Iot WP Iot Security 1
Iot WP Iot Security 1
The data and information generated is confined to the users and Confidentiality
systems that are authorised to access it;
Unauthorised access to devices, applications and data is
The data and information generated can be trusted; prevented
The service continuity is maintained
Overall cybersecurity strategy must aim to protect 3 core pillars that
underpin connected devices and services: Integrity
Confidentiality; Data stored, received or transmitted by devices and
application is not altered
Integrity;
Availability.
Ensuring that the objectives of the 3 security pillars are met is a Availability
question of proper security by design. By giving a unique and
private digital ID to a device and implementing Device and Device communications and management interfaces are
not disrupted; nominal service is available
Authentication management solutions, based on encryption
techniques, companies can prevent unauthorised access to data,
devices, and software. In turn, these controls help ensure data Source: Juniper Research
integrity and service availability.
Security by Design
IoT Layers
Communication/Data User/System
Encryption Message Verification
Authentication
3
1.6 Breaking Down the Layers: Core 1.7 Ensuring the Continuity of Trust:
Security Concepts Security by Design & Security
i. Devices Lifecycle Management
Connected devices and their users (whether human or machine) The security concepts described previously are essential to
are the heartbeats of the IoT. The value created by an IoT system establishing trust in an IoT network at any given time. Yet, what if
depends on the information generated as a result of the interaction an element inside the layers is breached, or policy demands that
between these users and/or devices. trust must be reinforced?
In addition, it is highly important that the information generated can Security by Design: This forms the basis for ensuring a continuity
be trusted. With that in mind, how can this trust be established? of trust. It is an approach rather than a specific technology that
guarantees that security is built into a project deployment from the
evice Identification & Authentication: A core element
D ground up. To choose the right level of security implementation,
of trust in IoT layers is to make sure that users and devices at this stage, devices, systems and networks should be viewed
are who they say they are. Without this verification, holistically with associated requirements and risks in mind.
cybercriminals could potentially masquerade as someone or Properly implemented, security by design will ensure that a unique,
something thought to be trusted, access unauthorised data secure digital device ID is given at the point of manufacture and
and manipulate it. High security approaches will provide a embedded at the hardware level to prevent ID theft or misuse.
unique and private digital identity at the point of manufacture Additionally, security by design demands that scalable security
in a manner that is secure and avoids potentially malicious solutions are in place to reduce ad hoc or future risk.
interference or cloning.
ecurity Lifecycle Management: Like traditional devices
S
Firmware/Code Authentication: Firmware or application and software, the principle of regular software updates and
code running on a device can potentially be manipulated by password changes should also apply to IoT devices. Firmware
cybercriminals. Therefore, ensuring that firmware and code is updating, access policy management and regular exchange
genuine is another key concept of device security. of digital access keys is fundamental to strong security policy,
Data Encryption: It is important to encrypt data during its alongside the ability to react to evolving security threats and
complete journey through an IoT ecosystem: both at rest changing regulation. If access is somehow compromised, such
as well as during data transmission, particularly when this is mechanisms will prevent future unauthorised access. Security
done wirelessly. Sending information in plaintext (raw format) lifecycle management solutions should be in place to meet these
should therefore be avoided, as it is susceptible to interception. needs, with the ability to receive alerts and remotely address large
Encryption is a fundamental tool to keep data hidden. scale device fleets, avoiding time-consuming and costly services
in the field. Implementing a scalable security infrastructure at the
ii. Gateways, Networks & Connections design stage is thus essential against approaches that could
Devices and systems in this layer of the IoT enable data to be expose IoT systems to damaging security attacks.
shared between networks, other devices and applications. They
form the fundamental bridge between one network and another,
1.8 A Complex Landscape: The Need
often connecting the consumer of the data with the source. for an IoT Security Specialist
With IoT sensors and actuators often lacking on-board storage, The diversity of devices and systems in the IoT, alongside its large
long-range communications and computing power, gateways and footprint, can create a complex environment for those seeking
other devices on the network (such as smart edge devices) can to establish and deploy security best practices. Indeed, a key
be used to provide functions such as data consolidation hubs and message to understand at this point is that there are no ‘one size
communications encryption, for further data transfer. fits all’ solutions for players in the IoT. This applies both to project
deployment, as well as the manner by which it is secured. A further
Ideally, data encryption is performed on the IoT sensor, but this is
message is that security is an ongoing process, owing to ever-
not always possible. However, devices in this layer can verify the
changing threats and requirements.
