SlideShare a Scribd company logo
1 of 25
Azure Sphere のセキュリティ
• Microsoft Corporation
• Global Black Belt IoT Technical Specialist
• 太田 寛
• Twitter: @embedded_george
A long history of trustworthy computing
• Microsoft has more than 25 years experience protecting customers and their devices.
Trustworthy
Computing
Initiative
Security
Development
Lifecycle
Malware
Protection
Center
Microsoft
Security
Response
Center
First
Microsoft
Datacenter Digital
Crimes
Unit
Operations
Security
Assurance
The first
documented
ransomware
attack
First internet
virus spreads
malicious
Kaos code
First AOL
Trojan
appears
Introduction
of phrase:
The Internet of
Things
DoS attacks shut
down Yahoo!,
Buy.com, Amazon,
eBay and CNN.
Cabir, the first
mobile device
worm, is
developed
The first
reported
ransomware
attack occurs
on connected
devices
Azure Sphere
launched
1989 1994 1998 2004 2007 2014 20171995 1999 2005 2018
SECURITY IS FOUNDATIONAL
It must be built in from the beginning.
Azure Sphere の
セキュリティ基礎
Secure Device…
The 7 properties of highly secured devices
https://aka.ms/7properties
Azure Sphere
Certified MCUs
The Azure Sphere
Operating System
The Azure Sphere
Security Service
Azure Sphere is an end-to-end solution for securing MCU
powered devices
Azure Sphere Certified MCUs
from silicon partners, with built-in Microsoft
security technology provide connectivity and a
dependable hardware root of trust.
MCU – ハードウェアによる
The Azure Sphere Operating System
a four-layer defense in depth OS with ongoing
updates creates a secured platform for IoT
experiences.
OS – ソフトウェアによる
The Azure Sphere Security Service
guards every Azure Sphere device; it brokers trust for
device-to-device and device-to-cloud communication,
detects emerging threats, and renews device
security.
クラウド – サービスによる
Azure Sphere は…
ハードウェアと
ソフトウェアと
サービスで
デバイスのセキュリティを達成する為のテクノロジー
IoT ソリューション全体のセキュリティは?
• Azure Security Center + for IoT
• Device Agent
• Azure Monitor
• Azure Log Analyzer Customer IoT
Solution
IoT Edge
IoT 全体
Sphere
Increasing
complexity
Evolving
threats
Talent gap
Rising costs
By 2021, 25% of the
world's personal data will
be compromised and
housed in a Data Lake
analyzed and utilized by
consortiums of Threat
Actors*
!
On-premises Cloud
The security
landscape
*Source: IDC FutureScape: Worldwide Security Products and Services
Built-in controls
Unmatched security across
operations, technology,
and partnerships
• $1B annual investment
in cybersecurity
• 3500+ global security
experts
• Trillions of diverse signals
for unique intelligence
Secure foundation and intelligence
For a heterogeneous world
Get secure faster
Azure Security Center
Strengthen security posture
Cloud security posture management
Secure Score
Policies and compliance
Protect against threats
For
servers
For cloud native
workloads
For
databases
and storage
Workspace Machine
Learning
Security management
Azure Security Center
Overview
Dashboard
© Microsoft Corporation Azure
Data /
control
feed
On-prem & multi cloud
Azure
ASC
IaaS
VM on
VMware
ASC
PaaS
VM on
Hyper-V
ASC
TI &
network data
AWS
agent
Azure Security Center Architecture
IoT Solution - End-to-end Threat Analysis(脅威分析)
Communication
Internet
Remote /
Physical
Access
Device
Access Execution
Edge
Access Execution
Access ControlBehavior
Telemetry
Configuration
Device
Admin
Admin
C&C
(Twin)
Custom
Endpoints
IoT Hub World
ASC Based Protection
Azure
Prebuilt
Secure
Secure
IoT の真の、“エンドツーエンド”なセキュリティ
End-to-end solution
– from device, to
Edge to IoT hub
Visibility into security
posture and state of
the Azure IoT
Solution
Single pane of glass
to manage IoT and
hybrid cloud security
infrastructure
End-to-end analysis
and management of
security posture
Find, investigate,
and respond to the
real threats in
minutes without the
fatigue of false
positives with
Azure Sentinel
Find and eliminate
threats and manage
your security posture
with Azure Security
Center
Monitor the health of
your IoT devices in
near real time with
Azure IoT Hub
Block compromised
devices with Azure
IoT Hub
デバイス セキュリティ モニタリング エージェント
Security agents provide in depth device monitoring and visibility
Reference architecture for Linux and Windows security agents
for IoT devices, both in C# and C
These agents handle raw event collection from the OS, event
aggregation to reduce cost & configuration through device
Security Twin
Security messages are sent through the customer’s IoT hub, into
ASC for IoT analytics services
Open Source
Securing IoT Edge Devices
Containerized Edge Agent –
deployable automatically on the
targeted devices
MMA and Edge Hub – baselining and
detection
Customized Recommendations
and Alerts
IoT Edge-based Security
Security Container running ASC for IoT
analytics
Azure IoT Edge
OPC UA
module
Edge Hub3rd party
module
ASA
module
Functions
module
ASC Edge
module
Module
Management
Azure Service
(ASA, functions)
Customer
Application
Device* Device†
Azure Cloud
loT Hub
API
loT Hub
API
loT Hub API
Store & forward
loT Hub APIModule communicationOPC UA
loT Edge Runtime
* Devices requiring module for protocol
† Devices capable of using loT Hub SDK
Module twindata
config
control
loTHub
DCS
Twin
Edge
Agent
iotedged
Docker
Engine
Azure loT Edge
実用的なレベルでの、デバイスシェルへのリモー
ト接続
Device Stream
Streaming
Endpoint
SSHD
(daemon)
Device
Local
Proxy
Service
Local
Proxy
SSH
(client)
Connection
over point
443
Connection
over point
443
Connection
over point 22
(default for
SSH)
Connection
over point
2222
(arbitrary port)
Device Service
IoT Hubを介して、セキュアにSSH接続可能
セキュリティ情報の最小限化
その他のアクセスは拒否!
ポイントは…
IoT ソリューションのセキュリティは、
• デバイスからサービスまで、 End to End のセキュリティが必要
• (Azureだけでなく、オンプレ、他社クラウドも含め)
Azure Sphere だけでなく…
• Azure Sphere以外のデバイス向けのセキュリティ技術も提供
• 全ての構成要素に対する、通常のモニタリングもまた重要
• 基本は、“アイデンティティ管理”
“とりあえず動く”…から…“ちゃんと動く”…へ
クラウドを学ぶ
• 基礎から応用までを体系だって
• 自学自習で自分のペースで
• 有料サービスも無料で試せる
https://aka.ms/AA6zg1p

