SlideShare a Scribd company logo
Realize Ultimate Security every step starts with the labs
www.onwardsecurity.com
2021最佳物聯網資安公司
国际物联网
安全标准与认证大解析
仲至信息科技 CTO 刘作仁
2021/10/13
© 2021 Onward Security Corp. All rights reserved. 1
物联网资安合规解决方案
200+ Customers
Served
10+ Awards
资安实务
经验丰富
国际认可
实验室
国际奖项
• 2014成立
• 超过80位员工 400+ Products
Validated
Best IT Company
of the Year
Best Cybersecurity
Company – ASIA
Gold Winner
Hot Company in
Cybersecurity Internet of
Things
2
© 2021 Onward Security Corp. All rights reserved.
57% of IoT devices are currently vulnerable to medium or high-severity attacks
$500,000
IoT Vulnerabilities Cost More Than per month
© 2021 Onward Security Corp. All rights reserved. 3
Device Vulnerabilities in mid of 2021
• https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain/
• https://www.securityweek.com/vulnerability-affecting-routers-many-vendors-exploited-days-after-disclosure
© 2021 Onward Security Corp. All rights reserved. 4
• SB-327
• IoT Cybersecurity Improvement Act
• IoT Consumer TIPS Act
• Content of Premarket Submissions
for Management of Cybersecurity
in Medical Devices, FDA
• EU Cybersecurity Act
• FIPS 140-3
• NISTIR 8228
• NIST 8259 Series
• Amazon, Google, Apple
• CTIA
• ioXt
• Major telecom company (AT&T,
Sprint, Verizon, T-Mobile)
• ISO 15408 (Common Criteria)
• IEC 62443
• ISO/SAE 21434
• ETSI EN 303 645
• Major telecom company (Orange,
BT, DT, Vodafone, EE, Telefonica)
• Nokia
Regulration
Standard
Guideline
Industrial
Certificate
欧美连网产品安全法规/标准/指引
© 2021 Onward Security Corp. All rights reserved. 5
法规与国际标准
01
© 2021 Onward Security Corp. All rights reserved. 6
EU Cybersecurity Act
• Activated on June 2019
• EU Cybersecurity Certification
Framework
ü Covering ICT products, services
and processes.
ü Each scheme will specify one or
more level(s) of assurance (basic,
substantial or high)
High
(CABs)
Substantial
(CABs)
Basic
(CABs, No CABs)
• ETSI EN 303 645
• CC EAL2
• IEC 62443-4-2
• CC EAL3+
• CC EAL 4+
https://www.enisa.europa.eu/events/towards_security_framework/Presentation%20-%20Meister/
© 2021 Onward Security Corp. All rights reserved. 7
ETSI EN 303 645 (EU)
• Become operative on January 1, 2020.
• A manufacturer of a connected device
shall equip the device with a reasonable
security feature or features
• If a connected device is equipped with a
means for authentication outside a local
area network
Require vendors of Internet-connected devices
purchased by the federal government ensure their
devices are patchable, rely on industry standard
protocols, do not use
hard-coded passwords, and do not contain any
known security vulnerabilities.
The preprogrammed password is unique to
each device manufactured.
The device contains a security feature that
requires a user to generate a new means of
authentication before access is granted to
the device for the first time
SB-327 Information privacy :
connected devices (US)
https://www.etsi.org/newsroom/press-releases/1789-2020-06-
etsi-releases-world-leading-consumer-iot-security-standard
IoT Security In United States and Europe
© 2021 Onward Security Corp. All rights reserved. 8
FDA Premarket Submission for Management of
Cybersecurity in Medial Devices (2018)
Establish cybersecurity risk management plan and submit the related
documentations
Product Design Risk Management
• Cybersecurity design
control
• System diagrams
• Summary of design
features
• System level threat model
• List of cybersecurity
controls
• Testing report
• Traceability matrix
• CBOM
• device performance
• security effectiveness of third-party
OTS software
• testing for credential
• vulnerability scanning
• robustness testing
• boundary analysis
• penetration testing
• 3rd party test reports
© 2021 Onward Security Corp. All rights reserved. 9
国际资安认证
02
© 2021 Onward Security Corp. All rights reserved. 10
終止
Termination
Common Criteria 资安产品生命周期之安全保证
操作
Operation
交付
安装启动
Delivery
生产
Production
产品原型
测试
Testing
低阶设计
实作
Low-level
Design
架构设计
高阶设计
High-level
Design
功能规格
Functional
Requirements
安全需求
Security
Requirements
安全需求
Security
Requirements
设计发展
Development
测试
Testing
生产行销
Production
操作使用
Operation
符合性(≥ EAL1) 符合性(≥ EAL2) 符合性(≥ EAL3)
一致性 一致性 一致性
