Building Trust in the Internet of Things

Similar documents
SECURING DEVICES IN THE INTERNET OF THINGS

Securing Devices in the Internet of Things

SECURING DEVICES IN THE INTERNET OF THINGS

Security: The Key to Affordable Unmanned Aircraft Systems

10 KEY WAYS THE FINANCIAL SERVICES INDUSTRY CAN COMBAT CYBER THREATS

Copyright

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

Vidder PrecisionAccess

Achieving End-to-End Security in the Internet of Things (IoT)

SOLUTION BRIEF. Enabling and Securing Digital Business in API Economy. Protect APIs Serving Business Critical Applications

JUST WHAT THE DOCTOR ORDERED: A SOLUTION FOR SMARTER THERAPEUTIC DEVICES PLACEHOLDER IMAGE INNOVATORS START HERE.

COMPUTER NETWORK SECURITY

VULNERABILITIES IN 2017 CODE ANALYSIS WEB APPLICATION AUTOMATED

SECURITY TESTING. Towards a safer web world

Teradata and Protegrity High-Value Protection for High-Value Data

THE EFFECTIVE APPROACH TO CYBER SECURITY VALIDATION BREACH & ATTACK SIMULATION

Solutions Business Manager Web Application Security Assessment

Protect Your Organization from Cyber Attacks

Securing Privileged Access and the SWIFT Customer Security Controls Framework (CSCF)

6 Vulnerabilities of the Retail Payment Ecosystem

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

Towards Trustworthy Internet of Things for Mission-Critical Applications. Arjmand Samuel, Ph.D. Microsoft Azure - Internet of Things

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Shifting focus: Internet of Things (IoT) from the security manufacturer's perspective

Cyberspace : Privacy and Security Issues

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Tripwire State of Cyber Hygiene Report

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

Internet of Things Toolkit for Small and Medium Businesses

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Certified Ethical Hacker (CEH)

Security Fundamentals for your Privileged Account Security Deployment

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Application and Data Security with F5 BIG-IP ASM and Oracle Database Firewall

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

KASPERSKY FRAUD PREVENTION FOR ENDPOINTS

Combating Cyber Risk in the Supply Chain

BUILDING A SMARTER SMART GRID: COUNTERACTING CYBER-THREATS IN ENERGY DISTRIBUTION

Comprehensive Database Security

Security Solutions. Overview. Business Needs

The Cyber Threat. Bob Gourley, Partner, Cognitio June 22, How we think. 1

Mobile Field Worker Security Advocate Series: Customer Conversation Guide. Research by IDC, 2015

Integrated Access Management Solutions. Access Televentures

CS 356 Operating System Security. Fall 2013

Provide you with a quick introduction to web application security Increase you awareness and knowledge of security in general Show you that any

5 Trends That Will Impact Your IT Planning in Layered Security. Executive Brief

CompTIA Security+ Malware. Threats and Vulnerabilities Vulnerability Management

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

Governance Ideas Exchange

SECURE DATA EXCHANGE

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Who s Protecting Your Keys? August 2018

OWASP Top 10 The Ten Most Critical Web Application Security Risks

Keep the Door Open for Users and Closed to Hackers

COMPLETING THE PAYMENT SECURITY PUZZLE

OWASP TOP OWASP TOP

THREAT MODELING IN SOCIAL NETWORKS. Molulaqhooa Maoyi Rotondwa Ratshidaho Sanele Macanda

Privileged Account Security: A Balanced Approach to Securing Unix Environments

TOP 10 IT SECURITY ACTIONS TO PROTECT INTERNET-CONNECTED NETWORKS AND INFORMATION

Designated Cyber Security Protection Solution for Medical Devices

A Guide to Closing All Potential VDI Security Gaps

Secure coding practices

Whitepaper on AuthShield Two Factor Authentication with SAP

MEMORY AND BEHAVIORAL PROTECTION ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

CSWAE Certified Secure Web Application Engineer

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Protect Your Endpoint, Keep Your Business Safe. White Paper. Exosphere, Inc. getexosphere.com