More Related Content

What's hot

Modernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelModernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelCheah Eng Soon
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentKaspersky
 
Acronis Active Protection: A Way To Combat Ransomware Attack
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis Active Protection: A Way To Combat Ransomware Attack
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architectureBirendra Negi ☁️
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal
 
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
CCI2018 - Azure Security Center - Stato dell’arte e roadmapCCI2018 - Azure Security Center - Stato dell’arte e roadmap
CCI2018 - Azure Security Center - Stato dell’arte e roadmapwalk2talk srl
 
Azure Sentinel with Office 365
Azure Sentinel with Office 365Azure Sentinel with Office 365
Azure Sentinel with Office 365Cheah Eng Soon
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Skybox Security
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to HeroKasun Rajapakse
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure SentinelRobert Crane
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec UbiquitySymantec
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseAdi Saputra
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMSkycure
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentationShapeBlue
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure SentinelMighty Guides, Inc.
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Skycure
 

What's hot (20)

Azure Sentinel
Azure SentinelAzure Sentinel
Azure Sentinel
 
ESET on cybersecurity.
ESET on cybersecurity.ESET on cybersecurity.
ESET on cybersecurity.
 
Modernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure SentinelModernize your Security Operations with Azure Sentinel
Modernize your Security Operations with Azure Sentinel
 
Introducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light AgentIntroducing Kaspersky Security for Virtualization - Light Agent
Introducing Kaspersky Security for Virtualization - Light Agent
 
Acronis Active Protection: A Way To Combat Ransomware Attack
Acronis Active Protection: A Way To Combat Ransomware AttackAcronis Active Protection: A Way To Combat Ransomware Attack
Acronis Active Protection: A Way To Combat Ransomware Attack
 
cyber-security-reference-architecture
cyber-security-reference-architecturecyber-security-reference-architecture
cyber-security-reference-architecture
 
Thread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 SecurityThread Legal and Microsoft 365 Security
Thread Legal and Microsoft 365 Security
 
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
CCI2018 - Azure Security Center - Stato dell’arte e roadmapCCI2018 - Azure Security Center - Stato dell’arte e roadmap
CCI2018 - Azure Security Center - Stato dell’arte e roadmap
 
Azure Sentinel with Office 365
Azure Sentinel with Office 365Azure Sentinel with Office 365
Azure Sentinel with Office 365
 
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
Think Like a Hacker: Using Network Analytics and Attack Simulation to Find an...
 