模組測試 (≥ EAL4)
子系統測試 (≥ EAL3)
產品黑箱測試 (≥ EAL2)
產品整合性測試 (≥ EAL1)
共同准则安全评估 Common Criteria for IT Security Evaluation
Module Testing (≥ EAL3)
Subsystem Testing (≥ EAL3)
Black-box Testing (≥ EAL2)
Conformance Testing (≥ EAL1)
© 2021 Onward Security Corp. All rights reserved. 11
FIPS 140-3
密码模组
Cryptographic
Module
软件
固件
硬件/固件/软件组合
1. Cryptographic Module Specification
2. Cryptographic module interfaces
3. Roles, Services, and Authentication
4. Software/Firmware security
5. Operational Environment
6. Physical Security
7. Non-invasive security
8. Sensitive security parameter management
9. Self Tests
10. Life-cycle assurance
11. Mitigation of Other Attacks
© 2021 Onward Security Corp. All rights reserved. 12
IEC 62443-4-2 Technical security requirements
for IACS components
IAC
Identification and
Authentication
Control
UC
User
Control
SI
System
Integrity
DC
Data
Confidentiality
RDF
Restricted
Data Flow
TRE
Timely Response
to Event
RA
Resource
Availability
detailed technical control system
component requirements
© 2021 Onward Security Corp. All rights reserved. 13
IEC 62443-4-1 / 62443-4-2 CBTL
© 2021 Onward Security Corp. All rights reserved. 14
Automotive Security - ISO 21434
• Define a well-defined process to
ensure that the cybersecurity is taken
care to reduce the intensity of the
cyber-attack
• The final standard has been
published on Aug 31, 2021.
https://www.pathpartnertech.com/an-overview-of-iso-sae-21434-road-vehicles-cybersecurity-engineering/
© 2021 Onward Security Corp. All rights reserved. 15
客户要求与产业资安认证
03
© 2021 Onward Security Corp. All rights reserved. 16
Amazon Alexa Service (AVS)
© 2021 Onward Security Corp. All rights reserved. 17
ioXt Alliance
The mission of the ioXt Alliance is to build confidence in Internet of Things products through multi-stakeholder,
international, harmonized, and standardized security and privacy requirements, product compliance programs,
and public transparency of those requirements and programs.
© 2021 Onward Security Corp. All rights reserved. 18
CTIA IoT Cybersecurity Certification Program
Cybersecurity for Devices on Wireless Networks
This program was developed with the support of wireless operators with the goal of
voluntarily establishing device cybersecurity best practices in the wireless industry.
This is the first mobile device cybersecurity program of its kind to have the backing of
wireless operators in collaboration with technology companies and certification test
labs.
The Cybersecurity Certification Program:
• Certifies security elements of LTE and 5G devices, including those
with Wi-Fi connections
• Creates an industry best practice for IoT security on wireless
networks
• Helps protect consumers and wireless infrastructure, while creating a
more secure foundation for smart cities, connected cars, mHealth,
and other IoT applications
© 2021 Onward Security Corp. All rights reserved. 19
Cybersecurity Certification for Products
300+ Clients get product certification in 10+ Countries
Smart Home IoT Products
Smartphone and built-in apps
Smart Bus Video
Surveillance
Cloud System
Smart Lighting
Mobile App
IACS
5G Products
Finance
EN 303 645
© 2021 Onward Security Corp. All rights reserved. 20
制造商与开发商的因应之道
04
© 2021 Onward Security Corp. All rights reserved. 21
仲至信息科技资安标准库
IEC 62443
EN 303 645
IEC 62351
ioXt
CTIA IoT
SB-327
Authentication
Physical
Firmware
Authorization
Audit
Encrytion
Questionnaire
Standards
Product Type
• Phase 1 - SR
• 安全功能清单
• PM / SA / RD
• Phase 4 - SVV
• 测试项目清单
• RD / QA
© 2021 Onward Security Corp. All rights reserved. 22
• Unique Password
• Vulnerability Reporting
(PSIRT)
• Authentication
• Secure Interface
• Cryptography
Critical Factor for Product Security
• Risk Management
• Software Update
IoT
(Consumer)
ICS/SCADA Medical Automotive
SBOM
(Software Bill of Material)
Privacy Protection SSDLC
Fuzz Testing
Integrity
Session Management
Audit Activity
Input Validation
Availability
Debug Interface
Input Validation
Privacy Protection
SSDLC
Realize Ultimate Security every step starts with the labs
© 2021 Onward Security Corp. All rights reserved. contact@onwardsecurity.com
THANK Y U
Onward Security
联络我们 contact@onwardsecurity.com

