SlideShare a Scribd company logo
1 of 30
Download to read offline
H2020 IoT Security/Privacy Cluster
Projects: Overview of Risk Assessment
Solutions
H2020 IOT Security/Privacy Cluster , May 2019
All the presented projects have received funding from the
European Union’s Horizon 2020 research and innovation
programme
Cluster Projects that Focus on Risk Assessment: Overview of Approaches (1)
Brain-IoT
• Risk assessment as a means of setting
security objectives & driving requirements
CHARIOT
• Simulation tool for risk assessment, risk
mitigation and data generation
ENACT
• Continuous & Adaptive IoT Risk Assessment
integrated with DevOps
Cluster Projects that Focus on Risk Assessment: Overview of Approaches (2)
IoT Crawler
• Analysis of threats and relevant risks in the
context of IoT Search & Crawling
SecureIoT
• Data-driven risk assessment i.e. advanced
data analytics for risk assessment & scoring
SerIoT
• Policy Based Framework for Risk Mitigation
Cluster Projects that Focus on Risk Assessment: Overview of Approaches
RA Area / Project Brain-IoT IoTCrawler SecureIoT CHARIOT ENACT SerIoT
Asset Modelling X X X X X X
Threat Modelling X X X X X X
Threat Databases &
Knowledge Bases
X X X
Threats & Assets Mapping X X
Data Analytics & AI for Risk
Assessment
X
Risk Driven Security
Requirements
X X
Risk Simulation & Calculation X
Risk Visualization X X
Risk Mitigation X
Specification of IoT Threats for
Search and Crawling
X
Brain-IoT: Model-Based Framework for Dependable Sensing & Actuation in
Intelligent Decentralized IoT Systems
Objectives, Scope, Validation
• Interoperability & Dynamic
Platforms Federations (Shared
Semantic Models linked
dynamically to IoT devices)
• Smart Cooperative Behaviours
based on AI features
• Dynamic AAA
• Embedded Privacy & Privacy
Control
• Dynamic Commissioning &
Reconfiguration (edge/cloud
deployment & balancing)
• Validation Settings: Robotics,
Critical Water Infrastructures,
H2020 LSP Projects (Smart Cities,
Healthcare, Wearables..)
www.brain-iot.eu
Scope of Risk Assessment in Brain-IoT
Scope: Systems Managed by Brain-IoT (not external systems)
•IoT Devices & Platforms in Brain-IoT Use Cases
Iterative Methodology
•Assets identification
•Threats identification , based on common threats databases (EBIOS, OWASP, etc.).
•Security objectives are derived from the threats, to identify security level targeted for each environment.
•Security technical requirements are built to counter the threats
Identification of Assets, Threats & Vulnerabilities
Asset Identification
• Different Types of
Assets
• Software (e.g., an
operating system)
• Hardware (e.g., a
sensor, CPU,
memory, etc.)
• Data (e.g., sensor
status transmitted
over a network,
robot location in
memory, etc.)
• Each asset has an
Identifier and is
classified based on
its role & Impact on
the System
Threats and
Vulnerabilities
Identification
• EBIOS Methodology
• Eight main
categories
• Physical damage
• Natural events
• Loss of essential
services
• Disturbance due to
radiation
• Compromise of
information
• Technical failures
• Unauthorized
actions
• Compromise of
functions
Mapping Assets & Vulnerabilities/Threats (Template)
Security Objectives
Security Objectives
• Derived from threats
• Guideline to counter the identified threats and to satisfy the
security principle
• Should cover the full list of threats for each asset
• Could be classified in terms of Integrity, Confidentiality, and
Availability
Security Requirements
Security Requirements
• Final step of the methodology: Technical requirement
identification.
• Each security objective should lead to the implementation of
one or more technical requirements
• Requirement list used as input for the technical design definition
CHARIOT: Cognitive Heterogeneous Architecture for Industrial IoT
www.chariotproject.eu
Objectives, Scope, Validation
• Methodological Framework for the Design
and Operation of Safety Critical Systems
(safety as cross-cutting concern)
• Open Cognitive IoT Architecture and
Platform for safety critical systems and IoT
systems interaction in a secure manner
• Runtime IoT Privacy, Security and Safety
Supervision Engine (IPSE)
• Privacy Engine based on PKI and
Blockchain technologies
• Firmware Security integrity checking
• IoT Safety Supervision Engine (ISSE)
• Analytics Prediction and Dashboard
• Validation: Trenitalia (Italy) & Athens
International Airport (Greece), IBM Campus
(Ireland)
