SlideShare a Scribd company logo
Strong Security
Elements for IoT
Manufacturing
LANCEN
LACHANCE
VICE PRESIDENT
PRODUCT
MANAGEMENT
GLOBALSIGN
@ThingsExpo
WHAT
YOU WILL
LEARN
TODAY
1
2
Examining of security
risks with smart
connected products
3
Implementing
security through the
manufacturing
process
Manufacturing IoT
use cases
@ThingsExpo
Privacy and security will become more
distinguishing factors in consumer IoT
How do I build my product to achieve these
privacy and security goals?
1. Security by Design
2. Stand on the Shoulders of Giants
3. Application within the Manufacturing Process
/////
/////
INTRODUCTION
@ThingsExpo
• No winning architectures, although
seeing some standardization within
verticals
• Peak Hype - Organizations are still
mostly developing their strategy, but
some use cases emerging
• New entrants with smart connected
products often lacking information
security experience
• Huge number of industry consortiums
trying to drive standards
IoT SECURITY
OBSERVATIONS
@ThingsExpo
WHY
invest in security
for your IoE
ecosystem?
REDUCE RISKS
Protect brand
Prevent Fraud
Safety
Privacy
Legal Compliance VALUE
ADD
Differentiators
Certifications
DIFFERING
PRIORITIES
Consumer
Industrial
Enterprise
@ThingsExpo
Why?
– Changes are much cheaper to
make early in design cycle
– Proper information security
and privacy is rarely ever ‘bolt
on’
/////
/////
Design – Production – Usage
Product Lifecycle
Costtochange
How?
– Identify value components / assets in ecosystem
– Think like a hacker
– Assess the probability and magnitude of a
compromise
– Evaluate technology components in each area
SECURITY BY DESIGN
@ThingsExpo
Remember – the internet of things,
is still the internet
Internet and information security
principles and best practices have
matured over the past decade
Things are just one part, we still
have users, services, and
organizations
There are solutions and standards
existing today succeeding in
providing distributed trusted
identity
/////
/////
/////
/////
STANDING ON THE SHOULDERS OF GIANTS
@ThingsExpo
Information Security Concepts
AUTHENTICATION
ENCRYPTION
DATA INTEGRITY
@ThingsExpo
PKI (Public Key Infrastructure) and it’s
implementation in protocols like TLS, enable
a range of information security principles to
be achieved
Security focused crypto-processors, like
TPMs, pair perfectly with software based PKI
to build and maintain device identity
/////
/////
PROVEN SOLUTIONS FOR DEVICE IDENTITY
@ThingsExpo
SMART & SECURE MANUFACTURING
• Theory is nice, but what about the
realities of provisioning identity in
the product manufacturing
lifecycle?
• How does an IoT product architect
/ developer address concerns of:
– Minimal trust in contract
manufacturing environments
– Preventing overproduction /
counterfeiting
– Audit, tracking, and reporting
– Network connectivity
@ThingsExpo
• Q: Can you select technology that
limits the amount of trust you need
in the manufacturing environment?
• A: Yes! Combining TPM hardware
with PKI and enrollment
techniques, enables robust identity
assumptions
– Result is high confidence in the
device identity with
• Assurance that the
hardware to protect keys is
genuine
• Assurance that keys
associated with identity
credential are protected
with hardware
• Identity credential issued
from known and trusted
root.
SMART & SECURE MANUFACTURING
@ThingsExpo
Identity Provisioning Architecture
@ThingsExpo
• Network Appliances
– Feature licensing protection
• Smart Connected Home Appliances
– Secure authentication and private communications
• Diagnostic Equipment
– Trusted interface for administration
• Connect Car & ECU security
– Car gateway identity protection and secure
firmware updates
USE CASE APPLICATIONS
@ThingsExpo
• Simplified infrastructure
requirements and costs
– Minimal additional hardware
and security concerns
– Reduces cost to expand
manufacturing to multiple sites
• Saas models to allow elasticity
– Expenses: Shift from capital
expense to operational expense
– Performance: Scale up from POC
to billions of devices without
changing infrastructure
hardware
• Built in mechanisms for
auditability, access control, and
reporting
///USING THE
CLOUD
FOR
IDENTITY
ISSUANCE
@ThingsExpo
Size, scale, and scope of your ecosystem
Diversity of devices and processing power
Trust models and complex relationships
Lifecycle management across device and cloud
/////
/////
/////
/////
NEW CONSIDERATIONS FROM THE IoT
@ThingsExpo
A flexible & scalable PKI platform can meet the needs
of high-volume PKI use cases in the internet of things
Volume Velocity
+ Variety
+ Usage &
Lifecycle
+
While being cost effective
Billions of certificates, identities, and relying
parties per ecosystem
Flexible certificate needs to support the cross
domain use cases
KEEPING PACE WITH THE SPEED OF THE IoT
@ThingsExpo
///// Implement security and identity from the outset
/////
Leverage established standards covering
authentication, authorization, encryption, and data
integrity
///// Each deployment is going to have its own needs, need
solutions that are flexible!
Ensure service provides are capable of maintaining
security and oversight
/////
THE ANSWER TO IDENTITY IN IoT?
@ThingsExpo
Public Trust
Private Trust
Trust needs are
scenario dependent
The Things
Consumer
Administrator
Business
3rd
Party
Application
Vendor
Data
Web Services
Admin
Portal
Thing
Web Services
Consumer
Web Portal
Partner
Web Portal
Cloud Provider
Identity Services
PKI, Authentication, Authorization,
& Identity Relationships
Example Ecosystem
@ThingsExpo
THANK YOU!
QUESTIONS?
Lancen.LaChance@globalsign.com
twitter.com/globalsign

