Strong Security Elements for IoT Manufacturing

Similar documents
hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

PKI is Alive and Well: The Symantec Managed PKI Service

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

Achieving End-to-End Security in the Internet of Things (IoT)

Introduction to Device Trust Architecture

Identity Management as a Service

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Accelerate Your Cloud Journey

Implementing security has never been easier. Infineon Security Partner Network.

Windows 10 IoT Core Azure Connectivity and Security

Deliver Data Protection Services that Boost Revenues and Margins

Cloud Computing: Making the Right Choice for Your Organization

New Approaches to Connected Device Security

Copyright 2012 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice.

Mobile: Purely a Powerful Platform; Or Panacea?

Jim Reavis CEO and Founder Cloud Security Alliance December 2017

Accelerate Your Enterprise Private Cloud Initiative

iotrust Security Solutions

Building firmware update: The devil is in the details

Security Models for Cloud

Comodo Certificate Manager

GLOBAL PKI TRENDS STUDY

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

Spotlight on IoT Security. Choose the right security for the Internet of Things.

Agenda GDPR Overview & Requirements IBM Secure Virtualization Solution Overview Summary / Call to Action Q & A 2

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

BYOD Success Kit. Table of Contents. Current state of BYOD in enterprise Checklist for BYOD Success Helpful Pilot Tips

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Cloud Computing Introduction & Offerings from IBM

Windows IoT Security. Jackie Chang Sr. Program Manager

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos

The Oracle Trust Fabric Securing the Cloud Journey

The Device Has Left the Building

Who s Protecting Your Keys? August 2018

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

COMPTIA CLO-001 EXAM QUESTIONS & ANSWERS

ASIA PKI Forum Overcome PKI Deployment Obstacles. Terry Leahy, CISSP Vice President, Wells Fargo Sept 15th, 2003

Data Management and Security in the GDPR Era

GlobalSign Integration Guide

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

Cybersecurity with Automated Certificate and Password Management for Surveillance

Adaptive Authentication Adapter for Citrix XenApp. Adaptive Authentication in Citrix XenApp Environments. Solution Brief

Mobile Devices prioritize User Experience

Integration Technologies Group, Inc. Uncompromising Performance

EXAM - CL CompTIA Cloud Essentials Exam. Buy Full Product.

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

GDPR Update and ENISA guidelines

Provisioning secure Identity for Microcontroller based IoT Devices

SECURING THE CONNECTED ENTERPRISE.

Challenges 3. HAWK Introduction 4. Key Benefits 6. About Gavin Technologies 7. Our Security Practice 8. Security Services Approach 9

Zero Trust with Okta: A Modern Approach to Secure Access from Anywhere. How Okta enables a Zero Trust solution for our customers

Paper. Delivering Strong Security in a Hyperconverged Data Center Environment

BUILDING the VIRtUAL enterprise

FiXs - Federated and Secure Identity Management in Operation

Certification Authority

Microsoft Security Management

Internet of Things Security standards

Journey to the Private Cloud

A HOLISTIC APPROACH TO IDENTITY AND AUTHENTICATION. Establish Create Use Manage

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Why is Office 365 the right choice?

Single Secure Credential to Access Facilities and IT Resources

Launch Smart Products With End-to-End Solutions You & Your Customers Can Trust

Digital Trust Ecosystem

ARM mbed mbed OS mbed Cloud

SOLUTION BRIEF RSA SECURID SUITE ACCELERATE BUSINESS WHILE MANAGING IDENTITY RISK

AKAMAI CLOUD SECURITY SOLUTIONS

Securely Moving Data to the Cloud with Confidence and Customer Focus

Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances)

THALES DATA THREAT REPORT

Comodo Certificate Manager. Centrally Managing Enterprise Security, Trust & Compliance

Protecting Your Cloud

IBM Cloud Security for the Cloud. Amr Ismail Security Solutions Sales Leader Middle East & Pakistan

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

Vision of the Software Defined Data Center (SDDC)

The 7 Habits of Highly Effective API and Service Management

Cloud Transformation: Data center usage models driving Cloud computing innovation. Jake Smith, Advanced Server Technologies Data Center Group Intel

Part III: Evaluating the Business Value of the Hybrid Cloud

SD-WAN. Bringing Scale, Agility and Robustness to Enterprise Networks

Unbound and Oasis KMIP Interoperability

Making hybrid IT simple with Capgemini and Microsoft Azure Stack

Adopting Modern Practices for Improved Cloud Security. Cox Automotive - Enterprise Risk & Security

5 OAuth EssEntiAls for APi AccEss control layer7.com

Transformation Through Innovation

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

BRINGING CLARITY TO THE CLOUD

Smart Grid Security. Selected Principles and Components. Tony Metke Distinguished Member of the Technical Staff

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

The Information Company for Storage Professionals

Aerohive and IntelliGO End-to-End Security for devices on your network

Inventory and Reporting Security Q&A

The CISO s Guide to Deploying True Password-less Security. by Bojan Simic and Ed Amoroso

SSAE 18 & new SOC approach to compliance. Moderator Name: Patricio Garcia Managing Partner ControlCase Attestation Services

Enterprise & Cloud Security

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Copyright 2012 EMC Corporation. All rights reserved.