More Related Content

What's hot

脆弱性スキャナVuls(入門編)
脆弱性スキャナVuls(入門編)脆弱性スキャナVuls(入門編)
脆弱性スキャナVuls(入門編)
Takayuki Ushida
 
萬事萬物皆是 LOG - 系統架構也來點科普
萬事萬物皆是 LOG - 系統架構也來點科普萬事萬物皆是 LOG - 系統架構也來點科普
萬事萬物皆是 LOG - 系統架構也來點科普
Poga Po
 
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - ApresentaçãoDesenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Clavis Segurança da Informação
 
Autonomous Database で Oracle Database19c 新機能 を味わう。
Autonomous Database で Oracle Database19c 新機能 を味わう。Autonomous Database で Oracle Database19c 新機能 を味わう。
Autonomous Database で Oracle Database19c 新機能 を味わう。
歩 柴田
 
ぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまでぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまで
Shinichi Takahashi
 
標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか
abend_cve_9999_0001
 
SQLアンチパターン メンター用資料
SQLアンチパターン メンター用資料SQLアンチパターン メンター用資料
SQLアンチパターン メンター用資料
Hironori Miura
 
Jenkinsはじめました - Yahoo! JAPANのCI+CD -
Jenkinsはじめました - Yahoo! JAPANのCI+CD -Jenkinsはじめました - Yahoo! JAPANのCI+CD -
Jenkinsはじめました - Yahoo! JAPANのCI+CD -
Yahoo!デベロッパーネットワーク
 
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
UnioGeek
 
SQL Server 資料庫版本控管
SQL Server 資料庫版本控管SQL Server 資料庫版本控管
SQL Server 資料庫版本控管
Will Huang
 
資訊安全入門
資訊安全入門資訊安全入門
資訊安全入門Tyler Chen
 
はまる!!JPA #glassfish_jp #javaee
はまる!!JPA #glassfish_jp #javaeeはまる!!JPA #glassfish_jp #javaee
はまる!!JPA #glassfish_jp #javaeeToshiaki Maki
 
[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏
[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏
[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏
Insight Technology, Inc.
 