More Related Content

What's hot

Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Bryan Len
 
Proof of concepts and use cases with IoT technologies
Proof of concepts and use cases with IoT technologiesProof of concepts and use cases with IoT technologies
Proof of concepts and use cases with IoT technologies
Heikki Ailisto
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Market Research Reports, Inc.
 
Industrial IOT By Rishika Ghosh
Industrial IOT By Rishika GhoshIndustrial IOT By Rishika Ghosh
Industrial IOT By Rishika Ghosh
rishika ghosh
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives
Eurotech
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoT
Eurotech
 
Industry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADAIndustry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADA
Enerco Energy Solutions LLP
 
Industrial IoT
Industrial IoTIndustrial IoT
Industrial IoT
archit_tracomo
 
LoQutus introduction - IoT for Manufacturing
LoQutus introduction - IoT for ManufacturingLoQutus introduction - IoT for Manufacturing
LoQutus introduction - IoT for Manufacturing
LoQutus
 
GETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENTGETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENT
Barnaba Accardi
 
IoT Meetup September 2019
IoT Meetup September 2019IoT Meetup September 2019
IoT Meetup September 2019
IoT Academy
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
MachinePulse
 
Iot
IotIot
Watson IoT - IBM
Watson IoT - IBMWatson IoT - IBM
Watson IoT - IBM
Diego Alberto Tamayo
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that mater
APPAU_Ukraine
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
Next Dimension Inc.
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
Eurotech
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
Eurotech
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
Anchises Moraes
 
Industrial Internet of Things: Recipe for Innovating the  Businesses through...
Industrial Internet of Things: Recipe for Innovating the  Businesses  through...Industrial Internet of Things: Recipe for Innovating the  Businesses  through...
Industrial Internet of Things: Recipe for Innovating the  Businesses through...
Eurotech
 

What's hot (20)

Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex TrainingAdvanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
Advanced Industrial IoT, IIoT Training Crash Course For You - Tonex Training
 
Proof of concepts and use cases with IoT technologies
Proof of concepts and use cases with IoT technologiesProof of concepts and use cases with IoT technologies
Proof of concepts and use cases with IoT technologies
 
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
Internet of Things Service Level Agreements: Market Outlook and Forecast for ...
 
