SlideShare a Scribd company logo
1 of 33
Download to read offline
Enterprise IoT: Security
Turning a prototype into a viable solution
© 2017. All Rights Reserved
What is Security?
How does it apply to the Internet of Things?
© 2017. All Rights Reserved
© 2017. All Rights Reserved
Security Fact
100% Secure
from 100% of Threats
is 100% Impossible
© 2017. All Rights Reserved
Therefore, security is …
© 2017. All Rights Reserved
In the beginning … (Before 1990)
People had personal computers (PC) …
Security concern was physical theft of the PC
© 2017. All Rights Reserved
By 1990
Security evolved to a warning ...
May contain viruses
© 2017. All Rights Reserved
In the Early 1990’s
We then connected computers in a local network …
Physical theft still remained the primary concern …
© 2017. All Rights Reserved
Early 1990’s
… and yes, unscrupulous floppy disks still contained viruses!
May contain viruses
© 2017. All Rights Reserved
In the Late 1990’s
AOL introduced people to the internet …
But CxO’s feared the internet and refused employee access.
© 2017. All Rights Reserved
In the Mid 2000’s
Thanks to AOL and software sales reps,
CxO’s began seeing value in what the internet offered …
© 2017. All Rights Reserved
In the late 2000’s
IT Security profession evolved to create …
Guidelines and Standards
• SSAE16
• ISO 27001
• NIST
• FEDRAMP
• DFAR
© 2017. All Rights Reserved
Today
We now have an entire industry providing IT security as a service …
• IDS/IPS – Intrusion Detection System,
Intrusion Prevention System
• DDOS – Distributed Denial of Service
• SOC/NOC – Security Operations Center,
Network Operations Center
• SIEM – Security Information and Event
Management
© 2017. All Rights Reserved
What does this have to do with IoT?
© 2017. All Rights Reserved
Smart Devices are Everywhere
In our homes
In our offices In our factories
In our vehicles
© 2017. All Rights Reserved
Smart Devices are Everywhere
In our homes
In our offices In our factories
In our vehicles
Like PC’s in the 1990’s,
security is to prevent theft and physical harm
© 2017. All Rights Reserved
Now we want smart devices connected
© 2017. All Rights Reserved
Connecting devices introduces new risks
© 2017. All Rights Reserved
Connecting devices introduces new risks
We need new standards, tools, and services
© 2017. All Rights Reserved
Challenges
Is the device physically
secure?
Can the device encrypt
data?
Can the device password
be remotely changed?
Can the device firmware be
updated?
Can the device be
controlled remotely?
© 2017. All Rights Reserved
When people demanded internet access…
we figured it out.
We will figure out how to secure IoT devices.
Until then …
Don’t make it easy for bad things to happen
© 2017. All Rights Reserved
SoftwareInternetThings
© 2017. All Rights Reserved
What Bad Could Happen?
Unwanted access / use Unwanted change
Inability to access
Availability
For each potential threat:
1. Weigh Impact
• Safety of people
• Protection of physical assets
• Protection of data
• Compliance with regulations
• Cost of a breach
2. Assess Probability
3. Prioritize what to mitigate
4. Put appropriate controls in place
• Include risk mitigation into the design specification
© 2017. All Rights Reserved
Establish Priority
© 2017. All Rights Reserved
Thing Development: Hardware/Device
ENGINEERING CONSTRAINTS: COST | POWER | SIZE
© 2017. All Rights Reserved
Thing Development: Hardware/Device
ENGINEERING CONSTRAINTS: COST | POWER | SIZE
© 2017. All Rights Reserved
Internet: Communication Channel
DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE
LTE
3G LoRaWiFi
Sigfox TCP
CoAP MQTT
REST
Network
Mode of transporting data
Internet Protocol
Packaging data for transport
over a network
© 2017. All Rights Reserved
Internet: Communication Channel
DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE
LTE
3G LoRaWiFi
Sigfox TCP
CoAP MQTT
REST
Network
Mode of transporting data
Internet Protocol
Packaging data for transport
over a network
© 2017. All Rights Reserved
Software: Cloud Capabilities
Connect
Devices
Enable
Applications
Process
Data
ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
© 2017. All Rights Reserved
Software: Cloud Capabilities
Connect
Devices
Enable
Applications
Process
Data
ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
© 2017. All Rights Reserved
IoT System Security Controls (examples)
Device Level Application LevelConnectivity Level
• SSL certificates
• Unique device passwords
• Whitelisted IP addresses
• Whitelist phone number (SMS)
• Checksum algorithms
(delivery reliability)
• OTA firmware Updates
• SSL/TLS between platform and device
• VPN to securely send SMS text
messages using SMPP gateways
• Manage and frequently change device
passwords
• Manage firmware updates
• Standard cloud security
(DDOS, IPS/IDS, …)
• Authentication, authorization to access
the platform and applications
• Database encryption
• VPC (Virtual Private Cloud) zone
protected by a firewall (or an equivalent
concept)
© 2017. All Rights Reserved
Security – What can you do today?
Identify potential threats early and continuously
Assess Impact and Probability
Put appropriate controls in place
Apply best practices where they exist
100% secure from 100% of threats is 100% impossible, but …
Don’t make it easy for bad things to happen.
Questions?
Learn more at Bridgera.com/IOT
© 2017. All Rights Reserved
Ron Pascuzzi
Ron.Pascuzzi@bridgera.com
919-757-1941
© 2017. All Rights Reserved
Bridgera IoT
One Platform to Accelerate Your Enterprise IoT Solution
Connect
Devices
Enable
Applications
Process
Data

