Build 2015 4/20/2017 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION.

Slides:



Advertisements
Similar presentations
Security by Design A Prequel for COMPSCI 702. Perspective “Any fool can know. The point is to understand.” - Albert Einstein “Sometimes it's not enough.
Advertisements

Enabling IPv6 in Corporate Intranet Networks
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
Chapter 10 Securing Windows Server 2008 MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Security Controls – What Works
January 23-26, 2007 Ft. Lauderdale, Florida IP Communications, Secure – By Design Roger W. Farnsworth.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
System and Network Security Practices COEN 351 E-Commerce Security.
Common IS Threat Mitigation Strategies An overview of common detection and protection technologies Max Caceres CORE Security Technologies
8.1 © 2007 by Prentice Hall 8 Chapter Securing Information Systems.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Asper School of Business University of Manitoba Systems Analysis & Design Instructor: Bob Travica System architectures Updated: November 2014.
Introduction To Windows NT ® Server And Internet Information Server.
Chapter 8 Information Systems Controls for System Reliability— Part 1: Information Security Copyright © 2012 Pearson Education, Inc. publishing as Prentice.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
IT-security in the Ubiquitous Computing World Chris Kuo, CISSP, CISA Acer eDC (e-Enabling Data Center) Acer Inc. 2007/3/27.
Chapter 2 Information Security Overview The Executive Guide to Information Security manual.
1 IS 8950 Managing Network Infrastructure and Operations.
Unify and Simplify: Security Management
Copyright © 2006 CyberRAVE LLC. All rights reserved. 1 Virtual Private Network Service Grid A Fixed-to-Mobile Secure Communications Framework Managed Security.
WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ WHEN TITLE IS NOT A QUESTION N O ‘WE CAN’ Identity and Privacy: the.
All your device are belong to us Bryn Lewis M240.
Module 9: Configuring IPsec. Module Overview Overview of IPsec Configuring Connection Security Rules Configuring IPsec NAP Enforcement.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
IoT, Big Data and Emerging Technologies
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Components of wireless LAN & Its connection to the Internet
Module 11: Designing Security for Network Perimeters.
Advanced Technology Days 18. i 19. studenog 2015., Cinestar Arena Centar.
Need for Security Control access to servicesControl access to services Ensure confidentialityEnsure confidentiality Guard against attacksGuard against.
The ERA of API in the World of IoT Jing Zhang-Lee November, 2015.
Compliance Lessons from Operating SQL Server in Azure SQL DB.
Engineering Secure Software. Agenda  What is IoT?  Security implications of IoT  IoT Attack Surface Areas  IoT Testing Guidelines  Top IoT Vulnerabilities.
Web Services Security Patterns Alex Mackman CM Group Ltd
Connecting devices to the Azure IOT Hub
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
NetModule Cloud Solution Professional M2M Networking out of the Cloud NetModule Cloud Router 1.
IS3220 Information Technology Infrastructure Security
SYSTEM ADMINISTRATION Chapter 10 Public vs. Private Networks.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Iveta Topalova, Microsoft/IJIS Institute John Daugherty, CIO Montana DOC.
Microsoft Build /28/2017 6:34 PM © 2016 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY,
Connected Infrastructure
Connected Living Connected Living What to look for Architecture
Smart Building Solution
Connected Health Solution
Parcel Tracking Solution Parcel Tracking What to look for Architecture
Journey to Microsoft Secure Cloud
Configuring Windows Firewall with Advanced Security
What has Azure to offer to IoT Developers?
Computer Data Security & Privacy
Smart Building Solution
Connected Living Connected Living What to look for Architecture
Building Scalable Ignition Enterprise Architectures
Connected Infrastructure
Connected Health Solution
"Uberize" Your Remote Equipment
Securing Information Systems
High Secured Inter-Cloud Connectivity via Public Networks
How to Mitigate the Consequences What are the Countermeasures?
Platform Architecture
IT Management, Simplified
Presentation transcript:

Build 2015 4/20/2017 © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure IoT Security Clemens Vasters Build 2014 4/20/2017 2-625 Azure IoT Security Clemens Vasters Lead Architect, Azure IoT Services @clemensv © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Agenda Connected Things and the IoT Inventory – What We Already Know Build 2014 4/20/2017 Agenda Connected Things and the IoT Inventory – What We Already Know Security and Privacy Principles Azure IoT Services Outlook and Roadmap © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Connected Things Internet ISP Cloud Portals and APIs Mobile & Web Interaction Local Interaction Cloud Systems ISP Cloud Portals and APIs Personal Environment and Networks Device Field Gateway Device (Mobile) Network Operators Cloud Gateway Device Analytics Device Device Control System Local Gateway Local Portals and APIs Control System Analytics Data Management Device MNO Gateway Data Management Watches, Glasses, Work Tools, Hearing Aids, Robotic Assistance, … Homes, Vehicles, Vessels, Factories, Farms, Oil Platforms, … Vehicle Fleets, Sea Vessels, LV Smart Grids, Cattle, …

