SlideShare a Scribd company logo
1 of 45
Download to read offline
IOT Security -- A practical guide
Ryan Wilson, BCom, CISA
www.ryanwilson.com - @ryansdwilson on twitter
Agenda
1. What is IoT?
2. Why should I care?
3. How is it affecting others?
4. IoT CMM - Basic Hygene
Checkup?
5. Common Attack Vectors and
Practical Mitigation Strategies
6. Questions
What is IoT anyways?
Any device on your network that
isn’t a computer
Examples ● Building & Plant Automation (HVAC,
PLC, SCADA, Thermostats)
● Sensors
● Print Servers / Printers / Scanners
● IP Surveillance Cameras
● Physical Access Control Systems &
Intrusion Alarms, Intercoms
● Televisions/Displays, Audio Equipment,
● Video Game Consoles
● NAS - Storage Appliance
● Credit Card Payment Terminals
● [Routers, Firewalls, Switches, Wireless APs,
Wireless Point to Point (Trango)]
● Facility Backup Generator
● WIFI enabled…..
What is so different about these devices
versus traditional computers?
Why is this different from any other device?
1. Who is responsible for the device and the software running on it?
a. IT?
b. Manufacturer?
c. Vendor?
2. Who makes the decisions about when the device software is updated?
a. IT?
b. Manufacturer?
c. Vendor?
d. No one?
3. How familiar are your resources with the technology stack? (BSD Microkernel,
RabbitMQ & Zigbee versus Windows 10/ Ethernet TCP/IP)
Why should we care?
Why should we care?
Rapid growth of device count
Traditional IT security program tends to exclude (Anti-Virus, Active Directory, etc)
Often introduced via Shadow-IT
Generally poor security posture
Often these devices control really important things
Real, material hacks actively occurring
Impact of Compromise
● Compromise of device functionality - the device could be important! Vehicle
computer, electricity, front gate
● Compromise of device data - data integrity vs data value. Consumption Meter vs
Payment Terminals.
● Launch of attacks against others - Mirari Botnet Attack for example
● Launch point for attacks against your assets - Network Traversal/Pivot
State of the Union
70%
Of internet connected IoT devices contain critical vulnerabilities
http://h30499.www3.hp.com/ t5/Fortify-Application-Security/HP-Study-Reveals-70-Percentof-Internet-of-Things-Devices/ba-p/6556284#.VHMpw4uUfVc
HP Study Reveals...
1. Privacy Concerns
2. Insufficient Authorization
3. Lack of transport Encryption
4. Insecure Web Traffic
5. Inadequate software update protection
Examples
Mirai botnet attack
- Largest DDOS attack in history
- Didn’t materially negatively affect device owners… that we know of
- But, in many cases it was security infrastructure that was fully rooted/pwned!!!
- Eliminated other malware from devices
- Thought to be a test of cyber weapon capabilities
- Vulnerable new devices connected to the public internet generally compromised
in less than 10 minutes. Some in less than 60 seconds.
Update - Friday Dec 2 - “New Mirai Worm Knocks 900K Germans Offline”
1 week after DT Attack....
TR-064 (a.k.a., CPE WAN
Management Protocol, or CWMP)
is a widely used protocol many
ISPs employ to remotely manage
network routers. Its communication
occurs on port 7547, to which
remote commands are sent.
Finland
A Distributed Denial of Service (DDoS) attack halted heating distribution at least in
two properties in the city of Lappeenranta, located in eastern Finland. In both of the
events the attacks disabled the computers that were controlling heating in the
buildings.
Attack Knocks Out SF Transit System Fare Terminals
The San Francisco Examiner responded to the address and got a response from the
purported attacker who demanded 100 Bitcoins, worth approximately $73,000, to
restore the systems.
Basic Hygiene Checklist /
IoT CMM
Context - all too often...
❏ we jump to buying vendor solutions -- hint -- you don’t need to buy anything to
secure your IoT devices.
❏ we have trouble communicating with management about risks
❏ we invest time, money and other resources into edge cases whilst neglecting the
basics.
Level 0 - Do we care?
❏ Do we believe that IoT devices pose a risk to our organization?
Level 1 - Situational Awareness
❏ Do we have an inventory of what we have?
❏ Do we know if it is patched and has good passwords?
❏ Can we detect new devices when added automatically within a reasonable amount
of time?
❏ Would we know if devices started making a new outbound connection they had
not been making before?
Level 2 - Responsability
❏ Have we established responsibility for devices, patches and network privileges?
Level 3 - Mitigate Primary Risks
❏ Has the responsible party
❏ Set good passwords on devices
❏ Limited network access to required level
❏ Patched devices regularly
Level 4 - Operationalized Responsibility
❏ Has the responsible party developed a program for our IoT devices including the
following functions
❏ Planning / Procurement
❏ Security / Configuration Standards
❏ Privacy / Data Issues
❏ Maintenance
❏ Monitoring
Common Attack Vectors &
Practical Mitigation Strategies
If you walk away with two things from this talk
1. Does my Internet of Things device really need Internet Access?
a. No Any : Any rules!
2. PASSWORDS!
a. CHANGE THE DEFAULT PASSWORDS
b. USE PASSWORDS
c. USE GOOD PASSWORDS
d. USE UNIQUE PASSWORDS on each DEVICE
Network Segmentation
1. Business justification for level of network access:
a. Inbound?
b. Outbound?
c. Limited In/Out?
d. Corporate network?
e. Other devices on network segment?
2. Consider switchport level access controls
a. Especially for devices in insecure areas.
b. Beware of MAC address spoofing
3. Use NAC 802.1x if possible
4. Require VPN access into IoT segment - even from within office/LAN
5. Leverage on-device SDN / VPNs to avoid segmentation / any “internet” access
Passwords Passwords Passwords
● No password passwords
● Defaults or commonly known root/root admin/admin