Azure sentinal
Azure sentinalAzure sentinal
Azure sentinal
 
Threat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure SentinelThreat Hunting on AWS using Azure Sentinel
Threat Hunting on AWS using Azure Sentinel
 
Azure Security Center- Zero to Hero
Azure Security Center-  Zero to HeroAzure Security Center-  Zero to Hero
Azure Security Center- Zero to Hero
 
introduction to Azure Sentinel
introduction to Azure Sentinelintroduction to Azure Sentinel
introduction to Azure Sentinel
 
Symantec Ubiquity
Symantec UbiquitySymantec Ubiquity
Symantec Ubiquity
 
Protect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat DefenseProtect your company from zero-day with ESET Dynamic Threat Defense
Protect your company from zero-day with ESET Dynamic Threat Defense
 
How to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMMHow to Add Advanced Threat Defense to Your EMM
How to Add Advanced Threat Defense to Your EMM
 
Kaspersky security for virtualization light agent launch presentation
Kaspersky security for virtualization light agent   launch presentationKaspersky security for virtualization light agent   launch presentation
Kaspersky security for virtualization light agent launch presentation
 
7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel7 Experts on Implementing Azure Sentinel
7 Experts on Implementing Azure Sentinel
 
Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability Accessibility Clickjacking, Devastating Android Vulnerability
Accessibility Clickjacking, Devastating Android Vulnerability
 

Similar to Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6

Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyMicrosoft Österreich
 
Secure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereSecure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereMicrosoft Tech Community
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Mirco Vanini
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkAxel Dittmann
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security OverviewAlert Logic
 
SC-900 Capabilities of Microsoft Security Solutions
SC-900 Capabilities of Microsoft Security SolutionsSC-900 Capabilities of Microsoft Security Solutions
SC-900 Capabilities of Microsoft Security SolutionsFredBrandonAuthorMCP
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-securityober64
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxMatthew Levy
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure SphereMirco Vanini
 
Azure IoT from groundup
Azure IoT from groundupAzure IoT from groundup
Azure IoT from groundupRaminder Singh
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Mirco Vanini
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 

Similar to Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6 (20)

Building Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure SphereBuilding Secure IoT Solutions using Azure Sphere
Building Secure IoT Solutions using Azure Sphere
 
Daniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity storyDaniel Grabski | Microsofts cybersecurity story
Daniel Grabski | Microsofts cybersecurity story
 
Secure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure SphereSecure and power the intelligent edge with Azure Sphere
Secure and power the intelligent edge with Azure Sphere
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Azure Sphere - GAB 2019
Azure Sphere - GAB 2019Azure Sphere - GAB 2019
Azure Sphere - GAB 2019
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
IOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT FrameworkIOT Edge within th eAzure IOT Framework
IOT Edge within th eAzure IOT Framework
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
SC-900 Capabilities of Microsoft Security Solutions
SC-900 Capabilities of Microsoft Security SolutionsSC-900 Capabilities of Microsoft Security Solutions
SC-900 Capabilities of Microsoft Security Solutions
 
366864108 azure-security
366864108 azure-security366864108 azure-security
366864108 azure-security
 
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptxDefenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
Defenders of the Galaxy - Protecting the (Cloud) galaxy from threats.pptx
 
Secure the modern Enterprise
Secure the modern EnterpriseSecure the modern Enterprise
Secure the modern Enterprise
 
IoT Day - Introducing Azure Sphere
IoT Day -  Introducing Azure SphereIoT Day -  Introducing Azure Sphere
IoT Day - Introducing Azure Sphere
 
Azure Sphere
Azure SphereAzure Sphere
Azure Sphere
 
Azure IoT from groundup
Azure IoT from groundupAzure IoT from groundup
Azure IoT from groundup
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
Azure Sphere
Azure SphereAzure Sphere
Azure Sphere
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 