IoT Enabled Infrastructure City Buildings Energy Health Mobility Fire Protection Lighting Electricity Distribution Patient Tracking Traffic Flow Pollution Control Water Wind/Solar/Geothermal Vital Monitoring Traffic Alerts Implants Rule Enforcement Flood Control Energy Management Gas Distribution Disability Aids Toll Collection Medical Emergency Climate Control Fuel Distribution OR Equipment Bus/Tram/Train Drinking Water Air Quality Power Plants Lab Equipment Taxi Solid Waste Lifts and Escalators Nuclear Waste Radiology Equipment Street Quality Waste Water Signage Coal Mining Mobile Care Air Traffic Control Public Order Safety Management Oil/Gas Production Diabetes Airports

Build 2014 4/20/2017 Many IoT solutions control critical operations at the core of industrial and civil infrastructure. Digital security will be increasingly interwoven with physical safety of life and equipment. © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2014 4/20/2017 Many IoT solutions will provide very deep and near-real time insight into industrial and business processes, as well as into homes and the immediate personal environment. Privacy matters. © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

What Do We Already Know? IT engineers know how to make digital things secure. Secure Development Lifecycle Secure Network Technologies Threat & Vulnerability Mitigation Monitoring and Alerting Software/Firmware Auto-Updates Privacy Models OT engineers knows how to make physical things safe and secure Standards, Procedures, Training, Continuous Improvement Physical access management Hazard and Risk Analysis Monitoring and Maintenance Fail Safe and Safety Equipment Best Practice: IT and OT engineers collaborate in making “cyberphysical” systems safe and secure.

Microsoft Cloud Security Principles Security Development Lifecycle & Operational Security Assurance Network and Identity Isolation Vulnerability / Update Management Least Privilege / Just-in-Time (JIT) Access Protect Auditing and Certification Live Site Penetration Testing Fraud and Abuse Detection Centralized Logging and Monitoring Detect Breach Containment Coordinated Security Response Customer Notification Respond

Secure Development Lifecycle http://microsoft.com/sdl Development process for creating (and running) secure software as practiced at Microsoft

Defense in Depth Policies, Procedures, Guidance Cloud Field Gateways Devices Data Privacy Protection and Controls Data Data Data Application Edge Application People and Device Identity Federation, Data Attestation Identity and Access Control Global Network Secure Networks, Transport and Application Protocols, Segmentation Local Network Local Network Trustworthy Platform Hardware, Signed Firmware, Secure Boot/Load Host Host Host Tamper/Intrusion Detection Physical Access Security Physical Physical Physical

Where things get tricky…

Capability constrained devices IoT Sweet Spot $400 Phones $1000 PCs $1 Sensor Cost $10000 Server Computational Capabilities Memory/Storage Capacity Energy Consumption/Source Component Quality IoT capabilities are primarily value-add to other primary capabilities How much computer, storage, and networking circuitry can you add to the BOM for a $40-range retail product for that value-add? Tiny devices make awfully vulnerable network servers

Not everything is “green-field” Factories and other industrial and utility environments are “brown-field” Production lines and facilities represent very significant capital investments Iterative technology deployment and upgrades Re-fit of existing (sometimes decades old) equipment with tech add-ons Buildings and homes are too Entertainment systems (TV, A/V receivers, Set-Top boxes, Bluray Players) Comfort and sanitation systems (Heaters, A/C, Water, Gas, Thermostats) Kitchen appliances Security systems IoT solutions must often integrate into environments with devices designed and deployed a decade or more apart

Legacy Network Design Attitude Reality Network Security modeled after physical access security Segregated networks. Well-defined gates. Access control at the network/gateway level. Network access sufficient to access assets. Local Interaction AuthN/Z Device Device Device Local Gateway Local Portals and APIs Control System Analytics Data Management Device

Legacy Remote Access Practices LAN LAN PLC VPN

Threats? Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege Threats? T,I,D T,I,D S,T,R,I,D,E S,T,R,I,D,E Service Desk Machine Control Logic Operator T,I,D PLC S,R T,I,D T,I,D Configuration T,I,D T,R,I,D

