hydraulic Pump Designs
Understanding Hydraulic Pump Designs
 
Prototype Smarter – transitioning to production faster and more effectively
 Prototype Smarter – transitioning to production faster and more effectively Prototype Smarter – transitioning to production faster and more effectively
Prototype Smarter – transitioning to production faster and more effectively
 
How to Build Rotary Indexing Tables for Specific Applications
How to Build Rotary Indexing Tables for Specific ApplicationsHow to Build Rotary Indexing Tables for Specific Applications
How to Build Rotary Indexing Tables for Specific Applications
 
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance StormWe Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
We Got a Warning Letter – Now What? How to Keep Calm in a Compliance Storm
 

Recently uploaded

Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptxNikhil Raut
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...121011101441
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsDILIPKUMARMONDAL6
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the weldingMuhammadUzairLiaqat
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...asadnawaz62
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girlsssuser7cb4ff
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgsaravananr517913
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingBootNeck1
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfROCENODodongVILLACER
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptMadan Karki
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - GuideGOPINATHS437943
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating SystemRashmi Bhat
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm Systemirfanmechengr
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptNarmatha D
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating SystemRashmi Bhat
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdfCaalaaAbdulkerim
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsSachinPawar510423
 

Recently uploaded (20)

Steel Structures - Building technology.pptx
Steel Structures - Building technology.pptxSteel Structures - Building technology.pptx
Steel Structures - Building technology.pptx
 
Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...Instrumentation, measurement and control of bio process parameters ( Temperat...
Instrumentation, measurement and control of bio process parameters ( Temperat...
 
The SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teamsThe SRE Report 2024 - Great Findings for the teams
The SRE Report 2024 - Great Findings for the teams
 
welding defects observed during the welding
welding defects observed during the weldingwelding defects observed during the welding
welding defects observed during the welding
 
complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...complete construction, environmental and economics information of biomass com...
complete construction, environmental and economics information of biomass com...
 
Call Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call GirlsCall Girls Narol 7397865700 Independent Call Girls
Call Girls Narol 7397865700 Independent Call Girls
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfgUnit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
Unit7-DC_Motors nkkjnsdkfnfcdfknfdgfggfg
 
System Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event SchedulingSystem Simulation and Modelling with types and Event Scheduling
System Simulation and Modelling with types and Event Scheduling
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Risk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdfRisk Assessment For Installation of Drainage Pipes.pdf
Risk Assessment For Installation of Drainage Pipes.pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
Indian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.pptIndian Dairy Industry Present Status and.ppt
Indian Dairy Industry Present Status and.ppt
 
Transport layer issues and challenges - Guide
Transport layer issues and challenges - GuideTransport layer issues and challenges - Guide
Transport layer issues and challenges - Guide
 
Main Memory Management in Operating System
Main Memory Management in Operating SystemMain Memory Management in Operating System
Main Memory Management in Operating System
 
Class 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm SystemClass 1 | NFPA 72 | Overview Fire Alarm System
Class 1 | NFPA 72 | Overview Fire Alarm System
 
Industrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.pptIndustrial Safety Unit-IV workplace health and safety.ppt
Industrial Safety Unit-IV workplace health and safety.ppt
 
Virtual memory management in Operating System
Virtual memory management in Operating SystemVirtual memory management in Operating System
Virtual memory management in Operating System
 
Research Methodology for Engineering pdf
Research Methodology for Engineering pdfResearch Methodology for Engineering pdf
Research Methodology for Engineering pdf
 
Vishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documentsVishratwadi & Ghorpadi Bridge Tender documents
Vishratwadi & Ghorpadi Bridge Tender documents
 