More from Knowledge & Experience

ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う ~ 概念モデリング教本を元に ~
ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う  ~ 概念モデリング教本を元に ~ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う  ~ 概念モデリング教本を元に ~
ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う ~ 概念モデリング教本を元に ~Knowledge & Experience
 
Refine Conceptual Modeling by Philosopy and Mathematics
Refine Conceptual Modeling by Philosopy and MathematicsRefine Conceptual Modeling by Philosopy and Mathematics
Refine Conceptual Modeling by Philosopy and MathematicsKnowledge & Experience
 
Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編
Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編
Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編Knowledge & Experience
 
概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World
概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World
概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real WorldKnowledge & Experience
 
概念モデルを精査する ~ 現象学・圏論・言語哲学
概念モデルを精査する ~ 現象学・圏論・言語哲学概念モデルを精査する ~ 現象学・圏論・言語哲学
概念モデルを精査する ~ 現象学・圏論・言語哲学Knowledge & Experience
 
「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化
「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化
「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化Knowledge & Experience
 
Reconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual ModelingReconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual ModelingKnowledge & Experience
 
概念モデリングワークショップ 概念振舞モデル編
概念モデリングワークショップ 概念振舞モデル編概念モデリングワークショップ 概念振舞モデル編
概念モデリングワークショップ 概念振舞モデル編Knowledge & Experience
 
AI も IoT も Digital Twins も、すべてはデータモデルから
AI も IoT も Digital Twins も、すべてはデータモデルからAI も IoT も Digital Twins も、すべてはデータモデルから
AI も IoT も Digital Twins も、すべてはデータモデルからKnowledge & Experience
 
ChatGPT は概念モデリングの夢を見るか
ChatGPT は概念モデリングの夢を見るかChatGPT は概念モデリングの夢を見るか
ChatGPT は概念モデリングの夢を見るかKnowledge & Experience
 
概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx
概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx
概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptxKnowledge & Experience
 
ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術
ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術
ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術Knowledge & Experience
 
IoT開発を支える技術の今とこれから
IoT開発を支える技術の今とこれからIoT開発を支える技術の今とこれから
IoT開発を支える技術の今とこれからKnowledge & Experience
 
Azure Video Analyzer OpenVino Extension Module on Raspberry Pi with Movidius
Azure Video Analyzer OpenVino Extension Module on Raspberry Pi with MovidiusAzure Video Analyzer OpenVino Extension Module on Raspberry Pi with Movidius
Azure Video Analyzer OpenVino Extension Module on Raspberry Pi with MovidiusKnowledge & Experience
 
Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11
Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11
Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11Knowledge & Experience
 
30年来真名んできた中で IoT 実装で役立っている基礎技術
30年来真名んできた中で IoT 実装で役立っている基礎技術30年来真名んできた中で IoT 実装で役立っている基礎技術
30年来真名んできた中で IoT 実装で役立っている基礎技術Knowledge & Experience
 
Azure RTOS 概要 - IoT ALGYAN 技術セミナー
Azure RTOS 概要 - IoT ALGYAN 技術セミナーAzure RTOS 概要 - IoT ALGYAN 技術セミナー
Azure RTOS 概要 - IoT ALGYAN 技術セミナーKnowledge & Experience
 

More from Knowledge & Experience (20)

ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う ~ 概念モデリング教本を元に ~
ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う  ~ 概念モデリング教本を元に ~ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う  ~ 概念モデリング教本を元に ~
ChatGPT(LLMによる生成系AI)の追加学習を No Code で行う ~ 概念モデリング教本を元に ~
 
Refine Conceptual Modeling by Philosopy and Mathematics
Refine Conceptual Modeling by Philosopy and MathematicsRefine Conceptual Modeling by Philosopy and Mathematics
Refine Conceptual Modeling by Philosopy and Mathematics
 
Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編
Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編
Conceptual Modeling Workshop Desing - 概念モデリングワークショップ 設計編
 
概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World
概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World
概念モデリング ワークショップ 基礎編 - Conceptual Modeling for Real World
 
概念モデルを精査する ~ 現象学・圏論・言語哲学
概念モデルを精査する ~ 現象学・圏論・言語哲学概念モデルを精査する ~ 現象学・圏論・言語哲学
概念モデルを精査する ~ 現象学・圏論・言語哲学
 
「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化
「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化
「概念モデリング自動化に向けた第一歩」 ~ ChatGPT・Open AI 活用による開発対象のモデル化
 
Reconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual ModelingReconsider Shlaer-Mellor method as Conceptual Modeling
Reconsider Shlaer-Mellor method as Conceptual Modeling
 