CHARIOT: Scope of Risk Assessment Work
Risk Assessment and Mitigation
• Various standards are part of
CHARIOT’s design and methodology for
use cases in different sectors (e.g., IEC
62443 for railway, CANSO Guide for
Aviation)
• A Simulation Tool developed to
facilitate design and enable data
collection, while boosting risk
assessment
CHARIOT
Simulator
•Privacy, security,
safety threat
vulnerability
analysis
•Predict IoT
devices anomalies
and malfunctions
•Score risk when
something is not
behaving as
expected •Provide
mitigation plans
and
recommendations
Show & Illustrate
bottlenecks
CHARIOT Simulator Snapshot
ENACT: Development, Operation, and Quality Assurance of Trustworthy
Smart IoT Systems
Objectives, Scope, Validation
• Enablers for continuous
development and operation of
trustworthy IoT systems
• Risk-driven and agile
development and delivery
• Continuous evolution to keep
the smart IoT system
trustworthy despite internal
threats
• Address security, privacy, safety,
resilience, and reliability.
• Deal with software updates,
new security strategies, new
user profiles, policies changes.
• Validation: Rail, Healthcare,
Smart Building
CODE
BUILD TEST
RELEASE &
DEPLOY
OPERATE
Risk-Driven
Design Planning
Language to specify
Devicesbehavior
& securitybehavior
Automated deployment
of Smart IoT systems
and securitymechanisms
Simulation and Test environment for
Smart IoT applications.
Simulate and test securitymechanisms.
Security, robustnessand context monitoring
and root-cause analysis
Dynamicadaptation
in open contexts
& actuation conflicts
handling
Secure and context-
aware orchestration
of sensors, actuators
and software services.
Actuation conflict
identification
https://www.enact-project.eu
Risk Management Objectives & Approach in ENACT
RA Scope in ENACT
• Concepts and tools for agile context-
aware and risk-driven decision support
and selection of resources
• Enable application developers and
operators to support continuous
delivery of trustworthy smart IoT
systems.
• Framework & Methodologies: OCTAVE,
OWASP CORAS for likelihood and
impact analysis
RA Functionalities
• Detect risks (System Level &
Component Level)
• Produce mitigation actions - directly
actionable by DevOps teams
• Classifies mitigation actions in order to
understand the impact on the DevOps
process
• Provide a current risk status report for
legislation compliance
Baseline and Progress
Extensions to MUSA
• Support any types of risk, defined within the catalogue or defined by the user.
• Enable creation & evaluation of non-functional risks.
• Integration with the DevOps cycle - Monitor the risk mitigation status though evidence collectors
• Open data Risks catalogue for IoT space
• The full functionality provided in ENACT will be released as open-source under MIT license.
MUSA Risk Assessment
Seamless & Impactless Risk Management for
DevOps team
Support IoT and Edge:
• Consider software and hardware components
• IoT security, privacy, resilience,
& non-functional risks
Baseline Planned Progress
ENACT Risk
Management
Main Innovations in Risk Assessment
Adaptability
• Completely adaptable to
each customer’s problem
and process
• Adapts to architecture or
process changes
Dashboards &
Visualization
• Dashboards for
continuous process
management adapted
to different roles
• Risk warning
visualization connected
to project management
• Automatically raise
awareness on risks
related to changes in
the schedule
Continuous Risk Control
• Novel mechanisms to
define risks and
mitigations related to a
process.
• Likelihood and impact of
potential risks
associated to the
project will be
continuously calculated
depending on actual
process execution.
IoTCrawler: Search Engine for the Internet of Things
Objectives, Scope, Validation
• Search engines that support crawling,
discovery and integration of IoT data.
• Adaptive and dynamic solutions for
resource ranking and selection.
• Distributed crawling and indexing
mechanisms to enable near real-time
discovery and search of massive real
world (IoT) data streams in a secure and
privacy- and trust-aware framework.
• Enablers for security-, privacy and trust-
aware discovery and access to IoT
resources in constrained IoT
environments
• New applications and services that rely
on ad-hoc and dynamic data/service
query and access.
• Validation: Smart City, Social IoT, Smart
Energy, Industry 4.0
https://iotcrawler.eu/
Security,Privacy&Trust