More Related Content

What's hot

The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoTIan Skerrett
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicBosnia Agile
 
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.comSensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.comJustin Hayward
 
Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystemTelefónica IoT
 
WSO2 Platform Introduction
WSO2 Platform IntroductionWSO2 Platform Introduction
WSO2 Platform IntroductionWSO2
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Bosnia Agile
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking NetworkCollaborators
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Ian Skerrett
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital LeadershipM2M Alliance e.V.
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)Dania Rashid
 
Wearables and IoT Strategy
Wearables and IoT StrategyWearables and IoT Strategy
Wearables and IoT StrategyAllSeen Alliance
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything AllSeen Alliance
 
Industries On Transformation
Industries On TransformationIndustries On Transformation
Industries On TransformationTelefónica IoT
 
IoT Platform with MQTT and Websocket
IoT Platform with MQTT and WebsocketIoT Platform with MQTT and Websocket
IoT Platform with MQTT and WebsocketSofian Hadiwijaya
 
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...Thomas Mehlhorn
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationMemoori
 
Physical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open StandardsPhysical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open StandardsMemoori
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc
 

What's hot (20)

The State of Edge Computing for IoT
The State of Edge Computing for IoTThe State of Edge Computing for IoT
The State of Edge Computing for IoT
 
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz SaracevicDeveloping Enterprise-Level IoT Solutions by Fariz Saracevic
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
 
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.comSensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
 
Delivering the IoT ecosystem
Delivering the IoT ecosystemDelivering the IoT ecosystem
Delivering the IoT ecosystem
 
WSO2 Platform Introduction
WSO2 Platform IntroductionWSO2 Platform Introduction
WSO2 Platform Introduction
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0
 
Accelerating Digital Leadership
Accelerating Digital LeadershipAccelerating Digital Leadership
Accelerating Digital Leadership
 
IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)IOTprotocols and overview (SSI)
IOTprotocols and overview (SSI)
 
Wearables and IoT Strategy
Wearables and IoT StrategyWearables and IoT Strategy
Wearables and IoT Strategy
 
Creating an Internet of Everything
Creating an Internet of Everything Creating an Internet of Everything
Creating an Internet of Everything
 
Industries On Transformation
Industries On TransformationIndustries On Transformation
Industries On Transformation
 
IoT Platform with MQTT and Websocket
IoT Platform with MQTT and WebsocketIoT Platform with MQTT and Websocket
IoT Platform with MQTT and Websocket
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Neotel
Neotel Neotel
Neotel
 
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
 
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings IntegrationThe Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
 
Physical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open StandardsPhysical Security, IoT & The Role of Open Standards
Physical Security, IoT & The Role of Open Standards
 
Jisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategiesJisc cloud services: helping our members deliver their cloud strategies
Jisc cloud services: helping our members deliver their cloud strategies
 

Similar to Enterprise IoT Security: Turning Prototypes into Viable Solutions

Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCristian Garcia G.
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet Bill Harpley
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - ciscoMITEF México
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust modelLINE Corporation
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...NowSecure
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Real-Time Innovations (RTI)
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityEric Vanderburg
 
Why the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedWhy the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedNuance Communications
 
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, MatoomaDWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, MatoomaIDATE DigiWorld
 
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsManaging the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsAkamai Developers & Admins
 