● Backdoors (Trango) & others
● Same password on all devices.
● Domain admin passwords used out on devices
Passwords - What to do
1. Extend password policies beyond Active Directory to all devices.
2. Signed password policy from vendors regarding
a. backdoors,
b. unique passwords per client,
c. Protocols for protection of passwords to clients devices
3. Test for defaults
4. Logging to detect use and/or attempts
Logging
● Do your devices log to a central, tamper proof, off-site location? Papertrail App
$25 / month or setup Elastic Search & Logstash for free in your own DC
● Use saved search alerting to detect config changes, password failures, firmware
updates etc.
Patches, Updates and Integrations
● Availability of patches versus device lifespan -
○ Will you be using that wifi light-switch in 20 years?
● Murky Responsibility Hierarchy for device patching IT? Vendor? Manufacturer?
● Functionality changes with updates -- Know anyone who “waits” to update their
iPhone?
● Deep integration of IOT devices from multiple manufacturers makes coordinating
firmware upgrades challenging and risky.
Vendor & Manufacturer Issues
Traditional, offline device vendors are thrust into becoming cloud/IP/software
companies.
● The lifetime of a product, if successful, will go far beyond that envisaged or
desired by the vendor from a sustainment, maintenance and support perspective.
● Accessibility of a product’s control surface goes from standing in the same room
to anywhere on the LAN or anywhere on the internet.
● Fixed capabilities and features transition to continuously expandable. (Tesla gets
over the air updates versus my F150 that has trouble with my iPhone 7)
Vendor & Manufacturer Issues
● Backdoors, Vendor/Support Logons often shared across devices
● Security devices (Intrusion Alarm, Security Cameras, Access Control) installers
don’t have IP/Cloud competencies. Diesel Generator repair man now firewall
expert!
● A prominent intrusion alarm vendor in Canada accidentally revealed to me they
use the same installer code on every alarm they install. Including gov, hospitals,
prisons, banks. Same programing key as well. Key stored in plaintext. All we need
is the public IP of any of their customers and we can remotely control the alarm.
Target - Data breach anyone?
1. Vendor’s (windows) workstations compromised
via malware / RAT tools
2. Vendor’s RAT credentials stolen
3. Pivot from poorly segmented HVAC network to
payment network
Vendor & Manufacturer Issues
● Data Leakage
○ How much of your data is the vendor/manufacturer entitled to?
○ What diligence did the vendor/manufacturer do on their staff and their
vendors?
○ When you stop using the device do you get your data back?
○ How do you deal with right to be forgotten legislation by your customers
when you don’t have access to the vendor’s systems?
○ Do you have an agreement with your vendor on what data they are allowed
to keep?
Vendor Engagement / Procurement Questions?
● How long will they support the device with security updates?
● Are updates digitally signed?
● Encryption Cypher Quality?
● What vendor operated services to the devices depend on?
○ How are they secured?
○ What is their guaranteed lifespan?
● What remote access will you want / do you have to the devices?
● How is your remote access workstations/people secured?
● Written backdoor statement.
● Who will be responsible for this device?
● Do we accept the risk of needing to unplug the device if it becomes compromised?
Encryption...or lack thereof
● No encryption or digital signing of firmware updates
● Unencrypted communications (RTSP, SIP, HTTP admin consoles)
● Self-Signed Certificates
● Weak or outdated cyphers
● “What portion of your clients would you say use SSL between their DVR and IP
Cameras” “You’re the first person I’ve spoken to that wants to enable SSL. Are
you sure you want to spend all that bandwidth and CPU?” --Largest vendor of IP
CCTV in the world.
Control/Programming Workstations
● Control workstation compromise. Often the “security workstation” or “card
printer” is sitting in a closet or under the security guard’s desk.
○ Often not secured to domain standards
○ Vendor set the password when system was installed 8 years ago
○ Often running outdated and unpatched versions of windows subject to easy RAT tool installation.
● Lock up these devices physically (migrate to DC and use RAT/IPKVM tools if
possible)
● Isolate workstations with in/out ACLs. Teamviewer and other tools are common
and dangerous.
● Binary Whitelisting via Group Policy. Disable web browsers.
● Use Anti-Virus
● Leverage centralized directory on these machines
Discovery / Inventory
● Not even being aware it is there...
● Have a method to discover new devices on your network [alienvault, SIEM, dhcp
etc]
● Establish a policy and inventory of non compute network connected devices in
your organization
● Inventory should outline who is responsible for the device, patches, passwords
and business justification for level of network access
Physical Compromise
● Often Serial/USB/JTAG firmware updates possible with physical access. No digital
signature/secure boot / TPM module
● Simple substitution (common with payment terminals)
● Use of network jack in public area to traverse corporate network. Switch Ports in
trunk instead of access mode. No VLAN ACLs. ARP Poisoning
Physical Security - Lessons from PCI
● Tamper Tape/Substitution detection. Hi I’m from the printer repair depot here
for your annual imaging unit changeover.
● Detect switch port status change events on your switch infrastructure. Either a
reboot or substitution.
● Fill USB/JTAG ports with glue
● Use Security screws!
● Record serial numbers!
● Unique Digital Certificates for mutual authentication
email@ryanwilson.com - 604.716.2222
www.ryanwilson.com - @ryansdwilson on twitter
Thank you!
Ryan Wilson