Industrial IOT By Rishika Ghosh
Industrial IOT By Rishika GhoshIndustrial IOT By Rishika Ghosh
Industrial IOT By Rishika Ghosh
 
IoT Business Perspectives
IoT Business Perspectives IoT Business Perspectives
IoT Business Perspectives
 
IoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoTIoT Solutions Made Simple with Everyware IoT
IoT Solutions Made Simple with Everyware IoT
 
Industry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADAIndustry 4.0 IIoT vs SCADA
Industry 4.0 IIoT vs SCADA
 
Industrial IoT
Industrial IoTIndustrial IoT
Industrial IoT
 
LoQutus introduction - IoT for Manufacturing
LoQutus introduction - IoT for ManufacturingLoQutus introduction - IoT for Manufacturing
LoQutus introduction - IoT for Manufacturing
 
GETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENTGETTING STARTED WITH IOT DATA MANAGEMENT
GETTING STARTED WITH IOT DATA MANAGEMENT
 
IoT Meetup September 2019
IoT Meetup September 2019IoT Meetup September 2019
IoT Meetup September 2019
 
Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)Challenges & Applications in the Industrial Internet of Things (IoT)
Challenges & Applications in the Industrial Internet of Things (IoT)
 
Iot
IotIot
Iot
 
Watson IoT - IBM
Watson IoT - IBMWatson IoT - IBM
Watson IoT - IBM
 
IIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that materIIot vs IoT - 10 differencies that mater
IIot vs IoT - 10 differencies that mater
 
Next Dimension IIoT Presentation
Next Dimension IIoT PresentationNext Dimension IIoT Presentation
Next Dimension IIoT Presentation
 
Encapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT SolutionsEncapsulating Complexity in IoT Solutions
Encapsulating Complexity in IoT Solutions
 
Stop Wasting Energy on M2M
Stop Wasting Energy on M2MStop Wasting Energy on M2M
Stop Wasting Energy on M2M
 
É possível existir segurança para IoT?
É possível existir segurança para IoT?É possível existir segurança para IoT?
É possível existir segurança para IoT?
 
Industrial Internet of Things: Recipe for Innovating the  Businesses through...
Industrial Internet of Things: Recipe for Innovating the  Businesses  through...Industrial Internet of Things: Recipe for Innovating the  Businesses  through...
Industrial Internet of Things: Recipe for Innovating the  Businesses through...
 

Viewers also liked

Webinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoTWebinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoT
HARMAN Services
 
On The Way To Smart Factory
On The Way To Smart FactoryOn The Way To Smart Factory
On The Way To Smart Factory
Dell World
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
Eurotech
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
Sanjay Kumar (Seeking options outside India)
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
Cisco Canada
 
Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5
APNIC
 
Best practise Infrastructure pki
Best practise Infrastructure pkiBest practise Infrastructure pki
Best practise Infrastructure pki
ESD Cybersecurity Academy
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
DigiCert, Inc.
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
Ed Pimentel
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
Connected Futures
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
Amit Rohatgi
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
Amazon Web Services
 
Care Clinic: Patrick Strauss, IBM
Care Clinic: Patrick Strauss, IBMCare Clinic: Patrick Strauss, IBM
Care Clinic: Patrick Strauss, IBM
TheFuseBox
 
Smau Milano 2015 - RFID Global
Smau Milano 2015 - RFID GlobalSmau Milano 2015 - RFID Global
Smau Milano 2015 - RFID Global
SMAU
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart Manufacturing
Harrison Fortier
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
Tutun Juhana
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing Innovations
Dell EMC World
 
Smau Milano 2015 - Giorgio Cuttica
Smau Milano 2015 - Giorgio CutticaSmau Milano 2015 - Giorgio Cuttica
Smau Milano 2015 - Giorgio Cuttica
SMAU
 

Viewers also liked (19)

Webinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoTWebinar - Transforming Manufacturing with IoT
Webinar - Transforming Manufacturing with IoT
 
