+ All Categories
Home > Technology > Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Date post: 10-Jan-2017
Category:
Upload: team-wibu
View: 54 times
Download: 0 times
Share this document with a friend
12
Protecting IIoT Endpoints Industrial Internet Security Forum Thursday, October 6, 2016 Sunnyvale, California, Marcellus Buchheit, [email protected] Wibu-Systems USA Inc.
Transcript
Page 1: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

ProtectingIIoT EndpointsIndustrial Internet Security Forum

Thursday, October 6, 2016

Sunnyvale, California, USAMarcellus Buchheit, [email protected] USA Inc.

Page 2: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Overview

What is an endpoint?Why endpoint security?Security functions of an endpointImplementing endpoint security

2

Page 3: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

What is an Endpoint?

3

“Computational Network”

(Core, Fog)

The IIoT Landscape: Where are Endpoints?

EP

EPEP

EdgeEP

EPEP

EP

Page 4: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

What is an Endpoint (II)?

IISF and IIC defines endpoints similar as ISO/IEC 24791-1:2010 standard does:• An endpoint is one of two components that either implements and exposes an

interface to other components or uses the interface of another component.

4

IIC simplified this definition (see IIC Vocabulary, version 2.0): • An endpoint is a component that has an interface for network communication. … but added a note for clarification:• An endpoint can be of various types including device endpoint or an endpoint

that provides cloud connectivity.

Endpoint 1 Endpoint 2Communication

Page 5: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

What is an Endpoint (III)?

5

“Computational Network”

(Core, Fog)

The IIoT Landscape: Endpoints are everywhere!

EP

EPEP

EdgeEP

EPEP

EP

Page 6: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

What is an Endpoint (IV)?

Summary:• Endpoints are everywhere in an IIoT System (including edge and cloud)• One single (security) model for all locations• A single computer, even a device, can have several endpoints

• Example Router: One LAN endpoint, one WAN endpoint• Frequently shared code/data between multiple endpoints

• Endpoint and its communication are another model

6

Page 7: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Why endpoint security?

Endpoints are the only location in an IIoT system where:• Execution code is stored, started and updated• Data is stored, modified or applied (“Data at Rest” / “Data in Use“)• Communication to another endpoint is initiated and protected• Network security is analyzed, configured, monitored and managed

7

Result: An attack to an IIoT system typically starts in attacking one or more endpoints:• Try to access the execution code and analyze to find weak security implementation• Attack weak communication protection via network• Modify or replace (“hijack”) the execution code in a malicious way• ...

Page 8: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

IISF Endpoint Protection Model

8Endpoint Security Model & Policy

Endpoint Data Protection

Endpoint Protection

Endpoint Identity

Endpoint AccessControl Endpoint Secure

Configuration & Management

Endpoint Monitoring & Analysis Endpoint

Integrity Protection

Endpoint Root of Trust

Endpoint Physical Security

Page 9: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Threats and Vulnerabilities to an IIoT Endpoint

9

1. Hardware components2/3. Boot process4. Operating System5. Hypervisor/Sep. Kernel6. Non-OS Applications7. Applications and their API8. Runtime Environment9. Containers10. Deployment11. Data at Rest, Data in Use12. Monitoring/Analysis13. Configuration/Management14. Security Model/Policy15. Development Environment

Page 10: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Endpoint security: Solutions

• Start with a clean design of the security model and policies• Define endpoint identity, authorization, authentication

• How other endpoints see me? What can they do with me?• Define proper data protection model

• Integrity and confidentiality, especially of shared data-in-rest but also data-in-use• Define secure hardware, BIOS, roots of trust

• Includes lifetime of hardware, BIOS update, consistent root of trust• Select secure OS, hypervisor, programming language

• Consider lifetime of (open source?), dynamic of programming language • Consider isolation principles (4 different models explained in IISF)

• Plan remote code update and provide code integrity• Security has an unspecific expiration date: needs update• Code integrity prevents malicious remote code-hijacking

10

Page 11: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Endpoint security: Solutions (II)

• Plan “beyond the basics” security instantly• Plan security configuration and management

• For example: defining, replacing and updating of keys and certificates• User-friendly setting of access rights and authorization

• Plan endpoint monitoring and analysis• For example: log all security configuration changes• Log all unexpected remote activity• Provide user-friendly analysis, alerts etc.

• Implement “state of the art”:• Have a team of experienced security implementers• Use latest versions of development tools, OS, hypervisors, libraries• Test a lot, including malicious attacks• Prepare and test your first remote update 11

Page 12: Protecting IIoT Endpoints - an inside look at the Industrial Internet Security Framework

Questions and Answers

• Please send your comments and questions to:Marcellus Buchheit, Wibu-Systems USA, [email protected]

12


Recommended