More Related Content

What's hot

IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalFrank Siepmann
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security ElementsEurotech
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythSecurity Innovation
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of ThingsRishabh Sharma
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT SystemsSecurity Innovation
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSomasundaram Jambunathan
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesDenim Group
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot securityUsman Anjum
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 

What's hot (20)

Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Iot Security
Iot SecurityIot Security
Iot Security
 
IoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 finalIoT Security Briefing FBI 07 23-2017 final
IoT Security Briefing FBI 07 23-2017 final
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" MythIoT Security: Debunking the "We Aren't THAT Connected" Myth
IoT Security: Debunking the "We Aren't THAT Connected" Myth
 
IOT Security
IOT SecurityIOT Security
IOT Security
 
Securing Internet of Things
Securing Internet of ThingsSecuring Internet of Things
Securing Internet of Things
 
Security Testing for IoT Systems
Security Testing for IoT SystemsSecurity Testing for IoT Systems
Security Testing for IoT Systems
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Security and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of ThingsSecurity and Privacy considerations in Internet of Things
Security and Privacy considerations in Internet of Things
 
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT TechnologiesUnderstanding IoT Security: How to Quantify Security Risk of IoT Technologies
Understanding IoT Security: How to Quantify Security Risk of IoT Technologies
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Internet & iot security
Internet & iot securityInternet & iot security
Internet & iot security
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]IoT Security: Cases and Methods [CON5446]
IoT Security: Cases and Methods [CON5446]
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 

Viewers also liked

IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and ChallengesOWASP Delhi
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemKaspersky Lab
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issuesrjain51
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesPierluigi Paganini
 
FIWARE: Managing Context Information at large scale
FIWARE: Managing Context Information at large scaleFIWARE: Managing Context Information at large scale
FIWARE: Managing Context Information at large scaleFermin Galan
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practicesST_World
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudAmazon Web Services
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoTgr9293
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsLiwei Ren任力偉
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT securityJulien Vermillard
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of ThingsForgeRock
 
