Internet of Things Security Implications v1.4

Transcription

Internet of Things Security Implications v1.4
+
Internet of Things –
Security Implications
ect
acre
t
t
i
i
h
h
c
r
W
A
h
t
Gar
lution
o
S
y
t
i
r
ecu
Senior S
+ Agenda
n 
Introduction
n 
What Is The Internet Of Things?
n 
What Happens On The Internet Of Things?
n 
Why Should You And Your Organization Be Concerned?
n 
What Can You Do About These Concerns?
n 
Questions And Discussion
2
+
Introduction
+
4
Experience
n 
5 years U.S. Army Signal Corps Officer
n 
14 years of private organization IT employment
n 
Last 9 years dedicated to security – operations, assessment and
implementation
n 
Prior to joining SHI led a team of 20 contracted security analysts for L-3
in support of USAFCENT
n 
Agnostic Certifications – CISSP, SANS GIAC (GAWN/GCIA)
n 
Vendor Certifications – Palo Alto, Check Point, RSA and McAfee
+
What Is The Internet of Things?
5
+
6
Definition
The Internet of Things (IoT) is the
interconnection of unique and identifiable
electronic devices within either a closed
system or more often the existing public
Internet infrastructure.
+
+ Components Of The Internet Of Things
Network Infrastructure
n  Desktops, Laptops and Servers
n  Printers and Imaging Devices
n  Smart Phones, Tablets, and Handheld Scanners
n  Cloud and Virtualization
n  Tags (RFID, Manufacturing, and Shipping)
n  Building Infrastructure
n  Vehicles
n  Home Appliances and Automation
n 
At the end of the day, almost any electronic
device can be on the Internet of Things.
8
+
9
Points On The Internet Of Things
n 
Private Networks
n 
Public Networks
n 
Personal Networks
n 
Closed Networks
n 
Gateways
+ What Happens On The Internet
Of Things?
10
+
11
Interactions
n 
Device Introduction
n 
Device-to-Device Communication
n 
Trusts
n 
Data Transfer
n 
Device Departure
+ Where Is Data In The Internet Of Things?
n 
General Files
n 
Email
n 
Databases
n 
Unstructured Data
n 
Removable Media Sources
n 
Cloud
12
+ Printer and Digital Imaging Devices
n  MFDs
and publishing systems are installed
throughout employee work areas.
13
+ Medical and Manufacturing
Environments
n 
Hospitals and clinics have deployed heart rate monitors and
IV systems to track system and patient health.
n 
Manufacturing equipment installed throughout the floor with
signals to reflect bin or hopper states.
n 
Handheld scanners are leveraged by employees to inventory
pallets and update ordering systems.
14
+
15
Facilities
n 
Physical badging system authenticate employees and
partners into authorized areas.
n 
HVAC systems communicate with service providers to state
the health of the system as well as interactions with other
components.
+ Why Should You And Your
Organization Be Concerned?
16
+ Top Security Challenges Identified by
Executives
Forrester Research – Executive Spotlight 2013
17
+
18
Growth of Telecommuting
Telework Growth by Class of Worker (2000-2012)
n 
Federal employees = 421.0%
n 
State government employees = 122.1%
n 
Not-for-profit employees = 87.6%
n 
For profit employees = 70.4%
n 
Local government employees = 62.3%
GlobalWorkplaceAnalytics.com
+
19
Bring Your Own Device (BYOD)
n 
50% of employers will stop supplying devices and move to
BYOD by 2017 – currently there is more support for BYOD
tablets than smart phones
n 
15% will never offer BYOD
Gartner Report – May 2013
+
20
Mobile – Where Is It Going?