MySQL負荷分散の方法
MySQL負荷分散の方法MySQL負荷分散の方法
MySQL負荷分散の方法佐久本正太
 
SQL Server for SharePoint 2013
SQL Server for SharePoint 2013SQL Server for SharePoint 2013
SQL Server for SharePoint 2013
Mayumi Mitaki
 
コンテナにおけるパフォーマンス調査でハマった話
コンテナにおけるパフォーマンス調査でハマった話コンテナにおけるパフォーマンス調査でハマった話
コンテナにおけるパフォーマンス調査でハマった話
Yuta Shimada
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
Donald E. Hester
 
Workspace ONE テクニカルガイド MAM編
Workspace ONE テクニカルガイド MAM編Workspace ONE テクニカルガイド MAM編
Workspace ONE テクニカルガイド MAM編
Hamamatsu-cho Mobile Club(浜松町モバイル愛好会)
 
Kubernetes で変わるインフラ
Kubernetes で変わるインフラKubernetes で変わるインフラ
Kubernetes で変わるインフラ
Tetsurou Yano
 
Oracle Spatial 概要説明資料
Oracle Spatial 概要説明資料Oracle Spatial 概要説明資料
Oracle Spatial 概要説明資料
オラクルエンジニア通信
 

What's hot (20)

脆弱性スキャナVuls(入門編)
脆弱性スキャナVuls(入門編)脆弱性スキャナVuls(入門編)
脆弱性スキャナVuls(入門編)
 
萬事萬物皆是 LOG - 系統架構也來點科普
萬事萬物皆是 LOG - 系統架構也來點科普萬事萬物皆是 LOG - 系統架構也來點科普
萬事萬物皆是 LOG - 系統架構也來點科普
 
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - ApresentaçãoDesenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
Desenvolvimento Seguro de Software - 10o Workshop SegInfo - Apresentação
 
Autonomous Database で Oracle Database19c 新機能 を味わう。
Autonomous Database で Oracle Database19c 新機能 を味わう。Autonomous Database で Oracle Database19c 新機能 を味わう。
Autonomous Database で Oracle Database19c 新機能 を味わう。
 
ぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまでぼくがAthenaで死ぬまで
ぼくがAthenaで死ぬまで
 
標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか標的型攻撃からどのように身を守るのか
標的型攻撃からどのように身を守るのか
 
SQLアンチパターン メンター用資料
SQLアンチパターン メンター用資料SQLアンチパターン メンター用資料
SQLアンチパターン メンター用資料
 
Jenkinsはじめました - Yahoo! JAPANのCI+CD -
Jenkinsはじめました - Yahoo! JAPANのCI+CD -Jenkinsはじめました - Yahoo! JAPANのCI+CD -
Jenkinsはじめました - Yahoo! JAPANのCI+CD -
 
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3Cyber+incident+response+ +generic+ransomware+playbook+v2.3
Cyber+incident+response+ +generic+ransomware+playbook+v2.3
 
SQL Server 資料庫版本控管
SQL Server 資料庫版本控管SQL Server 資料庫版本控管
SQL Server 資料庫版本控管
 
資訊安全入門
資訊安全入門資訊安全入門
資訊安全入門
 
はまる!!JPA #glassfish_jp #javaee
はまる!!JPA #glassfish_jp #javaeeはまる!!JPA #glassfish_jp #javaee
はまる!!JPA #glassfish_jp #javaee
 
[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏
[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏
[20171019 三木会] データベース・マイグレーションについて by 株式会社シー・エス・イー 藤井 元雄 氏
 
MySQL負荷分散の方法
MySQL負荷分散の方法MySQL負荷分散の方法
MySQL負荷分散の方法
 
SQL Server for SharePoint 2013
SQL Server for SharePoint 2013SQL Server for SharePoint 2013
SQL Server for SharePoint 2013
 
コンテナにおけるパフォーマンス調査でハマった話
コンテナにおけるパフォーマンス調査でハマった話コンテナにおけるパフォーマンス調査でハマった話
コンテナにおけるパフォーマンス調査でハマった話
 
Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)Introduction to NIST’s Risk Management Framework (RMF)
Introduction to NIST’s Risk Management Framework (RMF)
 
Workspace ONE テクニカルガイド MAM編
Workspace ONE テクニカルガイド MAM編Workspace ONE テクニカルガイド MAM編
Workspace ONE テクニカルガイド MAM編
 
Kubernetes で変わるインフラ
Kubernetes で変わるインフラKubernetes で変わるインフラ
Kubernetes で変わるインフラ
 
Oracle Spatial 概要説明資料
Oracle Spatial 概要説明資料Oracle Spatial 概要説明資料
Oracle Spatial 概要説明資料
 

Similar to 国际物联网安全标准与认证大解析

The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
ICS
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
ssuser365526
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
Andy Taylor
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
FIDO Alliance
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
Syam Madanapalli
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
LabSharegroup
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
Cisco Canada
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Intel® Software
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
Stefane Mouille
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
ArianeSpano
 
[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...
[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...
[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...
Roland Atoui
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
Ashley Zupkus
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
Mirco Vanini
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
Mirco Vanini
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET Journal
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
Yokogawa1
 

Similar to 国际物联网安全标准与认证大解析 (20)

The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up Secure Your Medical Devices From the Ground Up
Secure Your Medical Devices From the Ground Up
 
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptxInfinity_Architecture_June_Webinar__Final_Wiki.pptx
Infinity_Architecture_June_Webinar__Final_Wiki.pptx
 
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution SlidesAEE Cybersecurity for the IOT in Facility Energy Distribution Slides
AEE Cybersecurity for the IOT in Facility Energy Distribution Slides
 
Solving the IoT Challenge
Solving the IoT ChallengeSolving the IoT Challenge
Solving the IoT Challenge
 
Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
IoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR ProposalIoT Security Assessment - IEEE PAR Proposal
IoT Security Assessment - IEEE PAR Proposal
 
Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...Software security, secure software development in the age of IoT, smart thing...
Software security, secure software development in the age of IoT, smart thing...
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Mobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best PracticesMobile Devices & BYOD Security – Deployment & Best Practices
Mobile Devices & BYOD Security – Deployment & Best Practices
 
IoT Security Challenges and Solutions
IoT Security Challenges and SolutionsIoT Security Challenges and Solutions
IoT Security Challenges and Solutions
 
Eurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentationEurosmart etsi-e-io t-scs-presentation
Eurosmart etsi-e-io t-scs-presentation
 
Fortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptxFortinet Corporate Overview Deck.pptx
Fortinet Corporate Overview Deck.pptx
 
[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...
[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...
[EU cyberact conf2021] a proposal for an eu iot certification scheme-final_re...
 
Towards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industryTowards 0-bug software in the automotive industry
Towards 0-bug software in the automotive industry
 
Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?Are you ready for Microsoft Azure Sphere?
Are you ready for Microsoft Azure Sphere?
 
IoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure ShpereIoT Day 2019 Naples - Microsoft Azure Shpere
IoT Day 2019 Naples - Microsoft Azure Shpere
 
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...IRJET-  	  Internet of Things (IoT), and the Security Issues Surrounding it: ...
IRJET- Internet of Things (IoT), and the Security Issues Surrounding it: ...
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 

Recently uploaded

Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
amekonnen
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
artemacademy2
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Access Innovations, Inc.
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
faizulhassanfaiz1670
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Rosie Wells
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
1990 Media
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Dutch Power
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
kkirkland2
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
Faculty of Medicine And Health Sciences
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
samililja
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
SkillCertProExams
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
OECD Directorate for Financial and Enterprise Affairs
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
OECD Directorate for Financial and Enterprise Affairs
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
Frederic Leger
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
ToshihiroIto4
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Dutch Power
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
gharris9
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
gharris9
 

Recently uploaded (19)

Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
Suzanne Lagerweij - Influence Without Power - Why Empathy is Your Best Friend...
 