Applying Robotic Process Automation in Banking: Innovations in Finance and Risk
Applying Robotic Process Automation in Banking: Innovations in Finance and RiskApplying Robotic Process Automation in Banking: Innovations in Finance and Risk
Applying Robotic Process Automation in Banking: Innovations in Finance and Riskaccenture
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gMohan Kumar G
 

Viewers also liked (20)

Overview of IoT and Security issues
Overview of IoT and Security issuesOverview of IoT and Security issues
Overview of IoT and Security issues
 
IoT Security Risks and Challenges
IoT Security Risks and ChallengesIoT Security Risks and Challenges
IoT Security Risks and Challenges
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
The Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating SystemThe Future of Embedded and IoT Security: Kaspersky Operating System
The Future of Embedded and IoT Security: Kaspersky Operating System
 
The Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security IssuesThe Internet of Things: Privacy and Security Issues
The Internet of Things: Privacy and Security Issues
 
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
Internet of Things: Challenges and Issues
Internet of Things: Challenges and IssuesInternet of Things: Challenges and Issues
Internet of Things: Challenges and Issues
 
Internet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issuesInternet of Things - Privacy and Security issues
Internet of Things - Privacy and Security issues
 
FIWARE: Managing Context Information at large scale
FIWARE: Managing Context Information at large scaleFIWARE: Managing Context Information at large scale
FIWARE: Managing Context Information at large scale
 
Track 5 session 2 - st dev con 2016 - security iot best practices
Track 5   session 2 - st dev con 2016 - security iot best practicesTrack 5   session 2 - st dev con 2016 - security iot best practices
Track 5 session 2 - st dev con 2016 - security iot best practices
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
security of IOT
security of IOTsecurity of IOT
security of IOT
 
Security in IoT
Security in IoTSecurity in IoT
Security in IoT
 
Psychographics
PsychographicsPsychographics
Psychographics
 
IoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and SolutionsIoT Security: Problems, Challenges and Solutions
IoT Security: Problems, Challenges and Solutions
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Security in the Internet of Things
Security in the Internet of ThingsSecurity in the Internet of Things
Security in the Internet of Things
 
Applying Robotic Process Automation in Banking: Innovations in Finance and Risk
Applying Robotic Process Automation in Banking: Innovations in Finance and RiskApplying Robotic Process Automation in Banking: Innovations in Finance and Risk
Applying Robotic Process Automation in Banking: Innovations in Finance and Risk
 
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-gInternet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
Internet-of-things- (IOT) - a-seminar - ppt - by- mohan-kumar-g
 
Build Features, Not Apps
Build Features, Not AppsBuild Features, Not Apps
Build Features, Not Apps
 

Similar to Ryan Wilson - ryanwilson.com - IoT Security

Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceChristopher Gerritz
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Moon Technolabs Pvt. Ltd.
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02PacSecJP
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael FirstenbergTI Safe
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutionsabe8512000
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerProduct of Things
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonksRohit Kapoor
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityRohit Kapoor
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsGeorge Fletcher
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesKristin Helgeson
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesMrinal Wadhwa
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)sandhibhide
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed Great Bay Software
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisDaksh Raj Chopra
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...Savvius, Inc
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxTurboAnchor
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devicesBenjamin Biwer
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2
 

Similar to Ryan Wilson - ryanwilson.com - IoT Security (20)

Hugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric ImpHugo Fiennes - Security and the IoT - Electric Imp
Hugo Fiennes - Security and the IoT - Electric Imp
 
Incident Response for the Work-from-home Workforce
Incident Response for the Work-from-home WorkforceIncident Response for the Work-from-home Workforce
Incident Response for the Work-from-home Workforce
 
Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it Bolstering the security of iiot applications – how to go about it
Bolstering the security of iiot applications – how to go about it
 
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
Ryder robertson security-considerations_in_the_supply_chain_2017.11.02
 
[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg[CLASS 2014] Palestra Técnica - Michael Firstenberg
[CLASS 2014] Palestra Técnica - Michael Firstenberg
 
Computrace Laptop Security Solutions
Computrace Laptop Security SolutionsComputrace Laptop Security Solutions
Computrace Laptop Security Solutions
 
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha SeltzerAvoid embarrassing press by designing secure IoT products with Misha Seltzer
Avoid embarrassing press by designing secure IoT products with Misha Seltzer
 