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Secure Technology Alliance Response: NIST IoT Security and Privacy Risk Considerations Questions

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

Completing your AWS Cloud SECURING YOUR AMAZON WEB SERVICES ENVIRONMENT

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

McAfee Embedded Control

Mobility, Security Concerns, and Avoidance

Wayward Wi-Fi. How Rogue Hotspots Can Hijack Your Data and Put Your Mobile Devices at Risk

The PKI Lie. The OWASP Foundation Attacking Certificate Based Authentication. OWASP & WASC AppSec 2007 Conference

Express Monitoring 2019

Top 10 Database Security Threats and How to Stop Them. Rob Rachwald Director of Security Strategy

Vulnerabilities in online banking applications

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

BUILDING SECURITY INTO YOUR DATA CENTER MODERNIZATION STRATEGY

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

The SANS Institute Top 20 Critical Security Controls. Compliance Guide

WIND RIVER TITANIUM CLOUD FOR TELECOMMUNICATIONS

The Top 6 WAF Essentials to Achieve Application Security Efficacy

THE BUSINESS CASE FOR OUTSIDE-IN DATA CENTER SECURITY

Frequently Asked Questions WPA2 Vulnerability (KRACK)

SentinelOne Technical Brief

Neustar Security Solutions Overview

AKAMAI CLOUD SECURITY SOLUTIONS

Application vulnerabilities and defences

Gujarat Forensic Sciences University

CYBER SECURITY AND MITIGATING RISKS

C1: Define Security Requirements

Computer Security Policy

Zero Trust on the Endpoint. Extending the Zero Trust Model from Network to Endpoint with Advanced Endpoint Protection

AN IPSWITCH WHITEPAPER. The Definitive Guide to Secure FTP

WHITEPAPER ATTIVO NETWORKS THREATDEFEND PLATFORM AND THE MITRE ATT&CK MATRIX

GUIDELINES ON MARITIME CYBER RISK MANAGEMENT

Transcription:

AN INTEL COMPANY Building Trust in the Internet of Things Developing an End-to-End Security Strategy for IoT Applications WHEN IT MATTERS, IT RUNS ON WIND RIVER

EXECUTIVE SUMMARY Recent security breaches in the Internet of Things (IoT) have brought to light the urgent imperative to protect IoT systems and the people who depend on them from external threats. Piecemeal approaches aren t working. Effective security requires an end-to-end strategy starting at the design stage and extending throughout the application lifecycle. This paper explores the six key categories of threats, the variety of mitigation measures available, and how IoT developers can implement comprehensive, integrated security solutions without compromising system performance. TABLE OF CONTENTS Executive Summary... 2 Driving Home the Need for IoT Security... 3 The Six Key Categories of Threats and how to Mitigate Them.... 3 Social Engineering... 3 Attacks on Hosted Components.... 3 Hacked Device Software... 3 Physical Attack... 4 Network Compromise.... 4 Security Misconfiguration... 4 Pre-configuration: Increase Efficiency, Reduce Complexity... 5 Wind River Helix Device Cloud: Secure Device Management and Monitoring... 5 Conclusion.... 5 2 White Paper