Security Fundamental for IoT Devices; Creating the Internet of Secure Things

  • 1. #EEwebinar Security Fundamentals for IoT Devices; Creating the Internet of Secure Things
  • 2. #EEwebinar q  This webinar will be available afterwards at www.designworldonline.com & email q  Q&A at the end of the presentation q  Hashtag for this webinar: #EEwebinar Before We Start
  • 3. #EEwebinar Aimee Kalnoskas Design World EE Network Moderator Alan Grau President & Co-founder Icon Labs Security Fundamentals for IoT Devices; Creating the Internet of Secure Things Meet your Presenter
  • 4. #EEwebinar IoT security •  Why do we care about the IoT •  What do we mean by IoT/IIoT •  Why worry about security •  Security standards for Industrial Automation •  Nuts and bolts of security for IIoT devices o  Security challenges for the IoT o  Framework/requirements for security o  Implementing security for IIoT devices •  Summary/Questions
  • 5. #EEwebinar The IoT is driving businesses $15  Trillion  economic  value  created  by  IoT  over  next   20  years GE 250  million  connected  vehicles  by  2020 Gartner 75%  growth  in  wireless  devices  between  now  and   2020,  reaching  40  billion  devices ABI  Research $3  Billion  IoT  investment IBM Managed  Services  to  jump  from  $14.75  billion  in   2013  to  $265.05  billion  in  2018 Solarwinds
  • 6. #EEwebinar IoT •  IoT – Using Internet connectivity to capture data from a cornucopia of “things”; then analyze the data to create new efficiencies and business opportunities 6  
  • 7. #EEwebinar Why focus on security? •  So your devices and systems are secure o  Hopefully by now this is self evident •  Competitive advantage •  Enable managed services – create revenue opportunities •  Required to meet regulator compliance and to protect against lawsuits and bad PR
  • 9. #EEwebinar How are we doing? •  70% of new IoT devices have significant security weaknesses – HP Labs •  Average new IoT device has 25 security vulnerabilities – HP Labs •  “We have been able to penetrate every system we’ve targeted” – Kevin Mitnick
  • 10. #EEwebinar Security Standards •  Industrial automation o  ISA/IEC 62443:EDSA •  www.isa.org/isa99/ •  Federal Mandate/NIST Cybersecurity Framework o  US Federal Executive Order (EO) 13636 •  www.whitehouse.gov/the-press-office/2013/02/12/executive-order-improving-critical-infrastructure- cybersecurity •  Power Grid/Smart Grid o  NERC/CIP •  www.nerc.com/pa/Stand/Pages/CIPStandards.aspx 10  
  • 11. #EEwebinar Regulatory Compliance: Major Driver •  Regulatory compliance is frequently a driving force for implementing security o  Quantifiable o  Understandable •  Executives who struggle to understand nuanced security tradeoffs CAN understand compliance 11  
  • 12. #EEwebinar Security Standards •  Many standards, but common themes o  Identity management o  Mutual authentication/authorization o  Audit o  Protection o  Secure communication o  Attack detection and mitigation o  Security management and visibility 12  
  • 13. #EEwebinar IoT Security Challenges Scalability • 8/16  bit  MCU  based • 32  bit  RTOS  based • 32  bit  Linux/Android Fragmented  market • HW  vendors • SW  vendors • Vertical  markets • End  Users Diverse   communication • Wi-­‐‑Fi,  Ethernet,  TCP/IP • ZigBee,  Bluetooth,  BLE Broad  a^ack  surfaces • Multiple  communication   interfaces • Devices  accessible  to   hackers
  • 15. #EEwebinar Classes of IoT Devices Class  1  device • Very  small   devices  (light   bulbs,  sensors) • 8/16  bit  MCU • ZigBee,  MESH   networking   • Limited  CPU   cycles,  memory • Bare  metal,   scheduler  or   kernel  such  as   FreeRTOS  or  uC/ OS-­‐‑III Class  2  device • Small,  low  cost   devices  but   moderately   powerful  devices   (medical  devices,   telematics) • 32  bit  MCU • Cellular,  BLE,   Bluetooth,   Ethernet,  or  WiFi • RTOS  only  –  not   Linux Class  3  device • More  expensive,   more  powerful   devices  such  as   larger  medical   devices,   • 32  bit  MPU • Ethernet  or  WiFi • RTOS  or   embedded  Linux Class  4  device • Gateway  or   high-­‐‑end   endpoints • 32/64  bit  MPU • Embedded  Linux   or  Android • Multiple   protocols   including   Ethernet,  WiFi   and  ZigBee,  BLE   or  Bluetooth
  • 16. #EEwebinar Perimeter security •  One solution: More Perimeters o  Expensive! o  Doesn’t address fundamental issues •  Security perimeters are only a partial solution o  IoT devices may not be inside of a security perimeter o  Perimeters can be compromised o  Insider threats account for more than 50% of cyber-incidents 16  