LoginCat from TekMonks
LoginCat from TekMonksLoginCat from TekMonks
LoginCat from TekMonks
 
LoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated CybersecurityLoginCat - Zero Trust Integrated Cybersecurity
LoginCat - Zero Trust Integrated Cybersecurity
 
Internet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open StandardsInternet of Things: Identity & Security with Open Standards
Internet of Things: Identity & Security with Open Standards
 
GBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headachesGBS - 8 ways to knockout network headaches
GBS - 8 ways to knockout network headaches
 
Considerations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communitiesConsiderations for a secure internet of things for cities and communities
Considerations for a secure internet of things for cities and communities
 
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)SIM Portland IOT - Sandhi Bhide - (09-14-2016)
SIM Portland IOT - Sandhi Bhide - (09-14-2016)
 
IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed IoT DDoS Attacks: the stakes have changed
IoT DDoS Attacks: the stakes have changed
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
Internet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security AnalysisInternet of things (IoT) Architecture Security Analysis
Internet of things (IoT) Architecture Security Analysis
 
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...All Hope is Not LostNetwork Forensics Exposes Today's Advanced Security Thr...
All Hope is Not Lost Network Forensics Exposes Today's Advanced Security Thr...
 
A Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptxA Quick Guide On What Is IoT Security_.pptx
A Quick Guide On What Is IoT Security_.pptx
 
Securing IoT medical devices
Securing IoT medical devicesSecuring IoT medical devices
Securing IoT medical devices
 
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet ChallengeWSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
WSO2Con EU 2015: Keynote - The Identity of Things: The Next Internet Challenge
 

