+ All Categories
Home > Documents > Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance,...

Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance,...

Date post: 19-Jul-2020
Category:
Upload: others
View: 1 times
Download: 0 times
Share this document with a friend
17
© Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions, Leidos
Transcript
Page 1: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

© Cloud Security Alliance, 2015

Brian Russell, Chair Secure IoT WG &

Chief Engineer Cyber Security Solutions, Leidos

Page 2: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Agenda

© Cloud Security Alliance, 2015

1.  Defining the IoT

2.  New Challenges

introduced by the IoT

3.  IoT Privacy Threats

4.  Some IoT Use Cases

Page 3: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Defining the IoT

© Cloud Security Alliance, 2014.

• Let’s look at how ITU-T Y.2060 defines the IoT

•  IoT: a “global infrastructure for the information society, enabling advanced services by interconnecting (physical and virtual) things based on existing and evolving interoperable information and communication technologies.”

•  Device: …”a piece of equipment with the mandatory capabilities of communication and the optional capabilities of sensing, actuation, data capture, data storage and data processing.”

•  Thing: …”an object of the physical world (physical things) or the information world (virtual things), which is capable of being identified and integrated into communication networks.”

Source: ITU-T Y.2060

The IoT enables the collection of data using sensors that can be deployed or embedded just about anywhere

Page 4: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

New Challenges Introduced by the IoT

© Cloud Security Alliance, 2014.

•  Increased privacy concerns that are often confusing •  Sale of data to third parties •  How to assure the privacy of those that haven’t opted in?

•  Platform security limitations that make basic security controls challenging (e.g., software-based security modules)

•  How secure is the data resident on these devices?

•  Ubiquitous mobility that makes tracking and asset management a challenge •  Can these devices be stolen and reverse-engineered? Exposes key material

•  Mass quantities that make routine update and maintenance operations a challenge •  If they are not updated how long before data can be compromised?

•  Cloud-based operations that make perimeter security less effective

Privacy concerns are also based on the challenges associated with keeping information secure within the IoT

Page 5: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

IoT Privacy Threat Discussion

© Cloud Security Alliance, 2015

Page 6: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

IoT Privacy Threats

© Cloud Security Alliance, 2014.

• Unanticipated leakage of personal or sensitive information can occur by aggregating data from many different systems and sensors, or the merging of personal data that has been collected under differing consumer privacy preferences and expectations.

•  Consider merging records obtained from two separate systems

• Unauthorized tracking of people’s locations can occur through usage pattern tracking based on asset usage time and duration.

•  Technology tied to your car (e.g., usage monitoring)?

• Unauthorized tracking of people’s behaviors and activities can occur through examination of location-based sensing data that exposes patterns and allows analysis of activities, often collected without explicit notice to the individual.

•  Consider sensors spread throughout a city

Page 7: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

IoT Privacy Threats

© Cloud Security Alliance, 2014.

• Unlawful surveillance through persistent remote monitoring capabilities offered by small-scale IoT devices

•  Who’s watching you?

•  Inappropriate profiles and categorizations of individuals can be created through examination of network and geographic tracking

• Malicious parties can steal identities and money based on leakage of sensitive information

How do we handle a ubiquitous monitoring society where communications and surveillance capabilities can be embedded in anything?

Page 8: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

IoT Use Case Discussion

© Cloud Security Alliance, 2015

Page 9: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Some IoT Use Cases

© Cloud Security Alliance, 2014.

•  A physician establishes a communication session with a smart home/home monitor.

•  Are medical data transferred securely? •  Are the home monitoring equipment sufficiently secured against unauthorized

access? •  A patient’s blood donation is handled by an online analyzer

•  Is the tracking number for the donor protected? •  Will the patient be notified directly of any finding? •  What are the trust mechanisms? •  Will the patient’s pharmacy or doctor be messaged on any particular finding?

Will any other organizations be notified? •  In an emergency, multiple first responders are dispatched.

•  Is medical data transferred securely to the correct ambulance? •  Can responders communicate patient data securely? •  Is security, trust and privacy managed by multiple trust chains that offer the same

level of assurance? •  Are patient records purged after the patient has been dispatched?

Page 10: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Some IoT Use Cases

© Cloud Security Alliance, 2014.

• Two major companies that collect consumer data are merging together.

•  How do the companies ensure that aggregation of consumer data does not allow for profiles of individuals inconsistent with original consent

•  What happens when silo’d data stores are aggregated together?

• Vehicle owners opt-in to electronic marketing campaigns that provide targeted advertisements while driving through locations

•  Is the data sold to third parties? •  Can law enforcement gain access to this data for investigative purposes?

Page 11: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Technology solutions can help solve a part of the problem

© Cloud Security Alliance, 2014.

•  Vehicle-to-Vehicle (V2V) PKI •  Extends the traditional PKI architecture

to add privacy-enhancing features •  Adds various components to the PKI

that will issue billions of certificates to vehicles

•  Location Obscurer Proxy •  Pseudonym CA •  Linkage Authority

•  Supports the provision of certificates with lifetimes that may be as short as 5 minutes

•  The goal is to ensure that no one (even the PKI) can correlate a vehicle to a PKI certificate

•  Mitigates the ability for anyone to track your location or past activities via your certificate Courtesy Federalregistry.org

Page 12: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

? ?

? ? © Cloud Security Alliance, 2015

Page 13: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Backups Recommended IoT Security Controls

© Cloud Security Alliance, 2015

Page 14: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

© Cloud Security Alliance, 2015.

IoT Security Controls

Required IoT security controls span the device itself as well as the environment that the device operates within

Page 15: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

IoT Security Controls

© Cloud Security Alliance, 2014.

1.  Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment

2.  Apply a Secure Systems Engineering approach to architecting and deploying a new IoT System

3.  Implement layered security protections to defend IoT assets 4.  Implement data protection best-practices to protect sensitive

information 5.  Define lifecycle controls for IoT devices 6.  Define and implement an authentication/authorization framework

for the organization’s IoT Deployments 7.  Define and implement a logging/audit framework for the

organization’s IoT ecosystem

Page 16: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment

© Cloud Security Alliance, 2014.

•  Important to consider the potential privacy ramifications to all stakeholders prior to putting the system into an operational state.

•  Analysis should be undertaken to understand the indirect privacy ramifications of the various IoT component operations.

•  Examine privacy of data-in-aggregate vs. privacy of the data collected by a single system to identify potentially serious privacy concerns

•  Companies should reevaluate their personal data breach notification program to cover the aspects related to IoT.

•  In the case of the IoT, it is critically important that trade-offs between functionality, security and privacy be made early on in the design process in order to ensure that all objectives are met equally.

•  Stakeholders should be made aware of when data is provided to third parties, the controls used to secure it, and how and when the data is disposed of.

Page 17: Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber …€¦ · © Cloud Security Alliance, 2015 Brian Russell, Chair Secure IoT WG & Chief Engineer Cyber Security Solutions,

Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment (continued)

© Cloud Security Alliance, 2014.

•  If it is found that a device collects, processes or stores Privacy Protected Information (PPI), more stringent controls will be required. These controls should be a mix of policy-based and technical. For example:

•  Provisioning of the device may require more administrative approvals •  A review by Internal Audit or Compliance should be conducted to determine

if it is viable to have PPI data on IoT devices •  Data stored on the device should be encrypted using sufficiently strong

cryptographic algorithms •  Data transmitted from/to the device should be encrypted using sufficiently

strong cryptographic algorithms •  Access to the device, both physical and logical, should be restricted to

authorized personnel


Recommended