概念モデリングワークショップ 概念振舞モデル編
概念モデリングワークショップ 概念振舞モデル編概念モデリングワークショップ 概念振舞モデル編
概念モデリングワークショップ 概念振舞モデル編
 
概念モデリング再考
概念モデリング再考概念モデリング再考
概念モデリング再考
 
AI も IoT も Digital Twins も、すべてはデータモデルから
AI も IoT も Digital Twins も、すべてはデータモデルからAI も IoT も Digital Twins も、すべてはデータモデルから
AI も IoT も Digital Twins も、すべてはデータモデルから
 
ChatGPT は概念モデリングの夢を見るか
ChatGPT は概念モデリングの夢を見るかChatGPT は概念モデリングの夢を見るか
ChatGPT は概念モデリングの夢を見るか
 
.NET Micro Framework / .NET Gadgeteer
.NET Micro Framework / .NET Gadgeteer.NET Micro Framework / .NET Gadgeteer
.NET Micro Framework / .NET Gadgeteer
 
概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx
概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx
概念モデリングによるビジネスの見える化とシステム開発のデジタルトランスフォーメーション.pptx
 
ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術
ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術
ソフトウェア技術者のキャリアパスを考える ~ 技術者になるための戦略・戦術・作戦術
 
IoT開発を支える技術の今とこれから
IoT開発を支える技術の今とこれからIoT開発を支える技術の今とこれから
IoT開発を支える技術の今とこれから
 
Azure Video Analyzer OpenVino Extension Module on Raspberry Pi with Movidius
Azure Video Analyzer OpenVino Extension Module on Raspberry Pi with MovidiusAzure Video Analyzer OpenVino Extension Module on Raspberry Pi with Movidius
Azure Video Analyzer OpenVino Extension Module on Raspberry Pi with Movidius
 
Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11
Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11
Azure RTOS 概要 - IoT ALGYAN 技術セミナー 2021/9/11
 
30年来真名んできた中で IoT 実装で役立っている基礎技術
30年来真名んできた中で IoT 実装で役立っている基礎技術30年来真名んできた中で IoT 実装で役立っている基礎技術
30年来真名んできた中で IoT 実装で役立っている基礎技術
 
Azure RTOS 概要 - IoT ALGYAN 技術セミナー
Azure RTOS 概要 - IoT ALGYAN 技術セミナーAzure RTOS 概要 - IoT ALGYAN 技術セミナー
Azure RTOS 概要 - IoT ALGYAN 技術セミナー
 
Azure IoT Edge Deep Dive
Azure IoT Edge Deep DiveAzure IoT Edge Deep Dive
Azure IoT Edge Deep Dive
 