Tom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issueTom tresser burning issue.pptx My Burning issue
Tom tresser burning issue.pptx My Burning issue
 
Carrer goals.pptx and their importance in real life
Carrer goals.pptx  and their importance in real lifeCarrer goals.pptx  and their importance in real life
Carrer goals.pptx and their importance in real life
 
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdfSupercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
Supercharge your AI - SSP Industry Breakout Session 2024-v2_1.pdf
 
Media as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern EraMedia as a Mind Controlling Strategy In Old and Modern Era
Media as a Mind Controlling Strategy In Old and Modern Era
 
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie WellsCollapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
Collapsing Narratives: Exploring Non-Linearity • a micro report by Rosie Wells
 
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPointMẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
Mẫu PPT kế hoạch làm việc sáng tạo cho nửa cuối năm PowerPoint
 
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
Presentatie 4. Jochen Cremer - TU Delft 28 mei 2024
 
Burning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdfBurning Issue Presentation By Kenmaryon.pdf
Burning Issue Presentation By Kenmaryon.pdf
 
Updated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidismUpdated diagnosis. Cause and treatment of hypothyroidism
Updated diagnosis. Cause and treatment of hypothyroidism
 
XP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to LeadershipXP 2024 presentation: A New Look to Leadership
XP 2024 presentation: A New Look to Leadership
 
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
Mastering the Concepts Tested in the Databricks Certified Data Engineer Assoc...
 
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
Competition and Regulation in Professions and Occupations – OECD – June 2024 ...
 
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...Competition and Regulation in Professions and Occupations – ROBSON – June 202...
Competition and Regulation in Professions and Occupations – ROBSON – June 202...
 
2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf2024-05-30_meetup_devops_aix-marseille.pdf
2024-05-30_meetup_devops_aix-marseille.pdf
 
ASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdfASONAM2023_presection_slide_track-recommendation.pdf
ASONAM2023_presection_slide_track-recommendation.pdf
 
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
Presentatie 8. Joost van der Linde & Daniel Anderton - Eliq 28 mei 2024
 
Gregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptxGregory Harris' Civics Presentation.pptx
Gregory Harris' Civics Presentation.pptx
 
Gregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics PresentationGregory Harris - Cycle 2 - Civics Presentation
Gregory Harris - Cycle 2 - Civics Presentation
 

