SlideShare a Scribd company logo
1 of 49
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding and Hardening the
Attack Surface at the Edge
Tim Mattison
Global Tech Lead, IoT Partners
Amazon Web Services
G P S T E C 4 0 2
Phil Strong
CEO, Founder
Zymbit
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Don't neglect edge security
"Attacks always get better,
They never get worse"
- NSA*
*allegedly
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Physical interfaces
• Console ports
• Serial ports / busses
• Flash
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure flash/secure boot
• Secure flash protects a system from offline attempts to pull and
read/write the flash
• Secure flash DOES NOT usually protect a system from software
exploits since the flash is decrypted for them
• Secure boot makes sure the software at startup is from a trusted
source
• Secure boot DOES NOT protect a system from bugs, compromised
development systems, etc.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network interfaces
• Over-the-air (OTA) updates
• Insecure services
• Remote DoS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Development infrastructure
• Code repositories
• Continuous integration systems
• Staging areas for build artifacts
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Real world / social engineering
• Deployment processes
• Installation processes
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Attack surface for embedded devices at the edge
• Reduced capabilities of edge devices is a double edged sword
• Typically fewer things to attack
• Only if the hardware has sufficient capabilities to protect itself
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Attack surface for Linux devices at the edge
• SSH, username and password, shared keys, lack of two-factor auth
• Software updates
• Extra services running
• Running a lot more code that the customer didn't write…
• …and just because it's open source doesn't mean it has been audited
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
There is hope
If you only improve one aspect of the attack surface in an edge system…
NEVER HAVE PRIVATE
KEYS IN MAIN MEMORY
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure elements, TPMs, HSMs
• Lock away the private key
• Similar to using STS for IAM, credentials have a limited scope in terms
of time
• Standard practice in the embedded space, becoming more popular in
the Linux world
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS IoT Greengrass Hardware Security Integration
• HSI allows you to use your secure element, TPM, or HSM to secure your
credentials
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Greengrass config before HSI
"certPath": "core.crt",
"keypath": "core.key"
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Greengrass config with HSI
"PKCS11": {
"OpenSSLEngine": "libp11-kit.so.0",
"P11Provider": "libsofthsm2.so",
"slotLabel": "greengrass",
"slotUserPin": 1234
}
"privateKeyPath":
"pkcs11:object=iotkey;type=private"
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Zymbit Zymkey and HSI
• AWS Greengrass is being used in AWS data
centers to control the AutoCrib, an industrial
vending machine
• Current integration runs on Raspberry Pi
• Data Center Operations (DCO) tenet: Increase
the security and efficiency of AWS data
centers
• DCO chose the Zymbit Zymkey to add another
layer of security into this system
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Zymbit Zymkey and HSI
• Zymbit has created a production ready security device that interfaces
with the Raspberry Pi style header
• Let's hear directly from our partner…
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Zymbit Security Modules for edge devices
• For single board computers
• Whole device security
• Hard to penetrate
• Easy to integrate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Edge devices live in the wild
• Outside of firewalls & physical infrastructure
• No operator or guardian
• Unsanctioned sensors, peripherals
• Intermittent power grid & network
• Service access sometimes required
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
They contain valuable digital assets, with outsized
impact
• Credentials to services & file system
• Application data
• Proprietary application code
• Commercial and physical impact if penetrated
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Keys to the kingdom
Keys protect valuable digital assets
But who protects the keys!?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How kingdoms are protected
• A layered approach
• Defense in depth
• Whole device security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect the keys
• Secure element chip (SE)
• Generates and stores keys in hardware
• Private key never exposed
• Crypto engine
• Signs and encrypts data
• True random number generator
• Active shield in silicon
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security
Supervisor
Secure
Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect the secure element
• Dedicated security supervisor MCU
• Isolates SE from the real world
• Encrypted intra-processor sessions
• Adds application facing features
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security Supervisor
Secure Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect the supply chain
• Self contained plug-in module
• Integrate at point-of-system assembly
• Battery powered
• Real time clock
• Onboard physical tamper sensors
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security
Supervisor
Secure Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect communications
• Abstracted communication interface
• No direct communication to secure element
• Limited command set
• OEM flexible
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security
Supervisor
Secure Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect identity
• Unique measured system fingerprint
• Multiple factors
• Board components
• OEM sanctioned system peripherals
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security Supervisor
Secure Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect from physical attack
• Perimeter circuits
• Power monitoring
• Shock monitoring
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security
Supervisor
Secure Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Whole device security
• Physical
• Digital
• Supply chain
Your Physical Device
Single Board Computers
Zymbit Secure API
Zymbit Security Module
Zymbit Security Supervisor
Secure Element
Key Store
Crypto
Engine
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Whole device security with Zymkey 4i
Physical tamper detection
Device authentication
Data encryption & signing
Secure key generation & storage
Real time clock
Hardware secure element
Ultra low power
Qualified Integrations
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Easy integration with Raspberry Pi
• Plug-in module
• Connects to GPIO header
• Simple API for C, C++, Python
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Whole device security
 Physical security
 Measured identity
 Secure element



© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Whole system security
• Easy integration with AWS IoT Greengrass
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Easy integration with HSI
• Example video - accelerometer
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Applications
Encrypted File System Secure Enclosure Design
AWS IoT Integrations
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Documentation community.zymbit.com
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Developer Kit
 Zymkey 4, 6 support
 Tamper switches x4
 Cable lock
 SD card protected
 12 to 36V power






© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Integration with Single Board Computers (SBC)
• With Pi Compatible GPIO • Other Linux SBCs (2019)
Beaglebone
OdroidAsus
Tinkerboard
Pi Flavors
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Designed & Manufactured in California
• Built in ITAR compliant facility
• High volume capacity
• OEM custom solutions available
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
OEM custom solutions
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Where to buy Zymbit security modules
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Modules for IoT Devices
Hard to penetrate
Easy to integrate
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Amazon Web Services
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Amazon Web Services
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Amazon Web Services
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Amazon Web Services
 
Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...
Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...
Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...Amazon Web Services
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...Amazon Web Services
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...Amazon Web Services
 
AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...
AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...
AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...Amazon Web Services
 
SRV207 Orchestrating AWS Lambda with Step Functions
 SRV207 Orchestrating AWS Lambda with Step Functions SRV207 Orchestrating AWS Lambda with Step Functions
SRV207 Orchestrating AWS Lambda with Step FunctionsAmazon Web Services
 
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018Amazon Web Services
 
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...Amazon Web Services
 
DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3Amazon Web Services
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...Amazon Web Services
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Amazon Web Services
 
SRV206 Edge Computing with AWS Greengrass
 SRV206 Edge Computing with AWS Greengrass SRV206 Edge Computing with AWS Greengrass
SRV206 Edge Computing with AWS GreengrassAmazon Web Services
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Amazon Web Services
 

What's hot (20)

Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
 
Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...
Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...
Building Blockchain Platforms Beyond a Proof of Concept (GPSTEC317) - AWS re:...
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
 
AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...
AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...
AWS Encryption SDK: The Busy Engineer's Guide to Client-Side Encryption (SEC3...
 
SRV207 Orchestrating AWS Lambda with Step Functions
 SRV207 Orchestrating AWS Lambda with Step Functions SRV207 Orchestrating AWS Lambda with Step Functions
SRV207 Orchestrating AWS Lambda with Step Functions
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
 
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...
Discuss How to Secure Your Virtual Data Center in the Cloud (NET210-R1) - AWS...
 
DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3
 
AWS Espressif Amazon FreeRTOS
AWS Espressif Amazon FreeRTOSAWS Espressif Amazon FreeRTOS
AWS Espressif Amazon FreeRTOS
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
 
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - A...
 