authenticity of users or other devices by virtue of the mechanisms
such as message verification and routing. Juniper recommends that the following approach be taken while
considering the right security strategy:
iii. Cloud Applications & Users
Security must be planned from the ground up, with built-in
This layer of the IoT offers the ‘heavy lifting’ computing resources of
flexibility for future requirements and updates, as part of the
the cloud. Large swathes of data can be retrospectively analysed,
security by design process.
used to improve performance of devices and systems in other
layers and provide valuable insights to the market and business.
Devices’ identity and authenticity must be made secure and
Applications that make use of IoT data are typically deployed in reliable, via the security lifecycle management process.
this layer. Code, firmware and users or systems should be authenticated to
ensure that they are of genuine origin.
It is therefore important that applications are verified as genuine
in a similar fashion as at the device layer. Additionally, users of Data should be encrypted where possible to prevent theft, or
platforms, systems and applications must be verified as genuine to tampering.
prevent any data manipulation or system misuse. Achieving these goals requires a thorough understanding of security
best practices. Companies with a long history of cybersecurity
Data encryption must be seen as standard in this layer. implementation, as well as dedicated teams addressing design and
approach, will undoubtedly already be familiar with the requirements.
4
On the Small & Medium-sized Enterprise side, or for corporate Figure 4: IoT Decision-Maker Security Approaches Surveys
players only beginning to undergo their digital transformation, this
may not always be the case. For these companies, the services 60%
50%
of a security specialist are recommended. This is for the simple
40%
reason that a third party specialist will already be familiar with
30%
best practice requirements, as well as concepts such as security 20%
by design. A specialist can ensure that an appropriate solution is 10%
deployed from the outset, thereby reducing time, and TCO (Total 0%
Cost of Ownership). Yes, we have Yes, we strive No, but it No, and it Don’t know
adopted towards should be should not be
With the importance of security by design in mind, the results of a ‘security ‘security by
The Thales Survey are revealing: only 50% of IoT manufacturing, by design’ design’
approach Q: Is security a consideration when
software or services players have adopted such an approach, with your organization designs its IoT
42% of respondents striving towards that goal. Undoubtedly, these product/offering?
organisations would benefit from additional security expertise.
Source: Thales/Vanson Bourne Survery
2. Protecting My Infrastructure:
Strategies for Successful IoT
Security Deployment
2.1 Security Solution Overview With that in mind, this section will provide an overview of security
solutions in terms of the security pillars they aim to protect.
There are several solutions available to secure devices, networks
and software systems. These focus on establishing a foundation of i. Confidentiality
trust for future data exchange through device authentication, data Unauthorised access to devices, applications or data is often due
confidentiality as well as data integrity.
to poor device security, credential theft or ‘zero day’ (previously
As we noted previously, the objectives of security solutions are to undiscovered) vulnerabilities in application code or firmware.
protect Confidentiality, Integrity and Availability. Key tools are tabulated below, with expanded commentary for
more technical aspects.
Protects Position in
Security Tool Function Notes
Against IoT Layers
HSM (Hardware Security Secure key management and Cloud & Cloud/server enabler for
Theft of device ID
Module) crypto-processing Applications lifecycle management
Platform to provision,
Lifecycle Management Regular renewal of credentials, Theft of device ID,
All decommission and update
Platform firmware and policies unauthorised device access
devices
5
Cryptographic Authentication ensures that data exchange The Lifecycle Management Platform brings the SE/TEE and
and handling is enabled only to authorised entities. This the HSM together, with the platform used to issue or revoke
process uses cryptography based on secret keys and digital credentials and regularly update software and firmware. This
certificates to ensure that exchanged data is coming from, process effectively time-limits any potential attacks or undetected
and delivered to, trusted entities. breaches and restores a secure state. This is also key for devices
which operate in the field for many years and need to update
A SE (Secure Element) is a hardware component soldered
security elements regularly, to mitigate new cyber threats.