国际物联网安全标准与认证大解析

  • 1. Realize Ultimate Security every step starts with the labs www.onwardsecurity.com 2021最佳物聯網資安公司 国际物联网 安全标准与认证大解析 仲至信息科技 CTO 刘作仁 2021/10/13
  • 2. © 2021 Onward Security Corp. All rights reserved. 1 物联网资安合规解决方案 200+ Customers Served 10+ Awards 资安实务 经验丰富 国际认可 实验室 国际奖项 • 2014成立 • 超过80位员工 400+ Products Validated Best IT Company of the Year Best Cybersecurity Company – ASIA Gold Winner Hot Company in Cybersecurity Internet of Things
  • 3. 2 © 2021 Onward Security Corp. All rights reserved. 57% of IoT devices are currently vulnerable to medium or high-severity attacks $500,000 IoT Vulnerabilities Cost More Than per month
  • 4. © 2021 Onward Security Corp. All rights reserved. 3 Device Vulnerabilities in mid of 2021 • https://www.iot-inspector.com/blog/advisory-multiple-issues-realtek-sdk-iot-supply-chain/ • https://www.securityweek.com/vulnerability-affecting-routers-many-vendors-exploited-days-after-disclosure
  • 5. © 2021 Onward Security Corp. All rights reserved. 4 • SB-327 • IoT Cybersecurity Improvement Act • IoT Consumer TIPS Act • Content of Premarket Submissions for Management of Cybersecurity in Medical Devices, FDA • EU Cybersecurity Act • FIPS 140-3 • NISTIR 8228 • NIST 8259 Series • Amazon, Google, Apple • CTIA • ioXt • Major telecom company (AT&T, Sprint, Verizon, T-Mobile) • ISO 15408 (Common Criteria) • IEC 62443 • ISO/SAE 21434 • ETSI EN 303 645 • Major telecom company (Orange, BT, DT, Vodafone, EE, Telefonica) • Nokia Regulration Standard Guideline Industrial Certificate 欧美连网产品安全法规/标准/指引
  • 6. © 2021 Onward Security Corp. All rights reserved. 5 法规与国际标准 01
  • 7. © 2021 Onward Security Corp. All rights reserved. 6 EU Cybersecurity Act • Activated on June 2019 • EU Cybersecurity Certification Framework ü Covering ICT products, services and processes. ü Each scheme will specify one or more level(s) of assurance (basic, substantial or high) High (CABs) Substantial (CABs) Basic (CABs, No CABs) • ETSI EN 303 645 • CC EAL2 • IEC 62443-4-2 • CC EAL3+ • CC EAL 4+ https://www.enisa.europa.eu/events/towards_security_framework/Presentation%20-%20Meister/
  • 8. © 2021 Onward Security Corp. All rights reserved. 7 ETSI EN 303 645 (EU) • Become operative on January 1, 2020. • A manufacturer of a connected device shall equip the device with a reasonable security feature or features • If a connected device is equipped with a means for authentication outside a local area network Require vendors of Internet-connected devices purchased by the federal government ensure their devices are patchable, rely on industry standard protocols, do not use hard-coded passwords, and do not contain any known security vulnerabilities. The preprogrammed password is unique to each device manufactured. The device contains a security feature that requires a user to generate a new means of authentication before access is granted to the device for the first time SB-327 Information privacy : connected devices (US) https://www.etsi.org/newsroom/press-releases/1789-2020-06- etsi-releases-world-leading-consumer-iot-security-standard IoT Security In United States and Europe
  • 9. © 2021 Onward Security Corp. All rights reserved. 8 FDA Premarket Submission for Management of Cybersecurity in Medial Devices (2018) Establish cybersecurity risk management plan and submit the related documentations Product Design Risk Management • Cybersecurity design control • System diagrams • Summary of design features • System level threat model • List of cybersecurity controls • Testing report • Traceability matrix • CBOM • device performance • security effectiveness of third-party OTS software • testing for credential • vulnerability scanning • robustness testing • boundary analysis • penetration testing • 3rd party test reports
  • 10. © 2021 Onward Security Corp. All rights reserved. 9 国际资安认证 02
  • 11. © 2021 Onward Security Corp. All rights reserved. 10 終止 Termination Common Criteria 资安产品生命周期之安全保证 操作 Operation 交付 安装启动 Delivery 生产 Production 产品原型 测试 Testing 低阶设计 实作 Low-level Design 架构设计 高阶设计 High-level Design 功能规格 Functional Requirements 安全需求 Security Requirements 安全需求 Security Requirements 设计发展 Development 测试 Testing 生产行销 Production 操作使用 Operation 符合性(≥ EAL1) 符合性(≥ EAL2) 符合性(≥ EAL3) 一致性 一致性 一致性 模組測試 (≥ EAL4) 子系統測試 (≥ EAL3) 產品黑箱測試 (≥ EAL2) 產品整合性測試 (≥ EAL1) 共同准则安全评估 Common Criteria for IT Security Evaluation Module Testing (≥ EAL3) Subsystem Testing (≥ EAL3) Black-box Testing (≥ EAL2) Conformance Testing (≥ EAL1)