SRV206 Edge Computing with AWS Greengrass
 SRV206 Edge Computing with AWS Greengrass SRV206 Edge Computing with AWS Greengrass
SRV206 Edge Computing with AWS Greengrass
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
 

Similar to Hardening Edge Device Security with AWS IoT Greengrass HSI

GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceAmazon Web Services
 
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon Web Services
 
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Amazon Web Services
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
Connected Product Development - Secure Cloud & Local Connectivity for Microco...
Connected Product Development - Secure Cloud & Local Connectivity for Microco...Connected Product Development - Secure Cloud & Local Connectivity for Microco...
Connected Product Development - Secure Cloud & Local Connectivity for Microco...Amazon Web Services
 
Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...
Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...
Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...Amazon Web Services
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Amazon Web Services
 
Amazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and RemediationAmazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and RemediationAmazon Web Services
 
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018Amazon Web Services
 
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018Amazon Web Services
 
Automating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWSAutomating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWSAmazon Web Services
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionAmazon Web Services
 
Building Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 MinskBuilding Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 MinskBoaz Ziniman
 
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...Amazon Web Services
 
Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...
Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...
Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...Amazon Web Services
 
Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018
Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018
Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018Amazon Web Services
 
Automating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWSAutomating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWSAmazon Web Services
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadAmazon Web Services
 

Similar to Hardening Edge Device Security with AWS IoT Greengrass HSI (20)

GPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to MaintenanceGPSTEC318-IoT Security from Manufacturing to Maintenance
GPSTEC318-IoT Security from Manufacturing to Maintenance
 
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
 
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
Tax returns in the cloud: The journey of Intuit’s data platform - SDD330 - AW...
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
Connected Product Development - Secure Cloud & Local Connectivity for Microco...
Connected Product Development - Secure Cloud & Local Connectivity for Microco...Connected Product Development - Secure Cloud & Local Connectivity for Microco...
Connected Product Development - Secure Cloud & Local Connectivity for Microco...
 
Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...
Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...
Automate the Creation of Secure Enterprise Resources During Migrations (DAT32...
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
Amazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and RemediationAmazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and Remediation
 
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
Securing Serverless Applications and AWS Lambda (SRV314-R1) - AWS re:Invent 2018
 
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
Introducing the New Features of AWS Greengrass (IOT365) - AWS re:Invent 2018
 
Automating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWSAutomating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWS
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
How AI is disrupting the world
How AI is disrupting the world How AI is disrupting the world
How AI is disrupting the world
 
Building Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 MinskBuilding Serverless IoT solutions - EPAM SEC 2018 Minsk
Building Serverless IoT solutions - EPAM SEC 2018 Minsk
 
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
 
Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...
Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...
Serverless Video Ingestion & Analytics with Amazon Kinesis Video Streams (ANT...
 
Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018
Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018
Automating Incident Response and Forensics in AWS - AWS Summit Sydney 2018
 
Automating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWSAutomating Incident Response and Forensics in AWS
Automating Incident Response and Forensics in AWS
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Hardening Edge Device Security with AWS IoT Greengrass HSI