IoT Resources: sensors and actuators
Use cases
Machine initiated semantic sear ch
IoT discovery
Context management
Monitoring & fault recovery
Multi-criteria ranking
Adaptive indexing
Edge
broker
Edge
broker
Edge
broker
Cloud
broker
Distributed
IoT framework
Dynamic
crawling
Search
Dataanalysis
API
Smart city Social IoT
Smart
energy
Industry
4.0
Repositories of Threats used in IoTCrawler
IoTCrawler specifies a library of threats
derived from existing repositories and
ontologies
Threat
Modelling in
IoTCrawler
IoTSec Ontology: Comprises Repository
threats for IoT
IoTSec
Paper on Threat Analysis for M2M
Communications
ETSI’s Threat
Analysis
IoTCrawler: Types of Threats Analyzed & Modelled
Types
of
Threats
IoT Devices
Threats
Communication
Threats
Platform
Threats
M2M Threats
SecureIoT: Predictive Security for IoT Platforms and Networks of
Smart Objects
Objectives, Scope, Validation
• End-to-End Security
Monitoring for Predictive
(AI-based Security)
• Security Interoperability
across IoT Platforms
• Cross-Platform & Cross-
Vertical
• Validation: Socially
Assistive Robots, Smart
Manufacturing, Connected
Car & Self-Driving
https://secureiot.eu/
IoT Systems
(Platforms &
Devices)
Field
Network
Field
Device
Edge
Cloud
App Intelligent
(Context-
Aware)
Data
Collection
Actuation &
Automation
Open APIs
IoT Security
Template
Extraction
(Analytics)
Template
Execution
Engine
(e.g., Rule
Engine)
Global Storage
(Cloud)
SecureIoT
Database+ Assets
Registry
IoT Security Templates
Database
Templates
Contextualization
Engine
IoT Security
Knowledge Base
Security Policy
Enforcement Point
Risk
Assessment
Compliance
Auditing
Developers’
Support
Developers’
Support
WP4
Open APIs
WP5
WP3
SecureIoT: Functional Architecture (Logical View)
SecureIoT Architecture
• Data Driven Architecture for SECaaS Services
• Risk Assessment is one of the SECaaS Services
• Risk Assessment leverages processing & analytics over security information derived from various
probes
Risk Assessment Workflow SecureIoT Platform
Main Elements of
SecureIoT Risk
Assessment Approach
• System
• Asset
• Abuse Case
• Risk Model
• Indicators
• Mitigation Measures
SecureIoT Assets & Threats Modelling (Proprietary)
IoT Security Knowledge Base
IoT Security Knowledge Base
• Serves as basis for Vulnerabilities Identification &
Resolution
CVE, CWE, CPE,
CAPEC data
• Vulnerabilities documents
• 4 tables (CVE, CPE, CAPEC, CWE)
• Documents database (MongoDB)
CVE, CWE, CPE,
CAPEC relations
• CyberThreat Intelligence (CTI)
• Graph database (OrientDB + Tinkerpop Gremlin)
Devices
knowledge graph
• Knowledge graph databases
• One per device
• Graph database (OrientDB + Tinkerpop Gremli)
Role of IoT Security Knowledge Base in Risk Assessment
Official sources IoT assets
Risk assessment
service
Template
execution engine
Human end-user
API
Visual tools
CyberThreat Intelligence
crawler
Assets aggregator
Knowledge Base DBs
SerIoT: Secure & Safe Internet of Things
Objectives, Scope, Validation
• Design a Cognitive Packet Network
that interconnects distributed IoT
subsystems based on SDN
technology
• Use “Smart Packets” (SP) to search
for secure multi-hop routes having
good quality of service & energy
efficiency.
• Use Random Neural Networks for
routing decisions and overall
network performance
improvements – “Security Aware”
routing
• Validation: ITS & Smart Cities,
Surveillance, Flexible
Manufacturing, Food Chain
https://seriot-project.eu
Scope of Risk Assessment Work in IoT
Policy based Framework for data usage and risk
prevention
• Enable risk identification and minimization based on
appropriate policies
Risk Analysis & Mitigation based on cross-layer data
collection & analytics
• Empowered by interoperability and resulting in increased
intelligence
Validation in LL (Smart Transport)
• E.g., Risk Mitigation in Road ITS Scenarios
Possible Synergies & Joint Activities
Synergies
on Risk
Assessme
nt
Alignment & Reuse
of Asset Modelling
Approaches
Exchange of Threat
Models, Asset
Models etc.
Joint Whitepaper on
Risk Modelling &
Assessment for IoT
Catalogue of
Different Standards
(ENISA, IEC 62433)
and Methodologies
(e.g., EBIOS,
OCTAVE, CORAS etc)
Examples
• IoTCrawler threats as
input to SecureIoT
Knowledge base
• Common Database of
Assets, Threats and
Vulnerabilities
• Brain-IoT methodology
used to drive Security
Requirements in SecureIoT
Use Cases
• CHARIoT Simulator could
generate datasets to
shared with other projects
Thank you