  • 17. #EEwebinar Secure the devices •  Don’t rely only on the perimeter •  Build the required security into the device o  Order of magnitude lower cost o  Addresses basic security needs such as secure boot and security management 17  
  • 18. #EEwebinar Challenge of IoT Device Security •  IoT devices are embedded devices o  Embedded Linux, Android or RTOS-based o  Limited resources for security software o  Traditional IT security solutions won’t work •  Not just about data – protecting critical operations •  Need new solutions designed for embedded devices o  Build it yourself o  Find a commercial solution 18  
  • 19. #EEwebinar OT devices, IT security •  All devices must be o  Protected o  Trusted o  Authenticated o  Secured o  Managed o  Visible 19  
  • 20. #EEwebinar Security Requirements •  Harden the device o  Hypervisor, secure boot, intrusion detection o  Leverage hardware security features •  Data protection o  Data at rest, data in motion o  key and password obfuscation •  Secure communication o  Security protocols, mutual authentication, firewall •  Visibility and management o  Management system integration (policy updates, events) 20  
  • 21. #EEwebinar Security Framework 21   o  Designed for embedded use o  Portable o  Small footprint o  Minimal performance overhead
  • 22. #EEwebinar Hardening the device •  Leverage hardware security features o  TPM/TEE o  Secure device ID o  Crypto acceleration •  Hypervisor •  Secure boot •  Intrusion detection 22  
  • 23. #EEwebinar Leverage HW Security Features •  Trusted Platform Module (TPM) o  International standard for a secure cryptographic processor o  Dedicated microprocessor designed to enable secure devices o  Secure key storage o  Key generation o  Encryption/decryption •  Provides foundation for security
  • 24. #EEwebinar Hypervisor •  Enables partitioning to increase security o  Security processing & management isolated from user processing •  Security breach in one partition cannot impact other partitions 24  
  • 25. #EEwebinar Secure Boot Before loading software, verify •  it came from the OEM •  it has not been tampered with Hardware  TPM/TEE  can  provide •  Protected  key  storage •  Protected  signature  storage •  Signature  generation
  • 26. #EEwebinar IDS/IPS for Embedded Devices •  Communication based IDS/IPS o  Report firewall rules violations o  Protocol specific DPI o  Detect scans, probing •  Configuration based IDS/IPS o  Detect unauthorized changes to firmware, libraries and data files •  Report events to a security management system
  • 27. #EEwebinar •  Data at rest: device is off, how is the data protected? o  Encrypted files, full disk encryption •  Data in use: while generated or being processed - is it secured? o  Obfuscation, MMU based protection methods, user privileges o  Protect against memory scraping attacks •  Data in transit: leaving the device, is it being hijacked? o  Security protocols Securing Device Data
  • 28. #EEwebinar Secure Communication •  Security protocols o  IPsec/IKE (VPN) o  SSH / SSL/TLS/DTLS •  Authentication o  X.509 / Kerberos o  RADIUS o  TACACS+ o  802.1X
  • 29. #EEwebinar Embedded Firewall •  Endpoint firewall for embedded/RTOS systems •  Rules based filtering (IP addresses, ports, protocols) •  Stateful packet inspection •  Threshold filtering •  Protocol specific deep packet inspection •  IDS alerts
  • 30. #EEwebinar Management and visibility •  Policy management •  Event reporting •  Situational awareness •  Status monitoring •  Secure firmware updates 30  
  • 31. #EEwebinar Summary •  Common requirements o  Industry standards help define security requirements o  Many standards, but common requirements •  Utilize a security framework that provides building blocks to enable and support the various standards •  Integrate security into the device itself – don’t just rely on a secure perimeter
  • 32. #EEwebinar Aimee Kalnoskas Moderator Design World EE Network akalnoskas@wtwhmedia.com @DW_Aimee Alan Grau President & Co-founder Icon Labs Alan.grau@iconlabs.com Questions? Security Fundamentals for IoT Devices; Creating the Internet of Secure Things
  • 33. #EEwebinar Thank You q  This webinar will be available at designworldonline.com & email q  Tweet with hashtag #EEwebinar q  Connect with Design World q  Discuss this on EngineeringExchange.com