What do the boxes help with? Spoofing Tampering Repudiation Information Disclosure Denial of Service Elevation of Privilege What do the boxes help with? Not a whole lot … T,I Service Desk Machine Control Logic Operator Configuration T,I … and they even broaden the attack surface area by fusing the networks

What do the boxes really nicely help with? T,I Service Desk Machine Control Logic Operator Configuration T,I 1. Pwn This 2. Pwn That

We’ve also seen this in vehicle telematics Diagnostics Entertainment Control CAN BUS / “Telematics Box” VPN Gateway ERP CRM Fleet, Vehicle, and Driver Solutions … MNO Private APN Public APN Vehicle Vehicle Own one, own them all More issues: + Addressing and Discovery + Temporal Coupling

Or do you think they could use some help with defense? Defense Strategies Will you defend a million tiny, underpowered, public network servers that must triage unsolicited traffic? Or do you think they could use some help with defense? Authentication Credentials Management Authorization Policy Management Denial of Service Intrusion Detection Auditing Monitoring Alerting

Service Assisted Communication (SAC) Connections are device-initiated and outbound Access Control Policies Device Identity Registry/Directory Non-IP Field Gateway (CG)NAT Firewall Router Q Service Gateway Client Q Device does not actively listen for unsolicited traffic Public address, full and well defendable server platform No inbound ports open, attack surface is minimized Isolated Network Port Mapping is automatic, outbound

Service Assisted Communication “Peer to Peer” Device Authentication Authorization (Access Policy Enforcement) DoS Defense Application Layer Integration (vs. Link/Network) Mobile Backend (CG)NAT Router (CG)NAT Firewall Router Q Service Gateway Q Temporal Decoupling Logical Addressing Mobile Cell Mobile Cell

SAC - Trust Brokerage for Nomadic Devices “Resident Devices” Berlin 2 Local Networking Scope Token expresses current membership of the device in the solution context. Asymmetrically signed by directory. Cacheable. Expires periodically. Tokens Device Identity Registry/Directory Access Policies Cloud Scope Trust

Vehicle Telematics AMQP 1.0 Link Bi-Directional Secure Reliable Transfer Application Level No Peer Exposure Datacenter(“Cloud”) Vehicle Entertainment CAN BUS / “Telematics Box” Telematics Gateway ERP Fleet, Vehicle, and Driver Solutions CRM Diagnostics … Control … Hard real-time Control Near real-time Value-Add Services, Analysis and Optimization Servicing

Industrial Automation Build 2015 4/20/2017 8:28 AM AMQP 1.0 Link Bi-Directional Secure Reliable Transfer Application Level No Inbound Ports Industrial Automation Cloud Systems OPC/TCP & Fieldbuses Cloud Portals and APIs OPC UA Gateway Device AMQP Cloud Gateway Analytics Device Device Control System Local Gateway Local Portals and APIs Control System Analytics Data Management Device Data Management © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Scale

The Scale Challenge x Millions x GByte/sec x PByte Event Storage Real Time Analytics Time Series and State Storage Historic and Predictive Analytics Device Software Management Connectivity Data Flow Device Identity Management x GByte/sec x PByte

Device Identities. Device Management. Hyper Scale. 4/20/2017 Device Identities. Device Management. Hyper Scale. Makers. Prototypes. Hackathons. “Enterprise Scale” Consumer Products 100 10,000 1,000,000 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks and/or trademarks in the U.S. and/or other countries. The information herein is for informational purposes only and represents the current view of Microsoft Corporation as of the date of this presentation. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information provided after the date of this presentation. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure IoT Hub