Recently uploaded

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 

Recently uploaded (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 

Microsot Azure IoT Security for IoT ALGYAN Tech Seminar 2020/2/6

  • 1. Azure Sphere のセキュリティ • Microsoft Corporation • Global Black Belt IoT Technical Specialist • 太田 寛 • Twitter: @embedded_george
  • 2. A long history of trustworthy computing • Microsoft has more than 25 years experience protecting customers and their devices. Trustworthy Computing Initiative Security Development Lifecycle Malware Protection Center Microsoft Security Response Center First Microsoft Datacenter Digital Crimes Unit Operations Security Assurance The first documented ransomware attack First internet virus spreads malicious Kaos code First AOL Trojan appears Introduction of phrase: The Internet of Things DoS attacks shut down Yahoo!, Buy.com, Amazon, eBay and CNN. Cabir, the first mobile device worm, is developed The first reported ransomware attack occurs on connected devices Azure Sphere launched 1989 1994 1998 2004 2007 2014 20171995 1999 2005 2018
  • 3. SECURITY IS FOUNDATIONAL It must be built in from the beginning.
  • 5. The 7 properties of highly secured devices https://aka.ms/7properties
  • 6. Azure Sphere Certified MCUs The Azure Sphere Operating System The Azure Sphere Security Service Azure Sphere is an end-to-end solution for securing MCU powered devices
  • 7. Azure Sphere Certified MCUs from silicon partners, with built-in Microsoft security technology provide connectivity and a dependable hardware root of trust. MCU – ハードウェアによる
  • 8.
  • 9. The Azure Sphere Operating System a four-layer defense in depth OS with ongoing updates creates a secured platform for IoT experiences. OS – ソフトウェアによる
  • 10.
  • 11. The Azure Sphere Security Service guards every Azure Sphere device; it brokers trust for device-to-device and device-to-cloud communication, detects emerging threats, and renews device security. クラウド – サービスによる
  • 13. IoT ソリューション全体のセキュリティは? • Azure Security Center + for IoT • Device Agent • Azure Monitor • Azure Log Analyzer Customer IoT Solution IoT Edge IoT 全体 Sphere
  • 14. Increasing complexity Evolving threats Talent gap Rising costs By 2021, 25% of the world's personal data will be compromised and housed in a Data Lake analyzed and utilized by consortiums of Threat Actors* ! On-premises Cloud The security landscape *Source: IDC FutureScape: Worldwide Security Products and Services
  • 15. Built-in controls Unmatched security across operations, technology, and partnerships • $1B annual investment in cybersecurity • 3500+ global security experts • Trillions of diverse signals for unique intelligence Secure foundation and intelligence For a heterogeneous world
  • 16. Get secure faster Azure Security Center Strengthen security posture Cloud security posture management Secure Score Policies and compliance Protect against threats For servers For cloud native workloads For databases and storage
  • 17. Workspace Machine Learning Security management Azure Security Center Overview Dashboard © Microsoft Corporation Azure Data / control feed On-prem & multi cloud Azure ASC IaaS VM on VMware ASC PaaS VM on Hyper-V ASC TI & network data AWS agent Azure Security Center Architecture
  • 18. IoT Solution - End-to-end Threat Analysis(脅威分析) Communication Internet Remote / Physical Access Device Access Execution Edge Access Execution Access ControlBehavior Telemetry Configuration Device Admin Admin C&C (Twin) Custom Endpoints IoT Hub World ASC Based Protection Azure Prebuilt Secure Secure
  • 19.
  • 20. IoT の真の、“エンドツーエンド”なセキュリティ End-to-end solution – from device, to Edge to IoT hub Visibility into security posture and state of the Azure IoT Solution Single pane of glass to manage IoT and hybrid cloud security infrastructure End-to-end analysis and management of security posture Find, investigate, and respond to the real threats in minutes without the fatigue of false positives with Azure Sentinel Find and eliminate threats and manage your security posture with Azure Security Center Monitor the health of your IoT devices in near real time with Azure IoT Hub Block compromised devices with Azure IoT Hub
  • 21. デバイス セキュリティ モニタリング エージェント Security agents provide in depth device monitoring and visibility Reference architecture for Linux and Windows security agents for IoT devices, both in C# and C These agents handle raw event collection from the OS, event aggregation to reduce cost & configuration through device Security Twin Security messages are sent through the customer’s IoT hub, into ASC for IoT analytics services Open Source
  • 22. Securing IoT Edge Devices Containerized Edge Agent – deployable automatically on the targeted devices MMA and Edge Hub – baselining and detection Customized Recommendations and Alerts IoT Edge-based Security Security Container running ASC for IoT analytics Azure IoT Edge OPC UA module Edge Hub3rd party module ASA module Functions module ASC Edge module Module Management Azure Service (ASA, functions) Customer Application Device* Device† Azure Cloud loT Hub API loT Hub API loT Hub API Store & forward loT Hub APIModule communicationOPC UA loT Edge Runtime * Devices requiring module for protocol † Devices capable of using loT Hub SDK Module twindata config control loTHub DCS Twin Edge Agent iotedged Docker Engine Azure loT Edge
  • 23. 実用的なレベルでの、デバイスシェルへのリモー ト接続 Device Stream Streaming Endpoint SSHD (daemon) Device Local Proxy Service Local Proxy SSH (client) Connection over point 443 Connection over point 443 Connection over point 22 (default for SSH) Connection over point 2222 (arbitrary port) Device Service IoT Hubを介して、セキュアにSSH接続可能 セキュリティ情報の最小限化 その他のアクセスは拒否!
  • 24. ポイントは… IoT ソリューションのセキュリティは、 • デバイスからサービスまで、 End to End のセキュリティが必要 • (Azureだけでなく、オンプレ、他社クラウドも含め) Azure Sphere だけでなく… • Azure Sphere以外のデバイス向けのセキュリティ技術も提供 • 全ての構成要素に対する、通常のモニタリングもまた重要 • 基本は、“アイデンティティ管理” “とりあえず動く”…から…“ちゃんと動く”…へ