On The Way To Smart Factory
On The Way To Smart FactoryOn The Way To Smart Factory
On The Way To Smart Factory
 
IoT Security Elements
IoT Security ElementsIoT Security Elements
IoT Security Elements
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
IoT security (Internet of Things)
IoT security (Internet of Things)IoT security (Internet of Things)
IoT security (Internet of Things)
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5Resource Public Key Infrastructure presentation, Mynog5
Resource Public Key Infrastructure presentation, Mynog5
 
Best practise Infrastructure pki
Best practise Infrastructure pkiBest practise Infrastructure pki
Best practise Infrastructure pki
 
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone BeforeScott Rea - IoT: Taking PKI Where No PKI Has Gone Before
Scott Rea - IoT: Taking PKI Where No PKI Has Gone Before
 
IoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthingsIoTcloud-cybersecurity-securityofthings
IoTcloud-cybersecurity-securityofthings
 
Manufacturing with Internet of Things
Manufacturing with Internet of ThingsManufacturing with Internet of Things
Manufacturing with Internet of Things
 
IoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you SpamIoT Security Imperative: Stop your Fridge from Sending you Spam
IoT Security Imperative: Stop your Fridge from Sending you Spam
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the CloudBest Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Care Clinic: Patrick Strauss, IBM
Care Clinic: Patrick Strauss, IBMCare Clinic: Patrick Strauss, IBM
Care Clinic: Patrick Strauss, IBM
 
Smau Milano 2015 - RFID Global
Smau Milano 2015 - RFID GlobalSmau Milano 2015 - RFID Global
Smau Milano 2015 - RFID Global
 
IoT and Smart Manufacturing
IoT and Smart ManufacturingIoT and Smart Manufacturing
IoT and Smart Manufacturing
 
Internet of Things Security
Internet of Things SecurityInternet of Things Security
Internet of Things Security
 
MT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing InnovationsMT84 IoT and Smart Manufacturing Innovations
MT84 IoT and Smart Manufacturing Innovations
 
Smau Milano 2015 - Giorgio Cuttica
Smau Milano 2015 - Giorgio CutticaSmau Milano 2015 - Giorgio Cuttica
Smau Milano 2015 - Giorgio Cuttica
 

Similar to Strong Security Elements for IoT Manufacturing

Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
Mario Drobics
 
Building a better Internet of Things
Building a better Internet of ThingsBuilding a better Internet of Things
Building a better Internet of Things
Janaina Pilomia
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
Institute of Contemporary Sciences
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
Source Code Control Limited
 
Intel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSIntel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWS
Amazon Web Services
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
DevOps.com
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
Duncan Purves
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
Digital Catapult
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
Cisco DevNet
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
momoahmedabad
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
Kellton Tech Solutions Ltd
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
Cisco
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
Plantconnectiot
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
team-WIBU
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
Priyanka Aash
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
Mark Szewczul, CISSP
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
Electric Imp
 

Similar to Strong Security Elements for IoT Manufacturing (20)

Drobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applicationsDrobics trustworthy io-t-for-industrial-applications
Drobics trustworthy io-t-for-industrial-applications
 
Building a better Internet of Things
Building a better Internet of ThingsBuilding a better Internet of Things
Building a better Internet of Things
 
Digital transformation and AI @Edge
Digital transformation and AI @EdgeDigital transformation and AI @Edge
Digital transformation and AI @Edge
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
Intel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWSIntel SoC as a Platform to Connect Sensor Data to AWS
Intel SoC as a Platform to Connect Sensor Data to AWS
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CDPKI in DevOps: How to Deploy Certificate Automation within CI/CD
PKI in DevOps: How to Deploy Certificate Automation within CI/CD
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Industry 4.0 Security
Industry 4.0 SecurityIndustry 4.0 Security
Industry 4.0 Security
 
BT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob RowlingsonBT Cloud Enterprise Service Store - Rob Rowlingson
BT Cloud Enterprise Service Store - Rob Rowlingson
 
Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
Getting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj ShahGetting Started with IoT by Niraj Shah
Getting Started with IoT by Niraj Shah
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Iio t security std
Iio t security stdIio t security std
Iio t security std
 
IIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in PracticeIIoT Endpoint Security – The Model in Practice
IIoT Endpoint Security – The Model in Practice
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Fundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product DevelopmentFundamental Best Practices in Secure IoT Product Development
Fundamental Best Practices in Secure IoT Product Development
 
[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success[Webinar] Why Security Certification is Crucial for IoT Success
[Webinar] Why Security Certification is Crucial for IoT Success
 

Recently uploaded

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
laozhuseo02
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Sanjeev Rampal
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
nirahealhty
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
Gal Baras
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
3ipehhoa
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
Arif0071
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
JeyaPerumal1
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
natyesu
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
GTProductions1
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
VivekSinghShekhawat2
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
JungkooksNonexistent
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
laozhuseo02
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
Javier Lasa
 

Recently uploaded (20)

History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shopHistory+of+E-commerce+Development+in+China-www.cfye-commerce.shop
History+of+E-commerce+Development+in+China-www.cfye-commerce.shop
 
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and GuidelinesMulti-cluster Kubernetes Networking- Patterns, Projects and Guidelines
Multi-cluster Kubernetes Networking- Patterns, Projects and Guidelines
 
This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!This 7-second Brain Wave Ritual Attracts Money To You.!
This 7-second Brain Wave Ritual Attracts Money To You.!
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
How to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptxHow to Use Contact Form 7 Like a Pro.pptx
How to Use Contact Form 7 Like a Pro.pptx
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
急速办(bedfordhire毕业证书)英国贝德福特大学毕业证成绩单原版一模一样
 
test test test test testtest test testtest test testtest test testtest test ...
test test  test test testtest test testtest test testtest test testtest test ...test test  test test testtest test testtest test testtest test testtest test ...
test test test test testtest test testtest test testtest test testtest test ...
 
1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...1.Wireless Communication System_Wireless communication is a broad term that i...
1.Wireless Communication System_Wireless communication is a broad term that i...
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
BASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptxBASIC C++ lecture NOTE C++ lecture 3.pptx
BASIC C++ lecture NOTE C++ lecture 3.pptx
 
Comptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guideComptia N+ Standard Networking lesson guide
Comptia N+ Standard Networking lesson guide
 
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptxInternet-Security-Safeguarding-Your-Digital-World (1).pptx
Internet-Security-Safeguarding-Your-Digital-World (1).pptx
 
Latest trends in computer networking.pptx
Latest trends in computer networking.pptxLatest trends in computer networking.pptx
Latest trends in computer networking.pptx
 
The+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptxThe+Prospects+of+E-Commerce+in+China.pptx
The+Prospects+of+E-Commerce+in+China.pptx
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdfJAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
JAVIER LASA-EXPERIENCIA digital 1986-2024.pdf
 