DRIVING HOME THE NEED FOR IOT SECURITY In July of 2015, a pair of cybersecurity researchers made news when they successfully took over the controls of a Jeep Cherokee on a highway by hacking into the car s infotainment system. The news generated widespread alarm. Despite almost daily reports of cyberthreats to critical infrastructure, banks, or government agencies, the takeover of a private automobile on the road had a far more unnerving effect on average citizens who drive every day. Although the hack was by all accounts ethical (the hackers had notified the carmaker and the driver participated in the test), it proved how easily someone with malicious intent could harm an unsuspecting populace. If the incident brought the Internet of Things into the public consciousness, it was also a wake-up call concerning the urgent need for security in IoT applications or more precisely, for a comprehensive, holistic approach to security over the entire IoT system lifecycle. No doubt there was security built into critical software components in this particular vehicle, but it was more than likely implemented in each component individually, in a patchwork approach rather than holistically, leaving gaps that made the car vulnerable. With such a wide variety of known security threat types and new ones emerging all the time, developers of IoT applications and devices can no longer rely on patchwork approaches to mitigation. They need to be thinking end-to-end rather than one-by-one. If one area is overlooked or weakened, the entire system is at risk. A comprehensive approach to security must take into account not only the entire IoT system from edge devices to the network and the cloud but also the entire system lifecycle, from development to deployment through operation and even to end-of-life. THE SIX KEY CATEGORIES OF THREATS AND HOW TO MITIGATE THEM Whether they are state-sponsored criminals, hacktivists, or simply thrill seekers trying to prove something, intruders seem tohave a countless array of techniques to find and exploit system vulnerabilities. Most security threats, however, fall into six categories. For each of these categories, IoT application developers have a number of mitigation methods at their disposal. 1. Social Engineering This term refers to the ability of hackers to obtain security credentials from legitimate users through such techniques as phishing, dumpster diving, or even personal blackmail. There is little technical recourse for social engineering techniques, as they tend to play on human behavior and psychology more than technical vulnerabilities. But that fact makes it even more important to adhere to certain fundamental safeguards, including: Strong passwords Frequent password updates Role-based permissions that restrict access to different areas of the system to specific users at designated times Following software update instructions when alerted to common vulnerabilities and exposures (CVEs) by the software provider 2. Attacks on Hosted Components These attacks include SQL injection, cross-site scripting (XSS) and other techniques used to compromise access and authentication controls in cloud-based control systems that handle large volumes of sensitive data. Countermeasures include: API authentication tokens Role-based access Application whitelisting to protect against impersonation at the cloud level 3. Hacked Device Software Hackers who gain access to software at the device level can execute a variety of techniques to disrupt or take control of the system, including denial of service, malware installation, false identities, elevation of privilege, jailbreaking, and others. Developers can employ a number of measures to mitigate this threat, such as: Secure boot: When power is first introduced to the device, the authenticity and integrity of the software on the device is verified using cryptographically generated digital signatures. This practice ensures that the device is not loading software that has been tampered with or maliciously inserted. 3 White Paper

Software updates: Keeping software up-to-date is a fundamental requirement for the secure operation of IoT applications. The responsibility usually lies with software providers to have a mechanism for providing software updates at scheduled intervals or when a CVE is identified. Secure package management: Software providers should be monitoring for CVEs, alerting customers before they become widely known, and providing updates to mitigate them. Secure package management (SPM) helps ensure the update is authentic using signature keys, thereby mitigating the threat of running software with a known vulnerability. Integrity Measurement Architecture: IMA is used to verify the authenticity of code running on the system and protect against offline disk tampering. Software isolation: Separating software components into containers ensures that a breach of one part of the system will not compromise any others. This practice effectively mitigates the threat of elevation of privilege, in which an attacker enters the system via a single component and gains higher-level authorization for access to others. 4. Physical Attack This may involve the theft of a device in order to reverse engineer or replicate and steal credentials or other sensitive data. IoT applications often entail numerous connected devices that are widely dispersed and difficult to monitor individually, making them vulnerable to various forms of tampering. While developers may not be able to ensure the physical security of a device, they can prevent hackers from using a stolen or compromised device to do further damage. Techniques include: File system encryption: In the event of a physical attack, file system encryption ensures that stolen data cannot be read or copied. Trusted Platform Modules: TPMs are a hardware-based security solution that stores encryption keys used to authenticate the hardware on which a host system is running. Remote attestation: Remote attestation technology is quickly gaining favor as a means of verifying the identities and integrity of different parts of an IoT system throughout its lifecycle. It leverages credentials that have been planted in devices pre-deployment. The devices can then be queried at any time through a management console to confirm their identities and attest that no one has tampered with them. 5. Network Compromise Commonly called man in the middle attacks, hackers use techniques such as session hijacking to enter a network to disrupt, block, or alter communications between devices and their cloud-based controllers. Network vulnerability provided the Jeep hackers with their original point of entry, which ultimately led them into the car s onboard system. Securing the network is a critical concern in IoT application development and can be achieved with network encryption methods that protect data in transit by rendering it unreadable in the event of a network breach. 6. Security Misconfiguration Perhaps the most common threat to IoT applications, the improper configuration of security elements will leave the system vulnerable to system-wide attacks intended to find and exploit weaknesses. The developer may have incorporated a number of the standard security features outlined above, but if they are not put together correctly, they render at best a false sense of security. Avoiding the risk of misconfiguration requires an end-to-end, integrated security strategy at the design stage. It is not sufficient to simply check off a list of security technologies. Once developers have mapped out and analyzed the threat model across the entire system and system lifecycle, they can begin thinking about an overall mitigation strategy and methods to protect each area of potential vulnerability. As for the magic bullet software that can scour a system and pinpoint all of its vulnerabilities? It does not exist. That s why the time to start thinking about security in an application is before it is developed and deployed, as an integral part of the design. A true end-to-end security solution must encompass the entire application lifecycle from development through the eventual decommissioning of devices. Indeed, in order to ensure that a decommissioned device is truly dead and cannot provide intruders with a path into the system, end-of-life security functionality must be implanted in the pre-deployment stage. 4 White Paper