onto the device. Its primary function is to act as an enclave
for sensitive data storage (such as the device access key) Data Encryption consists of encoding a message, to make it
and encryption functions, that is unreachable by the main unreadable to any entity who would not have access to the
operating system on the device. It is a key part of ensuring decoding key. The data itself as well as the communications
a device’s identity protection and only authorised access to channel are ideally encrypted, although for power-constraint
applications. As a tamper-resistant component, it offers a IoT devices, encryption is typically performed by a gateway or
very high level of security. smart edge device.
A TEE (Trusted Execution Environment) is used in place
User & Developer Education is not a security solution per
of, or in conjunction with, a SE, depending on the level of se, but should be viewed as important in conjunction to the
business risk. Here, a hardware and software component security solution. In short, user education enables employees
are combined to separate code execution from the main to understand that, for example, passwords should not be
operating system in a similar manner to the SE. In low-risk sent in plaintext over the company email system. Meanwhile
scenarios, neither an SE nor a TEE will be used, with the data it might teach employees to recognise signs of social
protection applied using a software-only approach. engineering attacks designed to make employees unwittingly
supply cybercriminals with sensitive information.
HSM (Hardware Security Modules) are specialised tamper-
resistant units, adding an extra protection layer to safeguard ii. Integrity
centrally stored device access keys. They enable remote security The protection of data integrity is very much linked to the notion
lifecycle management, protecting the most sensitive keys from of confidentiality. That is to say, if the device or system is well
compromise (government infrastructures, energy or automotive protected, it will be very difficult for an attacker to access the data
assets etc.) produced by that device or system, and then to manipulate it.
Protects Position in
Security Tool Function
Against IoT Layers
MAC (Message
Proves origin and integrity of a message Data alteration/tampering All
Authentication Code)
6
externally, but propagates internally). Naturally the threat of architectures), which must be dealt with as a concern alongside
power outages, natural disasters and so on raises the question of security. High Availability systems should also be in place to support
failover and disaster recovery mechanisms (back-ups, redundant exceptionally high traffic peaks and prevent service disruption.
Protects Position in
Security Tool Function Notes
Against IoT Layers
Gateways,
IDS (Intrusion Detection Attempts to detect unusual activity Malware and malicious network Events flagged,
Networks &
System) associated with malicious entities activity not prevented
Connections
2.2 What Level of Security do I Need? devices, systems, users and customers in both current and future
IoT deployments. Each risk must be evaluated in terms of; the
The first thing readers must understand before deployment of a security pillar impacted, its likelihood of occurring, the severity
security solution is that cybersecurity is an exercise in risk mitigation. of any breach and if there are solutions in place to mitigate the
Cybercriminals, given enough time, determination and financial impact of said risk. The resultant risk scores will enable IoT device
backing, will penetrate even the best protected mechanism. It is manufacturers and service providers to appropriately rank threats
important that the cybersecurity solution in place is one that combines and their associated risks; some risks may be acceptable and thus
several layers of security mechanisms and that is appropriate to the require no action. Others may be a risk that should be allocated
level of risk posed to the business. resources to mitigate, with the possibility of diverting resources to
more critical issues should the need arise. Finally, there will be risks
In practice, this means that the first step for any business is to that should be considered as critical in nature and thus will require
undergo a risk assessment, taking into account the profile of immediate action.
Table 4: What Level of Security Do I Need? IoT Risk Score Modelling Exemplar (Non Exhaustive): Devices
Probability
Mitigation Threat
Threat Threat Class Impact of Threat Mitigation Risk Score
Measures Severity
Occurrence
7
The risk score is the calculation between the variables a, b and m T hreat severity ranges from insignificant (1), minor (2), moderate
as previously shown. Typically each variable is assigned a score (3), major (4) and catastrophic (5);
from 1 to 5, where:
itigation ranges from negligible impact (1), low impact (2),
M
T hreat probability ranges from rare (1), unlikely (2), possible (3), moderate impact (3), major impact (4), highest impact (5).