More Related Content

What's hot

Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT SecurityOliver Pfaff
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingBryan Len
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist PriyaNemade
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...CableLabs
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...team-WIBU
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challengesHadi Fadlallah
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIntel® Software
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 Tonex
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...Seungjoo Kim
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSukumar Nayak
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT securityIoT613
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns Exosite
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsIRJET Journal
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamAmit Rohatgi
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesShashi Kiran
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsStanford School of Engineering
 

What's hot (20)

Trends in IIoT and OT Security
Trends in IIoT and OT SecurityTrends in IIoT and OT Security
Trends in IIoT and OT Security
 
IoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex TrainingIoT Security Awareness Training : Tonex Training
IoT Security Awareness Training : Tonex Training
 
IoT/M2M Security
IoT/M2M SecurityIoT/M2M Security
IoT/M2M Security
 
IoT security compliance checklist
IoT security compliance checklist IoT security compliance checklist
IoT security compliance checklist
 
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
Internet of Things (IoT) Security and Privacy Recommendations by Jason Living...
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
Protecting IIoT Endpoints - an inside look at the Industrial Internet Securit...
 
Internet of things security challenges
Internet of things security challengesInternet of things security challenges
Internet of things security challenges
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019 IoT Security Training, IoT Security Awareness 2019
IoT Security Training, IoT Security Awareness 2019
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
 
SN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoTSN-Security Architecture for Mobile Computing and IoT
SN-Security Architecture for Mobile Computing and IoT
 
Principals of IoT security
Principals of IoT securityPrincipals of IoT security
Principals of IoT security
 
IoT security patterns
IoT security patterns IoT security patterns
IoT security patterns
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
Security and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of thingsSecurity and Privacy Big Challenges in Internet of things
Security and Privacy Big Challenges in Internet of things
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
IoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative ApproachesIoT and IIoT - Security Challenges and Innovative Approaches
IoT and IIoT - Security Challenges and Innovative Approaches
 
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of ThingsMark Horowitz - Stanford Engineering - Securing the Internet of Things
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
 