PRE-CONFIGURATION: INCREASE EFFICIENCY, REDUCE COMPLEXITY As the Jeep example illustrates, security is an imperative for virtually any IoT application in which human safety could be threatened by a system compromise. It is arguably a prerequisite for any application from which people expect safe and reliable everyday performance without a second thought. Why, then, is it so often treated as an afterthought, secondary to system performance rather than essential to it? Developers face a big enough challenge simply building an IoT application that does what it is supposed to do. Security adds a layer of complexity, particularly as it must address a growing number of increasingly sophisticated threats. Without proper planning, building in security functionality can slow down development, drive up costs and, in some cases, impair the performance of a deployed application. But there is a solution. Developers can build IoT applications on a platform using pre-configured, integrated software components in which many security issues have already been addressed. This takes the onus off developers to identify, source, and patch together different security technologies as development progresses, resulting in a much more efficient development process, much less system complexity, and a reduced risk of security gaps due to misconfiguration. WIND RIVER HELIX DEVICE CLOUD: SECURE DEVICE MANAGEMENT AND MONITORING Wind River Helix is a portfolio of software and services designed to help developers, device manufacturers, system integrators, and operators build and manage IoT systems from the edge to the enterprise. Included in the portfolio is Wind River Helix Device Cloud, a ready-made platform for collecting data from edge devices, monitoring device performance, and managing all aspects of the device lifecycle. It incorporates a wide range of pre-configured features that enable developers to implement security measures across the device lifecycle at the design stage, including: Application whitelisting Network, data, and device encryption Embedded credentials and certificates Trusted Platform Modules Access permissioning Software isolation Integrity measurement By providing pre-integrated security components, Device Cloud helps developers mitigate the risk of misconfiguration and implement security without delaying development or compromising system performance. Moreover, Wind River Professional Services consultants are available to assist with the configuration of security components based on the threat model assessment and the unique requirements of the application. CONCLUSION Security is imperative for IoT applications, for the protection of the machines they control, and for the people who depend on their reliable performance. In fact, security is so fundamental to IoT system performance that it needs to be integrated into system design. It cannot be implemented piecemeal, but requires a wellthought-out, end-to-end strategy encompassing all aspects of the application, from the edge to the enterprise, and all stages of the application lifecycle, from development to decommissioning. Without question this adds to the challenge of IoT development. That challenge can be easily met, however, through the use of preconfigured software and security components that accelerate the implementation of security functionality and free developers to focus their attention on system performance. Secure boot Device software update mechanism SPM Wind River is a global leader in delivering software for the Internet of Things. The company s technology is found in more than 2 billion devices, backed by world-class professional services and customer support. Wind River delivers the software and expertise that enable the innovation and deployment of safe, secure, and reliable intelligent systems. 2017 Wind River Systems, Inc. The Wind River logo is a trademark of Wind River Systems, Inc., and Wind River and VxWorks are registered trademarks of Wind River Systems, Inc. Rev. 2/2017