Oracle Buys Corente. Extends Oracle s Virtualization Capabilities with Leading Software-Defined Networking Technology to Deliver Cloud Services

Transcription:

Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN

WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing security through the manufacturing process Manufacturing IoT use cases

INTRODUCTION Privacy and security will become more distinguishing factors in consumer IoT How do I build my product to achieve these privacy and security goals? 1. Security by Design 2. Stand on the Shoulders of Giants 3. Application within the Manufacturing Process

IoT SECURITY OBSERVATIONS No winning architectures, although seeing some standardization within verticals Peak Hype - Organizations are still mostly developing their strategy, but some use cases emerging New entrants with smart connected products often lacking information security experience Huge number of industry consortiums trying to drive standards

REDUCE RISKS Protect brand Prevent Fraud Safety Privacy Legal Compliance WHY invest in security for your IoE ecosystem? VALUE ADD Differentiators Certifications DIFFERING PRIORITIES Consumer Industrial Enterprise

Cost to change SECURITY BY DESIGN Why? Changes are much cheaper to make early in design cycle Proper information security and privacy is rarely ever bolt on Design Production Usage Product Lifecycle How? Identify value components / assets in ecosystem Think like a hacker Assess the probability and magnitude of a compromise Evaluate technology components in each area

STANDING ON THE SHOULDERS OF GIANTS Remember the internet of things, is still the internet Internet and information security principles and best practices have matured over the past decade Things are just one part, we still have users, services, and organizations There are solutions and standards existing today succeeding in providing distributed trusted identity

Information Security Concepts AUTHENTICATION ENCRYPTION DATA INTEGRITY

PROVEN SOLUTIONS FOR DEVICE IDENTITY PKI (Public Key Infrastructure) and it s implementation in protocols like TLS, enable a range of information security principles to be achieved Security focused crypto-processors, like TPMs, pair perfectly with software based PKI to build and maintain device identity

SMART & SECURE MANUFACTURING Theory is nice, but what about the realities of provisioning identity in the product manufacturing lifecycle? How does an IoT product architect / developer address concerns of: Minimal trust in contract manufacturing environments Preventing overproduction / counterfeiting Audit, tracking, and reporting Network connectivity

SMART & SECURE MANUFACTURING Q: Can you select technology that limits the amount of trust you need in the manufacturing environment? A: Yes! Combining TPM hardware with PKI and enrollment techniques, enables robust identity assumptions Result is high confidence in the device identity with Assurance that the hardware to protect keys is genuine Assurance that keys associated with identity credential are protected with hardware Identity credential issued from known and trusted root.

Identity Provisioning Architecture

USE CASE APPLICATIONS Network Appliances Feature licensing protection Smart Connected Home Appliances Secure authentication and private communications Diagnostic Equipment Trusted interface for administration Connect Car & ECU security Car gateway identity protection and secure firmware updates

/// USING THE CLOUD FOR IDENTITY ISSUANCE Simplified infrastructure requirements and costs Minimal additional hardware and security concerns Reduces cost to expand manufacturing to multiple sites Saas models to allow elasticity Expenses: Shift from capital expense to operational expense Performance: Scale up from POC to billions of devices without changing infrastructure hardware Built in mechanisms for auditability, access control, and reporting

NEW CONSIDERATIONS FROM THE IoT Size, scale, and scope of your ecosystem Diversity of devices and processing power Trust models and complex relationships Lifecycle management across device and cloud

KEEPING PACE WITH THE SPEED OF THE IoT A flexible & scalable PKI platform can meet the needs of high-volume PKI use cases in the internet of things Volume + Velocity + Variety + Usage & Lifecycle Billions of certificates, identities, and relying parties per ecosystem Flexible certificate needs to support the cross domain use cases While being cost effective

THE ANSWER TO IDENTITY IN IoT? Implement security and identity from the outset Ensure service provides are capable of maintaining security and oversight Leverage established standards covering authentication, authorization, encryption, and data integrity Each deployment is going to have its own needs, need solutions that are flexible!

Example Ecosystem Identity Services PKI, Authentication, Authorization, & Identity Relationships Vendor Public Trust Private Trust Trust needs are scenario dependent 3 rd Party Application Data Web Services Thing Web Services Cloud Provider Partner Web Portal Consumer Web Portal Admin Portal Administrator The Things Business Consumer

THANK YOU! QUESTIONS? Lancen.LaChance@globalsign.com twitter.com/globalsign