Recently uploaded

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 

Ryan Wilson - ryanwilson.com - IoT Security

  • 1. IOT Security -- A practical guide Ryan Wilson, BCom, CISA www.ryanwilson.com - @ryansdwilson on twitter
  • 2. Agenda 1. What is IoT? 2. Why should I care? 3. How is it affecting others? 4. IoT CMM - Basic Hygene Checkup? 5. Common Attack Vectors and Practical Mitigation Strategies 6. Questions
  • 3. What is IoT anyways?
  • 4. Any device on your network that isn’t a computer
  • 5. Examples ● Building & Plant Automation (HVAC, PLC, SCADA, Thermostats) ● Sensors ● Print Servers / Printers / Scanners ● IP Surveillance Cameras ● Physical Access Control Systems & Intrusion Alarms, Intercoms ● Televisions/Displays, Audio Equipment, ● Video Game Consoles ● NAS - Storage Appliance ● Credit Card Payment Terminals ● [Routers, Firewalls, Switches, Wireless APs, Wireless Point to Point (Trango)] ● Facility Backup Generator ● WIFI enabled…..
  • 6. What is so different about these devices versus traditional computers?
  • 7. Why is this different from any other device? 1. Who is responsible for the device and the software running on it? a. IT? b. Manufacturer? c. Vendor? 2. Who makes the decisions about when the device software is updated? a. IT? b. Manufacturer? c. Vendor? d. No one? 3. How familiar are your resources with the technology stack? (BSD Microkernel, RabbitMQ & Zigbee versus Windows 10/ Ethernet TCP/IP)
  • 9. Why should we care? Rapid growth of device count Traditional IT security program tends to exclude (Anti-Virus, Active Directory, etc) Often introduced via Shadow-IT Generally poor security posture Often these devices control really important things Real, material hacks actively occurring
  • 10. Impact of Compromise ● Compromise of device functionality - the device could be important! Vehicle computer, electricity, front gate ● Compromise of device data - data integrity vs data value. Consumption Meter vs Payment Terminals. ● Launch of attacks against others - Mirari Botnet Attack for example ● Launch point for attacks against your assets - Network Traversal/Pivot
  • 11. State of the Union
  • 12. 70% Of internet connected IoT devices contain critical vulnerabilities http://h30499.www3.hp.com/ t5/Fortify-Application-Security/HP-Study-Reveals-70-Percentof-Internet-of-Things-Devices/ba-p/6556284#.VHMpw4uUfVc
  • 13. HP Study Reveals... 1. Privacy Concerns 2. Insufficient Authorization 3. Lack of transport Encryption 4. Insecure Web Traffic 5. Inadequate software update protection
  • 15. Mirai botnet attack - Largest DDOS attack in history - Didn’t materially negatively affect device owners… that we know of - But, in many cases it was security infrastructure that was fully rooted/pwned!!! - Eliminated other malware from devices - Thought to be a test of cyber weapon capabilities - Vulnerable new devices connected to the public internet generally compromised in less than 10 minutes. Some in less than 60 seconds. Update - Friday Dec 2 - “New Mirai Worm Knocks 900K Germans Offline”
  • 16. 1 week after DT Attack.... TR-064 (a.k.a., CPE WAN Management Protocol, or CWMP) is a widely used protocol many ISPs employ to remotely manage network routers. Its communication occurs on port 7547, to which remote commands are sent.
  • 17.
  • 18.
  • 19. Finland A Distributed Denial of Service (DDoS) attack halted heating distribution at least in two properties in the city of Lappeenranta, located in eastern Finland. In both of the events the attacks disabled the computers that were controlling heating in the buildings.
  • 20. Attack Knocks Out SF Transit System Fare Terminals The San Francisco Examiner responded to the address and got a response from the purported attacker who demanded 100 Bitcoins, worth approximately $73,000, to restore the systems.
  • 22. Context - all too often... ❏ we jump to buying vendor solutions -- hint -- you don’t need to buy anything to secure your IoT devices. ❏ we have trouble communicating with management about risks ❏ we invest time, money and other resources into edge cases whilst neglecting the basics.
  • 23. Level 0 - Do we care? ❏ Do we believe that IoT devices pose a risk to our organization?
  • 24. Level 1 - Situational Awareness ❏ Do we have an inventory of what we have? ❏ Do we know if it is patched and has good passwords? ❏ Can we detect new devices when added automatically within a reasonable amount of time? ❏ Would we know if devices started making a new outbound connection they had not been making before?
  • 25. Level 2 - Responsability ❏ Have we established responsibility for devices, patches and network privileges?
  • 26. Level 3 - Mitigate Primary Risks ❏ Has the responsible party ❏ Set good passwords on devices ❏ Limited network access to required level ❏ Patched devices regularly
  • 27. Level 4 - Operationalized Responsibility ❏ Has the responsible party developed a program for our IoT devices including the following functions ❏ Planning / Procurement ❏ Security / Configuration Standards ❏ Privacy / Data Issues ❏ Maintenance ❏ Monitoring
  • 28. Common Attack Vectors & Practical Mitigation Strategies
  • 29. If you walk away with two things from this talk 1. Does my Internet of Things device really need Internet Access? a. No Any : Any rules! 2. PASSWORDS! a. CHANGE THE DEFAULT PASSWORDS b. USE PASSWORDS c. USE GOOD PASSWORDS d. USE UNIQUE PASSWORDS on each DEVICE
  • 30. Network Segmentation 1. Business justification for level of network access: a. Inbound? b. Outbound? c. Limited In/Out? d. Corporate network? e. Other devices on network segment? 2. Consider switchport level access controls a. Especially for devices in insecure areas. b. Beware of MAC address spoofing 3. Use NAC 802.1x if possible 4. Require VPN access into IoT segment - even from within office/LAN 5. Leverage on-device SDN / VPNs to avoid segmentation / any “internet” access