Similar to Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects

Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM  & SOAR.pdfMicrosoft Sentinel- a cloud native SIEM  & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM & SOAR.pdfKranthi Aragonda
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOpsCYBRIC
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart WaySecurity Innovation
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i SecurityPrecisely
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentMark Szewczul, CISSP
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)abhimanyubhogwan
 
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAsaf Nakash
 
H2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects PresentationH2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects PresentationSecureIoT H2020 funded project
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesBlack Duck by Synopsys
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018aztechcouncil
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)Shah Sheikh
 
Managed security services
Managed security servicesManaged security services
Managed security servicesmanoharparakh
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis Belsis MPhil/MRes/BSc
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentInfocyte
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systemsTonex
 

Similar to Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects (20)

S4x20 Forescout Presentation
S4x20 Forescout Presentation S4x20 Forescout Presentation
S4x20 Forescout Presentation
 
Careers in Cyber Security
Careers in Cyber SecurityCareers in Cyber Security
Careers in Cyber Security
 
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM  & SOAR.pdfMicrosoft Sentinel- a cloud native SIEM  & SOAR.pdf
Microsoft Sentinel- a cloud native SIEM & SOAR.pdf
 
How to Get Started with DevSecOps
How to Get Started with DevSecOpsHow to Get Started with DevSecOps
How to Get Started with DevSecOps
 
Assessing System Risk the Smart Way
Assessing System Risk the Smart WayAssessing System Risk the Smart Way
Assessing System Risk the Smart Way
 
Best Practices in IBM i Security
Best Practices in IBM i SecurityBest Practices in IBM i Security
Best Practices in IBM i Security
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
Threat modelling(system + enterprise)
Threat modelling(system + enterprise)Threat modelling(system + enterprise)
Threat modelling(system + enterprise)
 
Azure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and complianceAzure Operation Management Suite - security and compliance
Azure Operation Management Suite - security and compliance
 
H2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects PresentationH2020 IoT Security/Privacy Cluster Projects Presentation
H2020 IoT Security/Privacy Cluster Projects Presentation
 
Open Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best PracticesOpen Source Security for Newbies - Best Practices
Open Source Security for Newbies - Best Practices
 
Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018Opening Keynote - Cybersecurity Summit 2018
Opening Keynote - Cybersecurity Summit 2018
 
Vulenerability Management.pptx
Vulenerability Management.pptxVulenerability Management.pptx
Vulenerability Management.pptx
 
DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)DTS Solution - Building a SOC (Security Operations Center)
DTS Solution - Building a SOC (Security Operations Center)
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Meletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information securityMeletis BelsisManaging and enforcing information security
Meletis BelsisManaging and enforcing information security
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local GovernmentTIG / Infocyte: Proactive Cybersecurity for State and Local Government
TIG / Infocyte: Proactive Cybersecurity for State and Local Government
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Cyber security applied to embedded systems
Cyber security applied to embedded systemsCyber security applied to embedded systems
Cyber security applied to embedded systems
 

Recently uploaded

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWave PLM
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 

Recently uploaded (20)

KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Naraina Delhi 💯Call Us 🔝8264348440🔝
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
What is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need ItWhat is Fashion PLM and Why Do You Need It
What is Fashion PLM and Why Do You Need It
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 

