18
Practical Identity in the IoT Era Morteza Ansari

Cloud Identity Summit 2015: Practical Identity in the IoT Era

Embed Size (px)

Citation preview

Practical Identityin the

IoT Era

Morteza Ansari

IoT Top Challenge

IoT Security• Trustworthiness

Integrity

Tamperproof

Anti-cloning

• Device identity & identity context

• Provisioning & associated life cycle

• Authorization and access

• Bridging modern & legacy

• … IDENTITY

IoT Identity & Trust Anchors - Consumer

IoT Identity & Trust Anchors

Typical Industrial Relationship - Example

SystemIntegrator Owner Operator

Typical Industrial Relationship

OEM

OEMSystem

Integrator

Owner

Operator

App

AppApp

OperatorSystem

Integrator

Typical Industrial Relationship

OEM

OEMSystem

Integrator

Owner

Operator

AppApp

OperatorSystem

Integrator

Typical Industrial Relationship

OEM

OEMSystem

Integrator

Owner

Operator

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

✓ Read diagnostic data✓ Run diagnostic routines✗ Read movement✗ Write movement✗ Read program? Update firmware

Device Identity

Location

Network

Trustworthiness

Calibration

Health

Other Challenges• Bridging legacy & modern

• Not all devices are created equal

• Life expectancy of industrial devices

• IT vs. OT

• Access:Remote locations

Unreliable connectivity

Low bandwidth

Very complex failure scenarios

• Privacy!

• Too static, too fragile, too vulnerable

• Device identity context

• Risk based policies

• Dynamic & continuous identity

• Standardization

• Identity life cycle

• Identity security

Now What?