IoT - Software Updates Via Akamai Over the Air Services
IoT - Software Updates Via Akamai Over the Air ServicesIoT - Software Updates Via Akamai Over the Air Services
IoT - Software Updates Via Akamai Over the Air ServicesAkamai Developers & Admins
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfKerimBozkanli
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаCisco Russia
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Shubha Govil
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Shubha Govil
 
Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...
Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...
Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...Embarcados
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...Cisco Canada
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCSA Argentina
 

Similar to Enterprise IoT Security: Turning Prototypes into Viable Solutions (20)

Cisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallengeCisco Cybersecurity #10YearChallenge
Cisco Cybersecurity #10YearChallenge
 
Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet   Cybersecurity in the Age of the Everynet
Cybersecurity in the Age of the Everynet
 
1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco1. How will the IoT help your business - cisco
1. How will the IoT help your business - cisco
 
Application security as crucial to the modern distributed trust model
Application security as crucial to   the modern distributed trust modelApplication security as crucial to   the modern distributed trust model
Application security as crucial to the modern distributed trust model
 
Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018Conférence ARBOR ACSS 2018
Conférence ARBOR ACSS 2018
 
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
Mobile App Crashworthiness - Securing Vehicle-to-Device (V2D) Interfaces and ...
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
Mobile Forensics and Cybersecurity
Mobile Forensics and CybersecurityMobile Forensics and Cybersecurity
Mobile Forensics and Cybersecurity
 
Why the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeedWhy the Internet of Things needs AI & interoperability to succeed
Why the Internet of Things needs AI & interoperability to succeed
 
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, MatoomaDWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
DWS16 - Connected Things Forum - IoT Frédéric De Mont-Serrat, Matooma
 
IoT Security
IoT SecurityIoT Security
IoT Security
 
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google SheetsManaging the IoT OTA via the Akamai OPEN APIs and Google Sheets
Managing the IoT OTA via the Akamai OPEN APIs and Google Sheets
 
IoT - Software Updates Via Akamai Over the Air Services
IoT - Software Updates Via Akamai Over the Air ServicesIoT - Software Updates Via Akamai Over the Air Services
IoT - Software Updates Via Akamai Over the Air Services
 
iotsecurity-171108154118.pdf
iotsecurity-171108154118.pdfiotsecurity-171108154118.pdf
iotsecurity-171108154118.pdf
 
Интуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнесаИнтуитивная сеть как платформа для надежного бизнеса
Интуитивная сеть как платформа для надежного бизнеса
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1
 
Cl17 dev net_1055_v1
Cl17 dev net_1055_v1Cl17 dev net_1055_v1
Cl17 dev net_1055_v1
 
Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...
Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...
Webinar: Arquiteturas para IoT na nuvem: segurança, conformidade, resiliência...
 
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...Cisco Connect Toronto 2018   IOT - unlock the power of data - securing the in...
Cisco Connect Toronto 2018 IOT - unlock the power of data - securing the in...
 
Csa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nubeCsa Summit 2017 - Un viaje seguro hacia la nube
Csa Summit 2017 - Un viaje seguro hacia la nube
 

Recently uploaded

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Hyundai Motor Group
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 

Recently uploaded (20)

Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2Next-generation AAM aircraft unveiled by Supernal, S-A2
Next-generation AAM aircraft unveiled by Supernal, S-A2
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 