Risk Assessment Solutions of H2020 IoT Security/Privacy Cluster Projects

  • 1. H2020 IoT Security/Privacy Cluster Projects: Overview of Risk Assessment Solutions H2020 IOT Security/Privacy Cluster , May 2019 All the presented projects have received funding from the European Union’s Horizon 2020 research and innovation programme
  • 2. Cluster Projects that Focus on Risk Assessment: Overview of Approaches (1) Brain-IoT • Risk assessment as a means of setting security objectives & driving requirements CHARIOT • Simulation tool for risk assessment, risk mitigation and data generation ENACT • Continuous & Adaptive IoT Risk Assessment integrated with DevOps
  • 3. Cluster Projects that Focus on Risk Assessment: Overview of Approaches (2) IoT Crawler • Analysis of threats and relevant risks in the context of IoT Search & Crawling SecureIoT • Data-driven risk assessment i.e. advanced data analytics for risk assessment & scoring SerIoT • Policy Based Framework for Risk Mitigation
  • 4. Cluster Projects that Focus on Risk Assessment: Overview of Approaches RA Area / Project Brain-IoT IoTCrawler SecureIoT CHARIOT ENACT SerIoT Asset Modelling X X X X X X Threat Modelling X X X X X X Threat Databases & Knowledge Bases X X X Threats & Assets Mapping X X Data Analytics & AI for Risk Assessment X Risk Driven Security Requirements X X Risk Simulation & Calculation X Risk Visualization X X Risk Mitigation X Specification of IoT Threats for Search and Crawling X
  • 5. Brain-IoT: Model-Based Framework for Dependable Sensing & Actuation in Intelligent Decentralized IoT Systems Objectives, Scope, Validation • Interoperability & Dynamic Platforms Federations (Shared Semantic Models linked dynamically to IoT devices) • Smart Cooperative Behaviours based on AI features • Dynamic AAA • Embedded Privacy & Privacy Control • Dynamic Commissioning & Reconfiguration (edge/cloud deployment & balancing) • Validation Settings: Robotics, Critical Water Infrastructures, H2020 LSP Projects (Smart Cities, Healthcare, Wearables..) www.brain-iot.eu
  • 6. Scope of Risk Assessment in Brain-IoT Scope: Systems Managed by Brain-IoT (not external systems) •IoT Devices & Platforms in Brain-IoT Use Cases Iterative Methodology •Assets identification •Threats identification , based on common threats databases (EBIOS, OWASP, etc.). •Security objectives are derived from the threats, to identify security level targeted for each environment. •Security technical requirements are built to counter the threats
  • 7. Identification of Assets, Threats & Vulnerabilities Asset Identification • Different Types of Assets • Software (e.g., an operating system) • Hardware (e.g., a sensor, CPU, memory, etc.) • Data (e.g., sensor status transmitted over a network, robot location in memory, etc.) • Each asset has an Identifier and is classified based on its role & Impact on the System Threats and Vulnerabilities Identification • EBIOS Methodology • Eight main categories • Physical damage • Natural events • Loss of essential services • Disturbance due to radiation • Compromise of information • Technical failures • Unauthorized actions • Compromise of functions
  • 8. Mapping Assets & Vulnerabilities/Threats (Template)
  • 9. Security Objectives Security Objectives • Derived from threats • Guideline to counter the identified threats and to satisfy the security principle • Should cover the full list of threats for each asset • Could be classified in terms of Integrity, Confidentiality, and Availability
  • 10. Security Requirements Security Requirements • Final step of the methodology: Technical requirement identification. • Each security objective should lead to the implementation of one or more technical requirements • Requirement list used as input for the technical design definition
  • 11. CHARIOT: Cognitive Heterogeneous Architecture for Industrial IoT www.chariotproject.eu Objectives, Scope, Validation • Methodological Framework for the Design and Operation of Safety Critical Systems (safety as cross-cutting concern) • Open Cognitive IoT Architecture and Platform for safety critical systems and IoT systems interaction in a secure manner • Runtime IoT Privacy, Security and Safety Supervision Engine (IPSE) • Privacy Engine based on PKI and Blockchain technologies • Firmware Security integrity checking • IoT Safety Supervision Engine (ISSE) • Analytics Prediction and Dashboard • Validation: Trenitalia (Italy) & Athens International Airport (Greece), IBM Campus (Ireland)