  • 31. Passwords Passwords Passwords ● No password passwords ● Defaults or commonly known root/root admin/admin ● Backdoors (Trango) & others ● Same password on all devices. ● Domain admin passwords used out on devices
  • 32. Passwords - What to do 1. Extend password policies beyond Active Directory to all devices. 2. Signed password policy from vendors regarding a. backdoors, b. unique passwords per client, c. Protocols for protection of passwords to clients devices 3. Test for defaults 4. Logging to detect use and/or attempts
  • 33. Logging ● Do your devices log to a central, tamper proof, off-site location? Papertrail App $25 / month or setup Elastic Search & Logstash for free in your own DC ● Use saved search alerting to detect config changes, password failures, firmware updates etc.
  • 34. Patches, Updates and Integrations ● Availability of patches versus device lifespan - ○ Will you be using that wifi light-switch in 20 years? ● Murky Responsibility Hierarchy for device patching IT? Vendor? Manufacturer? ● Functionality changes with updates -- Know anyone who “waits” to update their iPhone? ● Deep integration of IOT devices from multiple manufacturers makes coordinating firmware upgrades challenging and risky.
  • 35. Vendor & Manufacturer Issues Traditional, offline device vendors are thrust into becoming cloud/IP/software companies. ● The lifetime of a product, if successful, will go far beyond that envisaged or desired by the vendor from a sustainment, maintenance and support perspective. ● Accessibility of a product’s control surface goes from standing in the same room to anywhere on the LAN or anywhere on the internet. ● Fixed capabilities and features transition to continuously expandable. (Tesla gets over the air updates versus my F150 that has trouble with my iPhone 7)
  • 36. Vendor & Manufacturer Issues ● Backdoors, Vendor/Support Logons often shared across devices ● Security devices (Intrusion Alarm, Security Cameras, Access Control) installers don’t have IP/Cloud competencies. Diesel Generator repair man now firewall expert! ● A prominent intrusion alarm vendor in Canada accidentally revealed to me they use the same installer code on every alarm they install. Including gov, hospitals, prisons, banks. Same programing key as well. Key stored in plaintext. All we need is the public IP of any of their customers and we can remotely control the alarm.
  • 37. Target - Data breach anyone? 1. Vendor’s (windows) workstations compromised via malware / RAT tools 2. Vendor’s RAT credentials stolen 3. Pivot from poorly segmented HVAC network to payment network
  • 38. Vendor & Manufacturer Issues ● Data Leakage ○ How much of your data is the vendor/manufacturer entitled to? ○ What diligence did the vendor/manufacturer do on their staff and their vendors? ○ When you stop using the device do you get your data back? ○ How do you deal with right to be forgotten legislation by your customers when you don’t have access to the vendor’s systems? ○ Do you have an agreement with your vendor on what data they are allowed to keep?
  • 39. Vendor Engagement / Procurement Questions? ● How long will they support the device with security updates? ● Are updates digitally signed? ● Encryption Cypher Quality? ● What vendor operated services to the devices depend on? ○ How are they secured? ○ What is their guaranteed lifespan? ● What remote access will you want / do you have to the devices? ● How is your remote access workstations/people secured? ● Written backdoor statement. ● Who will be responsible for this device? ● Do we accept the risk of needing to unplug the device if it becomes compromised?
  • 40. Encryption...or lack thereof ● No encryption or digital signing of firmware updates ● Unencrypted communications (RTSP, SIP, HTTP admin consoles) ● Self-Signed Certificates ● Weak or outdated cyphers ● “What portion of your clients would you say use SSL between their DVR and IP Cameras” “You’re the first person I’ve spoken to that wants to enable SSL. Are you sure you want to spend all that bandwidth and CPU?” --Largest vendor of IP CCTV in the world.
  • 41. Control/Programming Workstations ● Control workstation compromise. Often the “security workstation” or “card printer” is sitting in a closet or under the security guard’s desk. ○ Often not secured to domain standards ○ Vendor set the password when system was installed 8 years ago ○ Often running outdated and unpatched versions of windows subject to easy RAT tool installation. ● Lock up these devices physically (migrate to DC and use RAT/IPKVM tools if possible) ● Isolate workstations with in/out ACLs. Teamviewer and other tools are common and dangerous. ● Binary Whitelisting via Group Policy. Disable web browsers. ● Use Anti-Virus ● Leverage centralized directory on these machines
  • 42. Discovery / Inventory ● Not even being aware it is there... ● Have a method to discover new devices on your network [alienvault, SIEM, dhcp etc] ● Establish a policy and inventory of non compute network connected devices in your organization ● Inventory should outline who is responsible for the device, patches, passwords and business justification for level of network access
  • 43. Physical Compromise ● Often Serial/USB/JTAG firmware updates possible with physical access. No digital signature/secure boot / TPM module ● Simple substitution (common with payment terminals) ● Use of network jack in public area to traverse corporate network. Switch Ports in trunk instead of access mode. No VLAN ACLs. ARP Poisoning
  • 44. Physical Security - Lessons from PCI ● Tamper Tape/Substitution detection. Hi I’m from the printer repair depot here for your annual imaging unit changeover. ● Detect switch port status change events on your switch infrastructure. Either a reboot or substitution. ● Fill USB/JTAG ports with glue ● Use Security screws! ● Record serial numbers! ● Unique Digital Certificates for mutual authentication
  • 45. email@ryanwilson.com - 604.716.2222 www.ryanwilson.com - @ryansdwilson on twitter Thank you! Ryan Wilson