Internet Of Things (IoT) Security: Understanding The Challenges While Mitigating the Risks Demetris Booth, APJC Lead – Product Management & Product Marketing Agenda • Overview & Benefits • Security Challenges • Mitigating Challenges • • High Level View Technical View • Bringing It All Together Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public IoT Is Here Now – and Growing! 50 Billion “Smart Objects” 40 30 20 10 Billions of Devices 50 Inflection point Adoption rate of digital infrastructure: 5X faster than electricity and telephony 25 12.5 World Population 6.8 0 7.2 7.6 Timeline 2010 Presentation_ID 2015 Cisco and/or its affiliates. All rights reserved. 2020 Cisco Public Relation to Internet of Everything (IoE) Networked Connection of People, Process, Data, Things Process People Connecting people in more relevant, valuable ways Delivering the right information to the right person (or machine) at the right time IoE Things Data Physical devices and objects connected to the Internet and each other for intelligent decision making Leveraging data into more useful information for decision making IoE: Connecting the Unconnected to Generate Business Value Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public IoT Delivers Extraordinary Benefits What Comprises IoT Networks? Information Technology (IT) Presentation_ID Operational Technology (OT) 7 Cisco and/or its affiliates. All rights reserved. Smart Objects Cisco Public Smart City Reduced congestion Improved emergency services response times Lower fuel usage Increased efficiency Power and cost savings New revenue opportunities Efficient service delivery Increased revenues Enhanced environmental monitoring capabilities Safety, financial, and environmental benefits Presentation_ID 8 Cisco and/or its affiliates. All rights reserved. Cisco Public The Connected Car Online entertainment Mapping, dynamic re-routing, safety and security Transform “data” to “actionable intelligence” Enable proactive maintenance Collision avoidance Fuel efficiency Reduced congestion Increased efficiency Safety (hazard avoidance) Actionable intelligence, enhanced comfort, unprecedented convenience Presentation_ID 9 Cisco and/or its affiliates. All rights reserved. Cisco Public IoT Transforms Data into Wisdom More Important Wisdom (Scenario Planning) Knowledge Information 01010100101010101010101010101 01010101010001010100101010101 01110101010101010101 Data Less Important Big Data Becomes Open Data for Customers, Consumers to Use Presentation_ID 10 Cisco and/or its affiliates. All rights reserved. Cisco Public … but it also adds complexity. New Business Models Partner Ecosystem Applications Application Interfaces Unified Platform Infrastructure Interfaces Infrastructure Presentation_ID 11 Cisco and/or its affiliates. All rights reserved. Cisco Public … but it also adds complexity. APPLICATION AND BUSINESS INNOVATION New Business Models Partner Ecosystem Data Integration Big Data Analytics Applications Control Systems Application Interfaces Unified Platform PLATFORM APPLICATION ENABLEMENT Infrastructure Interfaces APPLICATION CENTRIC INFRASTRUCTURE Infrastructure Device and Sensor Innovation Presentation_ID 12 Cisco and/or its affiliates. All rights reserved. Cisco Public Application Integration The Flip Side: Major Security Challenges We’ve Created the Perfect Storm… > Device Explosion + > Connectivity Explosion + > Industrialization of Hacking + = > State Cyber Programs + > “Hactivism” Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Security Challenges Traditional Security Challenges Increased Attack Surface Information Breach Data Privacy Presentation_ID Cisco and/or its affiliates. All rights reserved. Smart Objects 6 130 Devices Per Person Sensors Per Person Cisco Public IoT Security Challenges Superior Visibility Granular Control Advanced Threat Protection Actionable Intelligence Automated Decisions Advanced video analytics, remote management, and multi-site event correlation Differentiated policy enforcement across the extended network Comprehensive cyber security threat detection and mitigation Internetworked security solutions for superior intelligence and rapid response Machine-to-machine enabled security control with no human intervention required Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public IoT Expands Security Needs New Applications Threat Diversity Impact and Risk Remediation Protocols Compliance and Regulation Converged, Managed Network Resilience at Scale Security Distributed Intelligence IoT CONNECTIVITY Presentation_ID 17 Cisco and/or its affiliates. All rights reserved. Cisco Public Application Enablement Mitigating The Security Risk Across the Extended Network – The 20,000 FT View IT and OT are Inherently Different IT OT • Connectivity: “Any-to-Any” • Connectivity: Hierarchical • Network Posture: Confidentiality, Integrity, Availability (CIA) • Network Posture: Availability, Integrity, Confidentiality (AIC) • Security Solutions: Cybersecurity; Data Protection • Security Solutions: Physical Access Control; Safety • Response to Attacks: Quarantine/Shutdown to Mitigate • Response to Attacks: Non-stop Operations/Mission Critical – Never Stop, Even if Breached Presentation_ID 19 Cisco and/or its affiliates. All rights reserved. Cisco Public OT Config Mgmt Supervisory Automation & Control Presentation_ID 20 Cisco and/or its affiliates. All rights reserved. Secure Access Demilitarised Zone Identity Services DMZ Application Control Enterprise Network Network Security IT Cloud IT/OT Converged Security Model Cisco Public The Secure IoT Architecture – IT Plus OT! APPLICATION AND BUSINESS INNOVATION New Business Models Partner Ecosystem Data Integration Services Big Data Analytics Applications Control Systems Application Integration Cloud-based Threat Analysis / Protection Application Interfaces Network and Perimeter Security Application Enablement Platform Security Physical Security Infrastructure Interfaces Application Centric Infrastructure End-to-End Data Encryption Device and Sensor Innovation Presentation_ID 21 Cisco and/or its affiliates. All rights reserved. Device-level Security / Anti-tampering Cisco Public Cisco Security Model Attack