  • 12. CHARIOT: Scope of Risk Assessment Work Risk Assessment and Mitigation • Various standards are part of CHARIOT’s design and methodology for use cases in different sectors (e.g., IEC 62443 for railway, CANSO Guide for Aviation) • A Simulation Tool developed to facilitate design and enable data collection, while boosting risk assessment CHARIOT Simulator •Privacy, security, safety threat vulnerability analysis •Predict IoT devices anomalies and malfunctions •Score risk when something is not behaving as expected •Provide mitigation plans and recommendations Show & Illustrate bottlenecks
  • 14. ENACT: Development, Operation, and Quality Assurance of Trustworthy Smart IoT Systems Objectives, Scope, Validation • Enablers for continuous development and operation of trustworthy IoT systems • Risk-driven and agile development and delivery • Continuous evolution to keep the smart IoT system trustworthy despite internal threats • Address security, privacy, safety, resilience, and reliability. • Deal with software updates, new security strategies, new user profiles, policies changes. • Validation: Rail, Healthcare, Smart Building CODE BUILD TEST RELEASE & DEPLOY OPERATE Risk-Driven Design Planning Language to specify Devicesbehavior & securitybehavior Automated deployment of Smart IoT systems and securitymechanisms Simulation and Test environment for Smart IoT applications. Simulate and test securitymechanisms. Security, robustnessand context monitoring and root-cause analysis Dynamicadaptation in open contexts & actuation conflicts handling Secure and context- aware orchestration of sensors, actuators and software services. Actuation conflict identification https://www.enact-project.eu
  • 15. Risk Management Objectives & Approach in ENACT RA Scope in ENACT • Concepts and tools for agile context- aware and risk-driven decision support and selection of resources • Enable application developers and operators to support continuous delivery of trustworthy smart IoT systems. • Framework & Methodologies: OCTAVE, OWASP CORAS for likelihood and impact analysis RA Functionalities • Detect risks (System Level & Component Level) • Produce mitigation actions - directly actionable by DevOps teams • Classifies mitigation actions in order to understand the impact on the DevOps process • Provide a current risk status report for legislation compliance
  • 16. Baseline and Progress Extensions to MUSA • Support any types of risk, defined within the catalogue or defined by the user. • Enable creation & evaluation of non-functional risks. • Integration with the DevOps cycle - Monitor the risk mitigation status though evidence collectors • Open data Risks catalogue for IoT space • The full functionality provided in ENACT will be released as open-source under MIT license. MUSA Risk Assessment Seamless & Impactless Risk Management for DevOps team Support IoT and Edge: • Consider software and hardware components • IoT security, privacy, resilience, & non-functional risks Baseline Planned Progress ENACT Risk Management
  • 17. Main Innovations in Risk Assessment Adaptability • Completely adaptable to each customer’s problem and process • Adapts to architecture or process changes Dashboards & Visualization • Dashboards for continuous process management adapted to different roles • Risk warning visualization connected to project management • Automatically raise awareness on risks related to changes in the schedule Continuous Risk Control • Novel mechanisms to define risks and mitigations related to a process. • Likelihood and impact of potential risks associated to the project will be continuously calculated depending on actual process execution.
  • 18. IoTCrawler: Search Engine for the Internet of Things Objectives, Scope, Validation • Search engines that support crawling, discovery and integration of IoT data. • Adaptive and dynamic solutions for resource ranking and selection. • Distributed crawling and indexing mechanisms to enable near real-time discovery and search of massive real world (IoT) data streams in a secure and privacy- and trust-aware framework. • Enablers for security-, privacy and trust- aware discovery and access to IoT resources in constrained IoT environments • New applications and services that rely on ad-hoc and dynamic data/service query and access. • Validation: Smart City, Social IoT, Smart Energy, Industry 4.0 https://iotcrawler.eu/ Security,Privacy&Trust IoT Resources: sensors and actuators Use cases Machine initiated semantic sear ch IoT discovery Context management Monitoring & fault recovery Multi-criteria ranking Adaptive indexing Edge broker Edge broker Edge broker Cloud broker Distributed IoT framework Dynamic crawling Search Dataanalysis API Smart city Social IoT Smart energy Industry 4.0
