23
SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf

SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

  • Upload
    others

  • View
    15

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

SCALING UP IOT SECURITYIoT Security Foundation Conference December 2018

Leo Dorrendorf

Page 2: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Security architect

Diverse product

range

Multiple R&D teams

Different security

levels

Updated standards

and regulation

Supply chain

security

Evolving threat

intelligence

Rising attacks

The challenges of IoT security architecture

Page 3: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Rising attacks on IoT

Global Number of

IoT devices (Billions)Source: Statista

Number of detected malwares

Against IoT devicesSource: Kaspersky Lab

Number of reported

Infected devicesSource: VDOO Research

Page 4: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Auto-analyzed IoT

embedded systems

3,737Aggregated IoT

vulnerabilities

162,151 500-day

vulnerabilities

Our research

Page 5: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

The state of IoT security

Page 6: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple
Page 7: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

The problems with the manual approach

Quick Scalable Reusable Standardized

Page 8: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple
Page 9: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

The advantages of the automated approach

Quick Scalable Reusable Standardized

Page 10: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

The IoT security process

Training Requirements Design Implementation Release

1 2 3 4 65

Verification

Page 11: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Creating a requirements database

Internal research

Industry standards

Industry publications

Public threat intelligence

REQ.1

REQ.2

REQ.3

REQ.4

Page 12: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Linking related objects

REQ.1

REQ.2

REQ.3

REQ.4Industry standards

Attack methods

Device attributes

Scan results

Page 13: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Filtering relevant requirements

SD card

Wi-Fi

USB

Ethern

et

HW

RN

G

Relevant

RequirementsREQ.1

REQ.2

REQ.3

REQ.4

Page 14: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Integrating existing standards

https://xkcd.com/927

shared under the Creative Commons license by its author

Page 15: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Integrating existing standards

REQ.1

REQ.2

REQ.3

REQ.4

Page 16: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Mapping requirements

Page 17: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Filtering to a selected standard

REQ.1

REQ.2

REQ.3

REQ.4

Relevant

Requirements

Page 18: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Automatic scanning for requirement status

Device

firmware

Requirement

status

REQ.1

REQ.2

REQ.3

REQ.4

Page 19: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Security as part of continuous integration

v0.1 v0.5 v1.0

REQ.1

REQ.2

REQ.3

REQ.4

REQ.1

REQ.2

REQ.3

REQ.4

REQ.1

REQ.2

REQ.3

REQ.4

Page 20: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Post-release protection

Vulnerable

software

Fundamental fix

Countermeasures

Page 21: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Conclusion

01 What is the right security level for my product?

02 What do I already have in my product?

03 What gaps do I have?

04 How to bridge the gaps?

06 How can I maintain trust and security?

05 How can I be trusted by my customers?

Page 22: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

Conclusion

Massive data set (over 20K firmwares)

Page 23: SCALING UP IOT SECURITY · 2019-04-16 · SCALING UP IOT SECURITY IoT Security Foundation Conference December 2018 Leo Dorrendorf. Security architect Diverse product range Multiple

THANK [email protected] @leodorrendorf