Strong Security Elements for IoT Manufacturing

  • 1. Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN
  • 2. @ThingsExpo WHAT YOU WILL LEARN TODAY 1 2 Examining of security risks with smart connected products 3 Implementing security through the manufacturing process Manufacturing IoT use cases
  • 3. @ThingsExpo Privacy and security will become more distinguishing factors in consumer IoT How do I build my product to achieve these privacy and security goals? 1. Security by Design 2. Stand on the Shoulders of Giants 3. Application within the Manufacturing Process ///// ///// INTRODUCTION
  • 4. @ThingsExpo • No winning architectures, although seeing some standardization within verticals • Peak Hype - Organizations are still mostly developing their strategy, but some use cases emerging • New entrants with smart connected products often lacking information security experience • Huge number of industry consortiums trying to drive standards IoT SECURITY OBSERVATIONS
  • 5. @ThingsExpo WHY invest in security for your IoE ecosystem? REDUCE RISKS Protect brand Prevent Fraud Safety Privacy Legal Compliance VALUE ADD Differentiators Certifications DIFFERING PRIORITIES Consumer Industrial Enterprise
  • 6. @ThingsExpo Why? – Changes are much cheaper to make early in design cycle – Proper information security and privacy is rarely ever ‘bolt on’ ///// ///// Design – Production – Usage Product Lifecycle Costtochange How? – Identify value components / assets in ecosystem – Think like a hacker – Assess the probability and magnitude of a compromise – Evaluate technology components in each area SECURITY BY DESIGN
  • 7. @ThingsExpo Remember – the internet of things, is still the internet Internet and information security principles and best practices have matured over the past decade Things are just one part, we still have users, services, and organizations There are solutions and standards existing today succeeding in providing distributed trusted identity ///// ///// ///// ///// STANDING ON THE SHOULDERS OF GIANTS
  • 9. @ThingsExpo PKI (Public Key Infrastructure) and it’s implementation in protocols like TLS, enable a range of information security principles to be achieved Security focused crypto-processors, like TPMs, pair perfectly with software based PKI to build and maintain device identity ///// ///// PROVEN SOLUTIONS FOR DEVICE IDENTITY
  • 10. @ThingsExpo SMART & SECURE MANUFACTURING • Theory is nice, but what about the realities of provisioning identity in the product manufacturing lifecycle? • How does an IoT product architect / developer address concerns of: – Minimal trust in contract manufacturing environments – Preventing overproduction / counterfeiting – Audit, tracking, and reporting – Network connectivity
  • 11. @ThingsExpo • Q: Can you select technology that limits the amount of trust you need in the manufacturing environment? • A: Yes! Combining TPM hardware with PKI and enrollment techniques, enables robust identity assumptions – Result is high confidence in the device identity with • Assurance that the hardware to protect keys is genuine • Assurance that keys associated with identity credential are protected with hardware • Identity credential issued from known and trusted root. SMART & SECURE MANUFACTURING
  • 13. @ThingsExpo • Network Appliances – Feature licensing protection • Smart Connected Home Appliances – Secure authentication and private communications • Diagnostic Equipment – Trusted interface for administration • Connect Car & ECU security – Car gateway identity protection and secure firmware updates USE CASE APPLICATIONS
  • 14. @ThingsExpo • Simplified infrastructure requirements and costs – Minimal additional hardware and security concerns – Reduces cost to expand manufacturing to multiple sites • Saas models to allow elasticity – Expenses: Shift from capital expense to operational expense – Performance: Scale up from POC to billions of devices without changing infrastructure hardware • Built in mechanisms for auditability, access control, and reporting ///USING THE CLOUD FOR IDENTITY ISSUANCE
  • 15. @ThingsExpo Size, scale, and scope of your ecosystem Diversity of devices and processing power Trust models and complex relationships Lifecycle management across device and cloud ///// ///// ///// ///// NEW CONSIDERATIONS FROM THE IoT
  • 16. @ThingsExpo A flexible & scalable PKI platform can meet the needs of high-volume PKI use cases in the internet of things Volume Velocity + Variety + Usage & Lifecycle + While being cost effective Billions of certificates, identities, and relying parties per ecosystem Flexible certificate needs to support the cross domain use cases KEEPING PACE WITH THE SPEED OF THE IoT
  • 17. @ThingsExpo ///// Implement security and identity from the outset ///// Leverage established standards covering authentication, authorization, encryption, and data integrity ///// Each deployment is going to have its own needs, need solutions that are flexible! Ensure service provides are capable of maintaining security and oversight ///// THE ANSWER TO IDENTITY IN IoT?
  • 18. @ThingsExpo Public Trust Private Trust Trust needs are scenario dependent The Things Consumer Administrator Business 3rd Party Application Vendor Data Web Services Admin Portal Thing Web Services Consumer Web Portal Partner Web Portal Cloud Provider Identity Services PKI, Authentication, Authorization, & Identity Relationships Example Ecosystem