Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.
How to bring Trust to IoT devices ?
Guillaume Djourabtchi,
Marketing Director IoT Services
November, 2018
Who is
Gemalto?
We enable trust in two interlocking ways…
…by developing secure, innovative software
WE
AUTHENTICATE
PEOPLE AND
DEVICES
WE...
Our secure software & encryption help secure digital
exchanges for billions of individuals and things
3,000
R&D ENGINEERS
...
Securing
the IoT
Can you guess what this image represents ?
A
Le Bourget
Airport?
B
Gemalto
Headquarters in
Paris?
C
Secret US
military bas...
Cinterion Module Services - Secure Package
How many devices were needed to take down the
most resilient DNS server ?
Amazo...
$40
100 million
Cars
4 Secret Keys
Device and data trustworthiness are the cornerstone
of the IoT
Source: Gartner 2015
Why are things getting more and more
c...
Security : It is all about 4 KEY principles
Principle #1
Trust the source
sending the data
with a root of trust
Create uni...
Cinterion Module Services - Secure Package11
Backend Device
Cellular
security
TLS security
Applicative signature
There is ...
The ecosystem is mandating service providers and
OEM to apply security schemes
► Regulators
(UK) Keys update every 1 to 5...
Implementing device security adds operational complexity
Across-the-board complexity is often the main barrier to good sec...
Gemalto offer
The Cinterion module as an enabler of trust for your
next IoT project
Trusted Identities
Pre-issued
diversified X.509
cert...
The Cinterion module as an enabler of trust for your
next IoT project
GemaltoCinterion Module Services - Secure Package15
...
THANK YOU !
Upcoming SlideShare
Loading in …5
×

Conference Security by Design - Gemalto - Security in IoT

For those who didn't come to our conference "Security by Design : An IoT must have", or those who want to see it again, here is the presentation made by Gemalto.

Related Books

Free with a 30 day trial from Scribd

See all
  • Be the first to comment

  • Be the first to like this

Conference Security by Design - Gemalto - Security in IoT

  1. 1. How to bring Trust to IoT devices ? Guillaume Djourabtchi, Marketing Director IoT Services November, 2018
  2. 2. Who is Gemalto?
  3. 3. We enable trust in two interlocking ways… …by developing secure, innovative software WE AUTHENTICATE PEOPLE AND DEVICES WE PROTECT DATA ACROSS NETWORKS AND THE CLOUD GemaltoCinterion Module Services - Secure Package3
  4. 4. Our secure software & encryption help secure digital exchanges for billions of individuals and things 3,000 R&D ENGINEERS 88NEW PATENTS FILED IN 2017 €3bn 2017 REVENUE +2bn END USERS BENEFIT FROM OUR SOLUTIONS GemaltoCinterion Module Services - Secure Package4
  5. 5. Securing the IoT
  6. 6. Can you guess what this image represents ? A Le Bourget Airport? B Gemalto Headquarters in Paris? C Secret US military base?
  7. 7. Cinterion Module Services - Secure Package How many devices were needed to take down the most resilient DNS server ? Amazon’s North American product sales operations as a result of the infamous 2016 Dyn cyberattack, the ~211 minutes of service disruption resulted in a loss of $32 million
  8. 8. $40 100 million Cars 4 Secret Keys
  9. 9. Device and data trustworthiness are the cornerstone of the IoT Source: Gartner 2015 Why are things getting more and more connected ? $ Make financial decisions Ensure system availability Strong trust in the endpoints and the data they generate is the cornerstone of IoT GemaltoCinterion Module Services - Secure Package6
  10. 10. Security : It is all about 4 KEY principles Principle #1 Trust the source sending the data with a root of trust Create unique identities through unforgeable cryptographic material injected at the manufacturing (never passwords) Principle #3 Make sure only the authorized servers can read the data Encrypt and sign the data In all data exchanges to ensure privacy and integrity Principle #2 Ensure that the exchange of data is only among trusted entities Make use of Mutual authentication devices and back-end through PKI Principle #4 Enable security updatability to cope with evolving threats Keep firmware and software updated and trust the source of the new code GemaltoCinterion Module Services - Secure Package8
  11. 11. Cinterion Module Services - Secure Package11 Backend Device Cellular security TLS security Applicative signature There is not only 1 security but several
  12. 12. The ecosystem is mandating service providers and OEM to apply security schemes ► Regulators (UK) Keys update every 1 to 5 years End-to-end data encryption & access management Firmware updates ► Ecosystem IoT clouds providers mandate the use of certificates and thus PKI in devices connected to their platforms Source: Gartner, Forecast IoT Security Worldwide 2018 GemaltoCinterion Module Services - Secure Package9
  13. 13. Implementing device security adds operational complexity Across-the-board complexity is often the main barrier to good security practices! Leveraging public IoT clouds requires to master PKI technology and to adapt production processes Manufacturing constraints Connected objects have low computing power, face energy constrains, and use restricted data channels Device Resource Constraints Manage secure update through signed and validate software packages is mandatory to face evolving threats Outdated software GemaltoCinterion Module Services - Secure Package10
  14. 14. Gemalto offer
  15. 15. The Cinterion module as an enabler of trust for your next IoT project Trusted Identities Pre-issued diversified X.509 certificates in the module secure domain Data Protection Secure networking stack and trusted software updates IoT Clouds Secure IoT Applications GemaltoCinterion Module Services - Secure Package14
  16. 16. The Cinterion module as an enabler of trust for your next IoT project GemaltoCinterion Module Services - Secure Package15 Identity generation Identity Provisioning Lifecycle management1 2 3 Saves deploying secure production facilities and management of PKI Gives assurance there is no over- production (anti-counterfeiting) allowing to externalize the manufacturing with peace-of-mind Secure enrollment of devices into any IoT hub (Azure, AWS, Oracle and the like) automated through the service portal with same effort for small to large fleet Feature to request on demand data encryption with Gemalto DPODTM On-demand over-the-air key update • Revocation : invalidates the device identities if a security breach is suspected • Renew: to renew certificate • Update: To change cloud provider or to give access to new 3rd party
  17. 17. THANK YOU !

×