27
SESSION ID: #RSAC SBX1-R05 Mitigating Security & Privacy Risks In an Interconnected World Brian Witten, Symantec

Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

  • Upload
    others

  • View
    0

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

SESSION ID:

#RSAC

SBX1-R05

Mitigating Security & Privacy RisksIn an Interconnected World

Brian Witten, Symantec

Page 2: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

2

Protection EmbeddedIn Over a Billion Connected Things

Page 3: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACIoT betters our lives countless ways.

Already 20 Billion Microcontrollers (MCU) annually5 Billion Connected Today, 20 Billion by 2020

Smart Cities Consumer Electronics

Medical Devices Connected Cars Digital Factories

Page 4: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

Quick History of Recent Events

Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,Hospotials

Quick History of Actual Events

Multi-KilotonPipeline Explosion

Steel Mill BlastFurnace Damaged

Cars: Digitally Stolen,Remotely Crashed

Hospitals Breachedvia Medical Devices

Large ScalePower Grids Crashed

Hundreds of CriticalInfrastructure Sites

Page 5: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

5

Internet of Things (IoT) Cornerstones of Security

Protect the CommunicationsProtect the Device

Understand Your SystemManage DevicesCloud/Data

Center

Gateway

Devices& Sensors

Page 6: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

$0.25

Can extremely constrained devices do serious security?

6

Early 80’s grade chip8 bit8 MHz2 k SRAM

25 seconds AA Battery: 20+ years

Leading 10 year old chips16 bit, 16 MHz30 k SRAM

3 seconds AA Battery: 20+ years

Current 32 bit chips32 bit, 84 MHz30+ k SRAM

150 ms AA: 20 years

Benchmark: ECC/ECDSA256

$0.50

Page 7: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACProtect The Communications

7

Certificates: Over a Billion IoT devices chain to aworld class Certificate Authority (CA)

Roots of Trust: IoT “Roots of Trust” can helpidentify foreign devices

Devices& Sensors Hardware

OperatingSystems

EmbeddedSoftware

Protect theCommunicationsRequired: Authentication

Helpful: EncryptionNote: Signing “objects” can

avoid decrypt/re-encrypt burden

Crypto Libraries: Several good open-sourceand commercial options

What’s needed?

Page 8: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

8

Internet of Things (IoT) Cornerstones of Security

Protect the CommunicationsProtect the Device

Security AnalyticsManage DevicesCloud/Data

Center

Gateway

Devices& Sensors

Page 9: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

SESSION ID:

#RSAC

SBX1-R05

Internet of Everything orInternet of Evil Things?

Brian Witten, Symantec

Page 10: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

10

Protection EmbeddedIn Over a Billion Connected Things

Page 11: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACIoT betters our lives countless ways.

Already 20 Billion Microcontrollers (MCU) annually5 Billion Connected Today, 20 Billion by 2020

Smart Cities Consumer Electronics

Medical Devices Connected Cars Digital Factories

Page 12: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

Quick History of Recent Events

Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,Hospotials

Quick History of Actual Events

Multi-KilotonPipeline Explosion

Steel Mill BlastFurnace Damaged

Cars: Digitally Stolen,Remotely Crashed

Hospitals Breachedvia Medical Devices

Large ScalePower Grids Crashed

Hundreds of CriticalInfrastructure Sites

Page 13: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

Do Consumers care?

Accenture study as reported by Venture Beat: http://venturebeat.com/2016/01/04/mobile-device-sales-slow-customers-grow-wary-of-security-holes-in-connected-devices-survey-says/

(69 percent) said they know the products could potentially be hacked.

(24 percent) chose to postpone buying one as a result of security concerns.

(18 percent) said they have stopped using their IoT devices because of these concerns

Page 14: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACWhat changed?

PC / Datacenter EraSecurity - most easily

delivered by diskor by download

IoT / Cloud EraSecurity - must be

integrated by designto be effective

Page 15: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

15

Internet of Things (IoT) Cornerstones of Security

Protect the CommunicationsProtect the Device

Security AnalyticsManage DevicesCloud/Data

Center

Gateway

Devices& Sensors

Page 16: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

$0.25

Can extremely constrained devices do serious security?

16

Early 80’s grade chip8 bit8 MHz2 k SRAM

25 seconds AA Battery: 20+ years

Leading 10 year old chips16 bit, 16 MHz30 k SRAM

3 seconds AA Battery: 20+ years

Current 32 bit chips32 bit, 84 MHz30+ k SRAM

150 ms AA: 20 years

Benchmark: ECC/ECDSA256

$0.50

Page 17: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACProtect The Communications

17

Certificates: Over a Billion IoT devices chain to aworld class Certificate Authority (CA)

Roots of Trust: IoT “Roots of Trust” can helpidentify foreign devices

Devices& Sensors Hardware

OperatingSystems

EmbeddedSoftware

Protect theCommunicationsRequired: Authentication

Helpful: EncryptionNote: Signing “objects” can

avoid decrypt/re-encrypt burden

Crypto Libraries: Several good open-sourceand commercial options

What’s needed?

Page 18: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACProtecting Devices (Boot Time)

18

Never run unsigned code.

Never trust unsigned configuration data.

Never trust unsigned data. (Period.)