  • 12. © 2021 Onward Security Corp. All rights reserved. 11 FIPS 140-3 密码模组 Cryptographic Module 软件 固件 硬件/固件/软件组合 1. Cryptographic Module Specification 2. Cryptographic module interfaces 3. Roles, Services, and Authentication 4. Software/Firmware security 5. Operational Environment 6. Physical Security 7. Non-invasive security 8. Sensitive security parameter management 9. Self Tests 10. Life-cycle assurance 11. Mitigation of Other Attacks
  • 13. © 2021 Onward Security Corp. All rights reserved. 12 IEC 62443-4-2 Technical security requirements for IACS components IAC Identification and Authentication Control UC User Control SI System Integrity DC Data Confidentiality RDF Restricted Data Flow TRE Timely Response to Event RA Resource Availability detailed technical control system component requirements
  • 14. © 2021 Onward Security Corp. All rights reserved. 13 IEC 62443-4-1 / 62443-4-2 CBTL
  • 15. © 2021 Onward Security Corp. All rights reserved. 14 Automotive Security - ISO 21434 • Define a well-defined process to ensure that the cybersecurity is taken care to reduce the intensity of the cyber-attack • The final standard has been published on Aug 31, 2021. https://www.pathpartnertech.com/an-overview-of-iso-sae-21434-road-vehicles-cybersecurity-engineering/
  • 16. © 2021 Onward Security Corp. All rights reserved. 15 客户要求与产业资安认证 03
  • 17. © 2021 Onward Security Corp. All rights reserved. 16 Amazon Alexa Service (AVS)
  • 18. © 2021 Onward Security Corp. All rights reserved. 17 ioXt Alliance The mission of the ioXt Alliance is to build confidence in Internet of Things products through multi-stakeholder, international, harmonized, and standardized security and privacy requirements, product compliance programs, and public transparency of those requirements and programs.
  • 19. © 2021 Onward Security Corp. All rights reserved. 18 CTIA IoT Cybersecurity Certification Program Cybersecurity for Devices on Wireless Networks This program was developed with the support of wireless operators with the goal of voluntarily establishing device cybersecurity best practices in the wireless industry. This is the first mobile device cybersecurity program of its kind to have the backing of wireless operators in collaboration with technology companies and certification test labs. The Cybersecurity Certification Program: • Certifies security elements of LTE and 5G devices, including those with Wi-Fi connections • Creates an industry best practice for IoT security on wireless networks • Helps protect consumers and wireless infrastructure, while creating a more secure foundation for smart cities, connected cars, mHealth, and other IoT applications
  • 20. © 2021 Onward Security Corp. All rights reserved. 19 Cybersecurity Certification for Products 300+ Clients get product certification in 10+ Countries Smart Home IoT Products Smartphone and built-in apps Smart Bus Video Surveillance Cloud System Smart Lighting Mobile App IACS 5G Products Finance EN 303 645
  • 21. © 2021 Onward Security Corp. All rights reserved. 20 制造商与开发商的因应之道 04
  • 22. © 2021 Onward Security Corp. All rights reserved. 21 仲至信息科技资安标准库 IEC 62443 EN 303 645 IEC 62351 ioXt CTIA IoT SB-327 Authentication Physical Firmware Authorization Audit Encrytion Questionnaire Standards Product Type • Phase 1 - SR • 安全功能清单 • PM / SA / RD • Phase 4 - SVV • 测试项目清单 • RD / QA
  • 23. © 2021 Onward Security Corp. All rights reserved. 22 • Unique Password • Vulnerability Reporting (PSIRT) • Authentication • Secure Interface • Cryptography Critical Factor for Product Security • Risk Management • Software Update IoT (Consumer) ICS/SCADA Medical Automotive SBOM (Software Bill of Material) Privacy Protection SSDLC Fuzz Testing Integrity Session Management Audit Activity Input Validation Availability Debug Interface Input Validation Privacy Protection SSDLC
  • 24. Realize Ultimate Security every step starts with the labs © 2021 Onward Security Corp. All rights reserved. contact@onwardsecurity.com THANK Y U Onward Security 联络我们 contact@onwardsecurity.com