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding and Hardening the Attack Surface at the Edge Tim Mattison Global Tech Lead, IoT Partners Amazon Web Services G P S T E C 4 0 2 Phil Strong CEO, Founder Zymbit
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Don't neglect edge security "Attacks always get better, They never get worse" - NSA* *allegedly
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Physical interfaces • Console ports • Serial ports / busses • Flash
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure flash/secure boot • Secure flash protects a system from offline attempts to pull and read/write the flash • Secure flash DOES NOT usually protect a system from software exploits since the flash is decrypted for them • Secure boot makes sure the software at startup is from a trusted source • Secure boot DOES NOT protect a system from bugs, compromised development systems, etc.
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Network interfaces • Over-the-air (OTA) updates • Insecure services • Remote DoS
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Development infrastructure • Code repositories • Continuous integration systems • Staging areas for build artifacts
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Real world / social engineering • Deployment processes • Installation processes
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Attack surface for embedded devices at the edge • Reduced capabilities of edge devices is a double edged sword • Typically fewer things to attack • Only if the hardware has sufficient capabilities to protect itself
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Attack surface for Linux devices at the edge • SSH, username and password, shared keys, lack of two-factor auth • Software updates • Extra services running • Running a lot more code that the customer didn't write… • …and just because it's open source doesn't mean it has been audited
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. There is hope If you only improve one aspect of the attack surface in an edge system… NEVER HAVE PRIVATE KEYS IN MAIN MEMORY
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure elements, TPMs, HSMs • Lock away the private key • Similar to using STS for IAM, credentials have a limited scope in terms of time • Standard practice in the embedded space, becoming more popular in the Linux world
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS IoT Greengrass Hardware Security Integration • HSI allows you to use your secure element, TPM, or HSM to secure your credentials
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Greengrass config before HSI "certPath": "core.crt", "keypath": "core.key"
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Greengrass config with HSI "PKCS11": { "OpenSSLEngine": "libp11-kit.so.0", "P11Provider": "libsofthsm2.so", "slotLabel": "greengrass", "slotUserPin": 1234 } "privateKeyPath": "pkcs11:object=iotkey;type=private"
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Zymbit Zymkey and HSI • AWS Greengrass is being used in AWS data centers to control the AutoCrib, an industrial vending machine • Current integration runs on Raspberry Pi • Data Center Operations (DCO) tenet: Increase the security and efficiency of AWS data centers • DCO chose the Zymbit Zymkey to add another layer of security into this system
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Zymbit Zymkey and HSI • Zymbit has created a production ready security device that interfaces with the Raspberry Pi style header • Let's hear directly from our partner…
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Zymbit Security Modules for edge devices • For single board computers • Whole device security • Hard to penetrate • Easy to integrate
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Edge devices live in the wild • Outside of firewalls & physical infrastructure • No operator or guardian • Unsanctioned sensors, peripherals • Intermittent power grid & network • Service access sometimes required
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. They contain valuable digital assets, with outsized impact • Credentials to services & file system • Application data • Proprietary application code • Commercial and physical impact if penetrated
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Keys to the kingdom Keys protect valuable digital assets But who protects the keys!?
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How kingdoms are protected • A layered approach • Defense in depth • Whole device security
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect the keys • Secure element chip (SE) • Generates and stores keys in hardware • Private key never exposed • Crypto engine • Signs and encrypts data • True random number generator • Active shield in silicon Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect the secure element • Dedicated security supervisor MCU • Isolates SE from the real world • Encrypted intra-processor sessions • Adds application facing features Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect the supply chain • Self contained plug-in module • Integrate at point-of-system assembly • Battery powered • Real time clock • Onboard physical tamper sensors Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect communications • Abstracted communication interface • No direct communication to secure element • Limited command set • OEM flexible Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect identity • Unique measured system fingerprint • Multiple factors • Board components • OEM sanctioned system peripherals Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect from physical attack • Perimeter circuits • Power monitoring • Shock monitoring Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Whole device security • Physical • Digital • Supply chain Your Physical Device Single Board Computers Zymbit Secure API Zymbit Security Module Zymbit Security Supervisor Secure Element Key Store Crypto Engine
  • 35. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Whole device security with Zymkey 4i Physical tamper detection Device authentication Data encryption & signing Secure key generation & storage Real time clock Hardware secure element Ultra low power Qualified Integrations
  • 36. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Easy integration with Raspberry Pi • Plug-in module • Connects to GPIO header • Simple API for C, C++, Python
  • 37. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Whole device security  Physical security  Measured identity  Secure element   
  • 38. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Whole system security • Easy integration with AWS IoT Greengrass
  • 39. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Easy integration with HSI • Example video - accelerometer
  • 40. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Applications Encrypted File System Secure Enclosure Design AWS IoT Integrations
  • 41. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Documentation community.zymbit.com
  • 42. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Developer Kit  Zymkey 4, 6 support  Tamper switches x4  Cable lock  SD card protected  12 to 36V power      
  • 43. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Integration with Single Board Computers (SBC) • With Pi Compatible GPIO • Other Linux SBCs (2019) Beaglebone OdroidAsus Tinkerboard Pi Flavors
  • 44. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Designed & Manufactured in California • Built in ITAR compliant facility • High volume capacity • OEM custom solutions available
  • 45. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. OEM custom solutions
  • 46. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Where to buy Zymbit security modules
  • 47. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Modules for IoT Devices Hard to penetrate Easy to integrate
  • 48. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 49. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.