  • 19. Repositories of Threats used in IoTCrawler IoTCrawler specifies a library of threats derived from existing repositories and ontologies Threat Modelling in IoTCrawler IoTSec Ontology: Comprises Repository threats for IoT IoTSec Paper on Threat Analysis for M2M Communications ETSI’s Threat Analysis
  • 20. IoTCrawler: Types of Threats Analyzed & Modelled Types of Threats IoT Devices Threats Communication Threats Platform Threats M2M Threats
  • 21. SecureIoT: Predictive Security for IoT Platforms and Networks of Smart Objects Objectives, Scope, Validation • End-to-End Security Monitoring for Predictive (AI-based Security) • Security Interoperability across IoT Platforms • Cross-Platform & Cross- Vertical • Validation: Socially Assistive Robots, Smart Manufacturing, Connected Car & Self-Driving https://secureiot.eu/ IoT Systems (Platforms & Devices) Field Network Field Device Edge Cloud App Intelligent (Context- Aware) Data Collection Actuation & Automation Open APIs IoT Security Template Extraction (Analytics) Template Execution Engine (e.g., Rule Engine) Global Storage (Cloud) SecureIoT Database+ Assets Registry IoT Security Templates Database Templates Contextualization Engine IoT Security Knowledge Base Security Policy Enforcement Point Risk Assessment Compliance Auditing Developers’ Support Developers’ Support WP4 Open APIs WP5 WP3
  • 22. SecureIoT: Functional Architecture (Logical View) SecureIoT Architecture • Data Driven Architecture for SECaaS Services • Risk Assessment is one of the SECaaS Services • Risk Assessment leverages processing & analytics over security information derived from various probes
  • 23. Risk Assessment Workflow SecureIoT Platform Main Elements of SecureIoT Risk Assessment Approach • System • Asset • Abuse Case • Risk Model • Indicators • Mitigation Measures
  • 24. SecureIoT Assets & Threats Modelling (Proprietary)
  • 25. IoT Security Knowledge Base IoT Security Knowledge Base • Serves as basis for Vulnerabilities Identification & Resolution CVE, CWE, CPE, CAPEC data • Vulnerabilities documents • 4 tables (CVE, CPE, CAPEC, CWE) • Documents database (MongoDB) CVE, CWE, CPE, CAPEC relations • CyberThreat Intelligence (CTI) • Graph database (OrientDB + Tinkerpop Gremlin) Devices knowledge graph • Knowledge graph databases • One per device • Graph database (OrientDB + Tinkerpop Gremli)
  • 26. Role of IoT Security Knowledge Base in Risk Assessment Official sources IoT assets Risk assessment service Template execution engine Human end-user API Visual tools CyberThreat Intelligence crawler Assets aggregator Knowledge Base DBs
  • 27. SerIoT: Secure & Safe Internet of Things Objectives, Scope, Validation • Design a Cognitive Packet Network that interconnects distributed IoT subsystems based on SDN technology • Use “Smart Packets” (SP) to search for secure multi-hop routes having good quality of service & energy efficiency. • Use Random Neural Networks for routing decisions and overall network performance improvements – “Security Aware” routing • Validation: ITS & Smart Cities, Surveillance, Flexible Manufacturing, Food Chain https://seriot-project.eu
  • 28. Scope of Risk Assessment Work in IoT Policy based Framework for data usage and risk prevention • Enable risk identification and minimization based on appropriate policies Risk Analysis & Mitigation based on cross-layer data collection & analytics • Empowered by interoperability and resulting in increased intelligence Validation in LL (Smart Transport) • E.g., Risk Mitigation in Road ITS Scenarios
  • 29. Possible Synergies & Joint Activities Synergies on Risk Assessme nt Alignment & Reuse of Asset Modelling Approaches Exchange of Threat Models, Asset Models etc. Joint Whitepaper on Risk Modelling & Assessment for IoT Catalogue of Different Standards (ENISA, IEC 62433) and Methodologies (e.g., EBIOS, OCTAVE, CORAS etc) Examples • IoTCrawler threats as input to SecureIoT Knowledge base • Common Database of Assets, Threats and Vulnerabilities • Brain-IoT methodology used to drive Security Requirements in SecureIoT Use Cases • CHARIoT Simulator could generate datasets to shared with other projects