Enterprise IoT Security: Turning Prototypes into Viable Solutions

  • 1. Enterprise IoT: Security Turning a prototype into a viable solution © 2017. All Rights Reserved
  • 2. What is Security? How does it apply to the Internet of Things? © 2017. All Rights Reserved
  • 3. © 2017. All Rights Reserved Security Fact 100% Secure from 100% of Threats is 100% Impossible
  • 4. © 2017. All Rights Reserved Therefore, security is …
  • 5. © 2017. All Rights Reserved In the beginning … (Before 1990) People had personal computers (PC) … Security concern was physical theft of the PC
  • 6. © 2017. All Rights Reserved By 1990 Security evolved to a warning ... May contain viruses
  • 7. © 2017. All Rights Reserved In the Early 1990’s We then connected computers in a local network … Physical theft still remained the primary concern …
  • 8. © 2017. All Rights Reserved Early 1990’s … and yes, unscrupulous floppy disks still contained viruses! May contain viruses
  • 9. © 2017. All Rights Reserved In the Late 1990’s AOL introduced people to the internet … But CxO’s feared the internet and refused employee access.
  • 10. © 2017. All Rights Reserved In the Mid 2000’s Thanks to AOL and software sales reps, CxO’s began seeing value in what the internet offered …
  • 11. © 2017. All Rights Reserved In the late 2000’s IT Security profession evolved to create … Guidelines and Standards • SSAE16 • ISO 27001 • NIST • FEDRAMP • DFAR
  • 12. © 2017. All Rights Reserved Today We now have an entire industry providing IT security as a service … • IDS/IPS – Intrusion Detection System, Intrusion Prevention System • DDOS – Distributed Denial of Service • SOC/NOC – Security Operations Center, Network Operations Center • SIEM – Security Information and Event Management
  • 13. © 2017. All Rights Reserved What does this have to do with IoT?
  • 14. © 2017. All Rights Reserved Smart Devices are Everywhere In our homes In our offices In our factories In our vehicles
  • 15. © 2017. All Rights Reserved Smart Devices are Everywhere In our homes In our offices In our factories In our vehicles Like PC’s in the 1990’s, security is to prevent theft and physical harm
  • 16. © 2017. All Rights Reserved Now we want smart devices connected
  • 17. © 2017. All Rights Reserved Connecting devices introduces new risks
  • 18. © 2017. All Rights Reserved Connecting devices introduces new risks We need new standards, tools, and services
  • 19. © 2017. All Rights Reserved Challenges Is the device physically secure? Can the device encrypt data? Can the device password be remotely changed? Can the device firmware be updated? Can the device be controlled remotely?
  • 20. © 2017. All Rights Reserved When people demanded internet access… we figured it out. We will figure out how to secure IoT devices. Until then …
  • 21. Don’t make it easy for bad things to happen © 2017. All Rights Reserved SoftwareInternetThings
  • 22. © 2017. All Rights Reserved What Bad Could Happen? Unwanted access / use Unwanted change Inability to access Availability
  • 23. For each potential threat: 1. Weigh Impact • Safety of people • Protection of physical assets • Protection of data • Compliance with regulations • Cost of a breach 2. Assess Probability 3. Prioritize what to mitigate 4. Put appropriate controls in place • Include risk mitigation into the design specification © 2017. All Rights Reserved Establish Priority
  • 24. © 2017. All Rights Reserved Thing Development: Hardware/Device ENGINEERING CONSTRAINTS: COST | POWER | SIZE
  • 25. © 2017. All Rights Reserved Thing Development: Hardware/Device ENGINEERING CONSTRAINTS: COST | POWER | SIZE
  • 26. © 2017. All Rights Reserved Internet: Communication Channel DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE LTE 3G LoRaWiFi Sigfox TCP CoAP MQTT REST Network Mode of transporting data Internet Protocol Packaging data for transport over a network
  • 27. © 2017. All Rights Reserved Internet: Communication Channel DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE LTE 3G LoRaWiFi Sigfox TCP CoAP MQTT REST Network Mode of transporting data Internet Protocol Packaging data for transport over a network
  • 28. © 2017. All Rights Reserved Software: Cloud Capabilities Connect Devices Enable Applications Process Data ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
  • 29. © 2017. All Rights Reserved Software: Cloud Capabilities Connect Devices Enable Applications Process Data ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
  • 30. © 2017. All Rights Reserved IoT System Security Controls (examples) Device Level Application LevelConnectivity Level • SSL certificates • Unique device passwords • Whitelisted IP addresses • Whitelist phone number (SMS) • Checksum algorithms (delivery reliability) • OTA firmware Updates • SSL/TLS between platform and device • VPN to securely send SMS text messages using SMPP gateways • Manage and frequently change device passwords • Manage firmware updates • Standard cloud security (DDOS, IPS/IDS, …) • Authentication, authorization to access the platform and applications • Database encryption • VPC (Virtual Private Cloud) zone protected by a firewall (or an equivalent concept)
  • 31. © 2017. All Rights Reserved Security – What can you do today? Identify potential threats early and continuously Assess Impact and Probability Put appropriate controls in place Apply best practices where they exist 100% secure from 100% of threats is 100% impossible, but … Don’t make it easy for bad things to happen.
  • 32. Questions? Learn more at Bridgera.com/IOT © 2017. All Rights Reserved Ron Pascuzzi Ron.Pascuzzi@bridgera.com 919-757-1941
  • 33. © 2017. All Rights Reserved Bridgera IoT One Platform to Accelerate Your Enterprise IoT Solution Connect Devices Enable Applications Process Data