Azure IoT Hub IoT Hub M M M Field Cloud Data and Command Flow Build 2015 4/20/2017 8:28 AM Azure IoT Hub IoT Hub Field Cloud IoT Hub Gateway HTTPS, AMQPS Data and Command Flow HTTPS AMQPS APIs M M Event Hub M Self-Hosted Gateway MQTT, Custom Field Gateway OPC UA, CoAP, AllJoyn, … Per-device command queues Identity Registry OSS Device Agents Provisioning Device Management Provisioning Communication Management Up to 10M Devices per Hub © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2015 4/20/2017 8:28 AM Azure IoT Hub IoT Hub IoT Hub Gateway HTTPS, AMQPS Data and Command Flow HTTPS AMQPS APIs M M Event Hub M Self-Hosted Gateway MQTT, Custom Field Gateway OPC UA, CoAP, AllJoyn, … Per-device command queues Hyper-Scale Identity Registry for millions of devices per IoT Hub Can federate identity with and via Azure Active Directory Identity Registry OSS Device Agents Provisioning Device Management Provisioning Communication Management © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Azure IoT Hub IoT Hub Secure by Principle. Build 2015 4/20/2017 8:28 AM Azure IoT Hub Secure by Principle. IoT Hub does not permit insecure connections. TLS is always enforced. TLS/X509 initially; TLS/PSK & TLS/RPK on roadmap for compute-constrained devices and bandwidth limited or expensive metered links. IoT Hub IoT Hub Gateway HTTPS, AMQPS Data and Command Flow HTTPS AMQPS APIs M M Event Hub M Self-Hosted Gateway MQTT, Custom Field Gateway OPC UA, CoAP, AllJoyn, … Per-device command queues Native support for Service Assisted Communication model, potentially holding millions of concurrent bi-directional connections. AMQP 1.0 (with WebSockets), HTTP/2 Identity Registry OSS Device Agents Provisioning Device Management Provisioning Communication Management © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2015 4/20/2017 8:28 AM Azure IoT Hub IoT Hub IoT Hub Gateway HTTPS, AMQPS Data and Command Flow HTTPS AMQPS APIs M M Event Hub M Self-Hosted Gateway MQTT, Custom Field Gateway OPC UA, CoAP, AllJoyn, … Per-device command queues All messages are tagged with originator on service side allowing detection of in-payload origin spoofing attempts Channel-level authentication and authorization against the gateway Identity Registry OSS Device Agents Provisioning Device Management Provisioning Communication Validation of signatures against identity registry and blacklists (for signature tokens) Management © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Build 2015 4/20/2017 8:28 AM Azure IoT Hub Device management foundation capabilities for device state inventory and update delivery Device management foundation capabilities for device state inventory and update delivery IoT Hub IoT Hub Gateway HTTPS, AMQPS Data and Command Flow HTTPS AMQPS APIs M M Event Hub M Self-Hosted Gateway MQTT, Custom Field Gateway OPC UA, CoAP, AllJoyn, … Per-device command queues Identity Registry OSS Device Agents Provisioning Device Management Provisioning Communication Management © 2015 Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.

Roadmap

IoT Challenges Cost pressure on device hardware Analog Gap Policies, Procedures, Guidance Cost pressure on device hardware Cheap sensors Weak/no crypto Source of randomness Analog Gap Manipulations difficult to detect Insecure Platforms Tiny Real-Time Operating Systems Legacy Protocols Cloud Field Gateways Devices Data Data Data Application Edge Application Identity and Access Control Global Network Local Network Local Network Host Host Host Physical Physical Physical

What can we do architecturally? Service Assisted Communication Reduce the attack surface area for system and devices Only accept commands to the device from a “trusted source” Enforce secure channel Machine Identity and Access Authorization Who is part of a system and gets to submit data? Authorize the sender Data Streams and Processing Authorization Which data gets sent and who is authorized to process which data? Authorize the receiver Data Plausibility and Flow Authorization What is the data quality and how plausible is it considering the system context? Is it plausible enough to permit it flowing further into the system and for it to influence decisions? Authorize the data stream Data Attestation, Lineage, and Privacy Control Where did data originate, who participated in producing it, and how can we answer these questions only in an authorized context and break the associations altogether when required by policy or law? Authorize identification and association STRIDE STRIDE STRIDE STRIDE STRIDE

Call to Action! IoT Security is a shared responsibility Security concepts to the edge Device code, provisioning, certificates, data management Implement a Secure Development Lifecycle http://microsoft.com/sdl Keep track of the cyber supply chain Work out an incident response plan that includes updates Leverage industry best practices for defense-in-depth Select device platforms by best balance between feature and security capabilities for your scenario and budget. Leverage best practice network design, but don’t just trust the network. Establish security boundaries at the application layer

Call to Action! Build on the Azure IoT Suite and IoT Hub Secure, Service Assisted, Bi-Directional Communication Hyper-Scale Device Identity Management Device Management Foundation Review our platform principles and certifications Azure Trust Center http://azure.microsoft.com/en-us/support/trust-center/ ISO 27001/27002 FBI CJIS (Azure Government) EU Model Clauses SOC 1/SSAE 16/ISAE 3402 and SOC 2 PCI DSS Level 1 Food and Drug Administration 21 CFR Part 11 United Kingdom G-Cloud Cloud Security Alliance CCM Australian Government IRAP FERPA FedRAMP Singapore MTCS Standard FIPS 140-2 FISMA HIPAA CCCPPF CDSA MLPS

Resources Improve your skills by enrolling in our free cloud development courses at the Microsoft Virtual Academy. Try Microsoft Azure for free and deploy your first cloud solution in under 5 minutes! Easily build web and mobile apps for any platform with AzureAppService for free.