Provide run-time protection for each device.

F. Ne

twor

k M

onito

r

G. S

ettin

gs

E.Cr

ypto

Libr

arie

s

D. P

rimar

y Ap

p

A. Device Drivers

B. Network Stack

C. Operating System

Pre-boot Environment

Protect the Code that Drives IoT

Page 19: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACProtecting Devices (Run Time)

19

Whitelisting Behaviors: SandboxingWhitelisting Behaviors: SandboxingTraditional Approach: Malware BlockingTraditional Approach: Malware Blocking

Ineffective on zero-day Effective on zero day

Ensures self-protection Protects OS critical resources

Customization or separate product Protects applications from each other

Large footprint Small footprint

Signature based Behavior / policy based

Internet access required No internet access required

Reactive Proactive

Page 20: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

20

Internet of Things (IoT) Cornerstones of Security

Cloud/DataCenter

Gateway

Devices& Sensors

Protect the CommunicationsProtect the Device

Security AnalyticsManage Devices

Authentication

Run Time

Boot Time

Page 21: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACSafely & Effectively Managing IoT Devices

21

Why update devices?Industrial Systems

19 years on average

Granular UpdatesSave Battery & Bandwidth

200 x =

2,000 x =

“Build it Right Once”(Use it for Both General & Security Management)

General & Security TelemetryFunctionality & Security UpdatesConfiguration ChangesDiagnostics & RemediationNetwork Access Control (NAC)Credentials/Permissions, Policies

3 daysVulnerability Discovery Rate (Linux)

… Build in Over The Air (OTA)updates from the start

Page 22: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

22

Internet of Things (IoT) Cornerstones of Security

Cloud/DataCenter

Gateway

Devices& Sensors

Protect the CommunicationsProtect the Device

Security AnalyticsManage Devices

Page 23: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSACNetwork Operator Role & Opportunity

23

Requirements

MedicalDevices

IndustrialEquipment

Products

AutomotiveModules

Suppliers

Devices

Components

Buyers

Equipment Owners &Operators

Hospitals

Automakers

Page 24: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

24

Thank [email protected]

Internet of Things (IoT)Security Reference Architecture:

www.symantec.com/iot

Page 25: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

25

Page 26: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

Copyright © 2014 Symantec Corporation 26

Automotive ThreatsA Quick Refresher

RTOS

GSM

TCU

RTOS

I V I

Copyright © 2015 Symantec Corporation

GWCBCMECU

xxMxxMBCM

OBD2 UBIGSMCAN1

CAN2

Cellular (IP & GSM)

Cellular (IP & GSM)Physical Tampering

Other Wireless ( BT & Wifi )

Other Wireless

Vulnerabilities Announced This Summer

Supply Chain

Unauthenticated CommandsUnauthenticated Connections

No IP Port/Protocol Restrictions

InadequateCode Signing

Potential MemoryCorruption Vulnerabilities

VulnerableBrowsers/Apps

VulnerableModems

UnauthenticatedBus

TCU: Telecommunications UnitIVI: In Vehicle InfotainmentRTOS: Real Time OSECU: Engine Control UnitBCM: Body Control ModulexxM: Other ModulesCAN: Controller Area NetworkCAN1/2: Hi, Med, Lo Speed CANGWC: “gateway chip”OBD2: On Board Diagnostics portUBI: Usage Based InsuranceGSM: Global System for MobileComm’s, aka "a modem”

(Architecture Simplified for Presentation)

Page 27: Mitigating Security & Privacy Risks In an Interconnected World · 2018-01-09 · #RSAC Quick History of Recent Events Pipeline, Steel Mill, Critical Infrastructure, Power Grid, Cars,

#RSAC

27

Cornerstones of SecurityAutomotive Vehicles

Authenticate Comm’s Manage Devices

Protect Each Module Security Analytics

OMA DM, SCOMO

Embedded (in-vehicle), GlobalCode-Signing (Boot Time)

Host-Based (Run Time)Compiler Based (No-OS)

Business Constraints:-- Consumers won’t pay for security they “assume”-- OEM & Tier 1 Suppliers: extremely thin margins-- Security $ must be < “few %” of any car/module

TCU: Telecommunications UnitIVI: In Vehicle InfotainmentRTOS: Real Time OSECU: Engine Control UnitBCM: Body Control ModulexxM: Other ModulesCAN: Controller Area NetworkCAN1/2: Hi, Med, Lo Speed CANGWC: “gateway chip”OBD2: On Board Diagnostics portUBI: Usage Based InsuranceGSM: Global System for MobileComm’s, aka "a modem”

CAMP: Crash Avoidance MetricsProgramVSC3: Vehicle Safety Comm’sHIS: Hersteller Initiative SoftwareSHE: Secure Hardware ExtensionsEVITA: E-safety Vehicle IntrusionProtected ApplicationsHSM: Hardware Security Module

OMA DM: Open Mobile Alliance(OMA) Device Management (DM)SCOMO: Software ComponentManagement Object

CAMP VSC3, HIS SHE, EVITA HSM

Copyright © 2015 Symantec Corporation

RTOS

GSM

TCU

RTOS

I V I

GWCBCMECU

xxMxxMBCM

OBD2 UBIGSMCAN1

CAN2