likely (4) and almost certain (5);
3. Examining
The True Cost of IoT Security
It should be clear from the outset that a properly implemented isruption: what is the cost and associated revenue loss of a
D
security solution is not something that can be achieved at very low service falling offline?
cost.
ata theft: how valuable is the data and what is the cost of lost
D
This, combined with the fact that cybersecurity in companies will be or compromised information? Are there regulatory implications?
defined as a cost centre, means that there has, in many instances,
been an inertia by at-risk companies to spend appropriate sums nauthorised device access: what is the cost of implementing
U
on ensuring that their security is robust. Indeed, The Thales Survey new access credentials in the field as a result of malicious
revealed that 44% of respondents felt that the cost of cybersecurity activity?
implementation is high and created a barrier. rand damage: what is the cost of the customer base losing
B
brand loyalty, and the cost of acquiring new customers as a
3.1 The Cost of Failure result of a tainted brand?
That said, it should also be clear that cybersecurity is an investment
Costs to the business can be very high. As an example, the
that serves to protect the business. Consider, for a moment, the
‘NotPetya’ malware that emerged in 2017 affected Danish
potential impacts of a cybersecurity breach:
8
shipping company Maersk, with the result that service disruption 3.2 In-house or Cybersecurity
and delays in its operations lasted several weeks. The company
estimates that the total financial damage from the attack is worth Specialist? Modelling
approximately $200-$300 million. Implementation & Operational Costs
Thales’s Breach Level Index, which tracks annual reported Security deployment can either be handled as a ‘DIY’ (do-it-yourself)
security breaches, found that over 2.6 billion records (database undertaking or in partnership with an experienced security service
entries) were compromised in 2017. Juniper has calculated that provider. Which route a company decides to take will typically
the average cost attached to a compromised record was worth be influenced by perceived cost, in conjunction with the level
approximately $250 in 2017, equating to over $650 billion in of perceived risk to the business. Naturally, the level of in-house
losses attributable to data compromises. expertise is a key consideration, although a team’s ability to
implement an appropriate solution should be factored into the risk
Interestingly, Thales’s Index highlights that only 4% of recorded
assessment. Clearly, then, professionally gauging business risk is to
breaches contained data that was secured by encryption and
be advised for all companies.
thus rendered useless to an attacker. Previously highlighted best
practices cannot therefore be emphasised enough. When comparing DIY or security specialist routes, one must
examine how cost, and risk, will develop in the long run.
Loss of
Ransomware
Revenue
Costs Costs
9
4. Conclusion:
IoT is a Critical Security Investment
This study has examined the key challenges involved in IoT
The costs of failing to protect one’s infrastructure, as we have
security, as well as the considerations and strategic approach for seen, can be high. Certainly, the side effects are not limited to
best-practice implementation. Thales & Juniper’s key findings are direct revenue loss; eroded trust, in turn allowing a competitor
highlighted below. to increase their market share, can be expected to have a long-
term negative impact on the business.
As we have seen, IoT security can be complex, particularly for
those without considerable experience in the sector. Assessing
Meanwhile, having a reputation for operating a secure business
business risk, and sourcing security products that meet both short- is, undoubtedly, a key differentiation point where the IoT is
and long-term business requirements is no easy task given that concerned. Even now, savvy IoT device manufacturers are
each business has unique needs. It is clear that customers stand searching out secure partners, suppliers and service providers.
to benefit from integrated security service provider expertise in The Thales Survey revealed that 92% of respondents have seen
terms of long-term costs and fewer potential points of failure in an increase in sales owing IoT security measures, highlighting
high- to medium-risk IoT deployments as a result of applying the the need to establish a chain of trust.
appropriate solution for the customer’s requirements.
The Thales Survey revealed that 57% of respondents think that
better guidance by IoT security experts is the best way to help
the manner by which they partner with other organisations for
IoT. This suggests that, once an IoT project is embarked upon,
expertise is actively sought to assess risk in the context of security
by design.
10
Notes
11
> Thalesgroup.com <
© Thales 2020. All rights reserved. Thales, the Thales logo, are trademarks and service marks of Thales and are registered in certain countries. 19 August 2020.