+
21
www.theconnectivist.com (Cisco Data)
+
22
Security Statistics
n 
Since 2006 lost sensitive or private records by org type:
n 
n 
n 
n 
n 
87M sensitive or private records (federal)
255M (retail)
212M (financial and insurance)
13M (educational institutions)
From 2009 – 2013, breaches on federal networks rose from
26,942 to 46,605
US CERT Report - 2014
+
23
Security Statistics (continued)
n 
In 2013, number of federal breaches by origination:
n 
n 
21% to workers violating policy
16% to lost devices
n 
12% due to hard copy handling
8% who installed malware
n 
6% enticed by phishing/social engineering
n 
US CERT Report - 2014
+ Data Types That Exist On The IoT
n 
Protected Health Information
n 
Payment Card Industry
n 
Personally Identifiable Information
n 
Intellectual Property
n 
Customer Data
n 
Business Competitive Edge
n 
Financials
24
+ Regulatory and Compliance Drivers
n 
HIPAA/HITECH (Security/Privacy Rules & Breach Notification)
n 
Affordability Care Act (ACA) & MARS-E
n 
Payment Card Industry – Data Security Standard 3.0
n 
Criminal Justice Information Services (CJIS)
n 
Internal Revenue Service (IRS) Publication 1075
n 
Internal Revenue Code (IRC) 26 U.S.C. §6103
n 
State Breach and Privacy Laws
25
+
26
Threats and Risks
n 
Inadvertent/Intentional Man-Made
n 
Default or Improperly Configured Device
n 
Access Exposure
n 
Data Exposure
n 
Inability to Report Current or Past Status – Compliance
+
27
Understanding IoT Risk
+ Challenges
n 
Lack of Resources (Triple Constraint)
n 
Lack of Management Direction – Policies
n 
Limited Operational Lifecycle – Processes
n 
Operational vs. Security Priorities
n 
Lack of Visibility
28
+
What Can You Do About These
Concerns?
29
+
30
+
31
Policies and Processes
n 
Policies – Current, Approved and Encompassing
n 
Change Board
n 
Regular Assessments – Internal or Third-Party
+
32
Data Characterization
n 
Data Types Including Risks and Sensitivity
n 
Data Owners
n 
Data Custodians
n 
Data Locations
+
33
Visibility
n 
Intrusion Detection Systems
n 
Logging and Event Correlation
n 
Vulnerability Scanning
n 
Gateways – NGFW
n 
Data Access Control
n 
Data Loss Prevention
n 
Advanced Threat Detection
+
34
Segmentation
n 
Access Control Lists
n 
Physical Separation
n 
Gateways – NGFW
n 
Intrusion Prevention Systems
n 
Network Access Control
+
35
Authentication/Secure Channels
n 
Strong Security Protocols (such as WPA2)
n 
Encrypted Channels (e.g. ssh, https, ftps, etc.)
n 
Certificates
n 
Multi-Factor Authentication
+
36
Summary
n 
Policies and Processes
n 
Data Characterization
n 
Visibility
n 
Segmentation
n 
Authentication
+
37
Seven Simple Steps
1. 
2. 
3. 
4. 
5. 
6. 
7. 
Define requirements for devices connecting to the network
Identify the types of data and risks
Develop policies for device types and the conditions for
permitting connection
Implement security controls commensurate with the risks
associated
Provision new network devices
Manage endpoint processes and controls
De-provision inactive devices
+
Questions and Discussion
38
8 Rules For Good IoT Device Management
Daughter
Use your hands on my daughter and you'll
lose yours.
2.  You make her cry, I make you cry.
1. 
Safe sex is a myth. Anything you try will be
hazardous to your health.
4.  Bring her home late, there's no next date.
3. 
If you pull into my driveway and honk, you
better be dropping off a package because
you're sure not picking anything up.
6.  No complaining while you're waiting for her.
If you're bored, change my oil.
5. 
If your pants hang off your hips, I'll gladly
secure them with my staple gun.
8.  Dates must be in crowded public places. You
want romance? Read a book.
7. 
IoT Device
IT must pro-actively introduce devices to the
network. You will regret it if you don’t.
2.  If you have a security incident, you have to
be prepared to do something about it.
3.  Safe IoT platforms are a myth. You have to be
prepared to manage them.
4.  IoT device policies/processes need to
include when a device can join or leave.
5.  Realize that mobile devices are coming to
your environment whether you want them or
not.
6.  Establish requirements and expectations for
the workforce before introducing new
technologies.
7.  Only approved configurations should be
allowed to join the network.
8.  Connections in public places are not private
and must be protected.
1.