Continuum BEFORE DURING AFTER Control Enforce Harden Detect Block Defend Scope Contain Remediate Network Endpoint Mobile Point in time Presentation_ID Cisco and/or its affiliates. All rights reserved. Virtual Cloud Continuous Cisco Public Security/Attack Continuum - IT BEFORE DURING AFTER Control Enforce Harden Detect Block Defend Scope Contain Remediate Cloud-based threat detection and prevention; policy enforcement via firewall, VPN and identity services Quarantine based on real-time analysis and actionable security intelligence from IPS and WSA Presentation_ID Cisco and/or its affiliates. All rights reserved. Remediate using advanced protection and network behavioral analysis Cisco Public Security/Attack Continuum - OT BEFORE DURING AFTER Control Enforce Harden Detect Analyze Respond Disable Contain Remove Networked cyber and physical security solutions with OT-specific policies Response based on real-time analysis and actionable security intelligence Presentation_ID Cisco and/or its affiliates. All rights reserved. Lockdown physical spaces or disable access to critical infrastructure Cisco Public Mitigating The Security Risk Across The Extended Network – Technical View Exposure In IoT Networks MITM • Sniff traffic • Modify data • Impersonation MITM • • • • Compromise Sniff traffic Modify data Impersonation Service disruption • Unauthorized use • Malware infection Compromise Compromise Hack Device • • • • Unauthorized access Device tampering Service disruption Sniff traffic • Unauthorized device • Device tampering • Malware infection Compromise • Unauthorized access • Device tampering • Service disruption • Sniff traffic • Unauthorized access • Device tampering • Service disruption • Sniff traffic management IoT device Presentation_ID aggregation core Cisco and/or its affiliates. All rights reserved. dataCisco center Public wan / internet [vpn] Required Security Model for IoT Attack Continuum BEFORE Before Control Discover Enforce Harden Enforce Harden Network as an Enforcer Presentation_ID DURING During Detect AFTER After Scope Block Defend Scope Contain Remediate Contain Remediate Network as a Sensor Network as a Mitigation Accelerator Cisco and/or its affiliates. All rights reserved. Cisco Public 27 BEFORE an attack management DURING an attack AFTER an attack www NF analyzer policy server (ISE) web security email security firewall ips advanced malware protection IoT device Presentation_ID aggregation core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] BEFORE an attack BEFORE an attack management Profiling • • • ISE builds device database by MAC address Profile with SNMP (LLDP), DHCP, NMAP, NetFlow drives MAC-based access policy ISE manages policy www NF analyzer policy server (ISE) web security Benefit • • • email security firewall ips advanced malware protection Visibility and access control MAC linked with device ID and location Custom access by device profile MAB IoT device Presentation_ID aggregation core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] BEFORE an attack management 802.1x • • Authenticates device before activating access ISE manages policy www NF analyzer policy server (ISE) web security email security Benefit • • • Operational simplicity and control Dynamic device authentication Single policy management firewall ips advanced malware protection IoT device Presentation_ID aggregation 802.1x 802.1x 802.1x core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] BEFORE an attack management SGT / SGACL • • • Tags traffic based on device policy Enforces access control based on tag ISE manages policy www NF analyzer policy server (ISE) web security email security Benefit • • • Operational simplicity and speed Dynamic, topology-independent enforcement Single access control policy firewall ips advanced malware protection SGT IoT device Presentation_ID aggregation SGT SGT SGT core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] DURING an attack DURING an attack management NetFlow Analyzer • • • Collect full NetFlow across network Detect behavioral anomalies ISE provides context www NF analyzer policy server (ISE) web security email security Benefit • • • • Full threat visibility Detect threats in any part of network Detect access abuse Detect attacks missed by security systems firewall ips advanced malware protection NF IoT device Presentation_ID aggregation NF NF NF core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] DURING an attack management IPS / AMP • Monitor traffic and file threats Benefit • • www NF analyzer policy server (ISE) web security email security Integrated advanced threat detection Detects advanced attacks and malware firewall ips advanced malware protection IoT device Presentation_ID aggregation core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] DURING an attack management WSA / ESA • • Reputation-based web threat blocking Reputation-based email threat blocking www NF analyzer policy server (ISE) web security email security Benefit • • Block advanced web / email threats Intelligence-driven threat detection IoT device Presentation_ID aggregation firewall ips advanced malware protection core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] AFTER an attack AFTER an attack management NF Analyzer • • • Record 90 days of communications activity Scope extent of breach Report policy and compliance www NF analyzer policy server (ISE) web security Benefit • • • email security firewall ips advanced malware protection Full Accountability Map threat trajectory Evidence-based auditing NF IoT device Presentation_ID aggregation NF NF NF core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] AFTER an attack management IPS / AMP • • • Retrospective analysis of threats Contain infected devices and files ISE provides quarantine www NF analyzer policy server (ISE) web security email security Benefit • • • Fast threat scoping and remediation Trace and eliminate infections with the click of a button Map threat trajectory IoT device Presentation_ID aggregation firewall ips advanced malware protection core Cisco and/or its affiliates. All rights reserved. data center Cisco Public wan / internet [vpn] Continuous IoT Threat Protection Advanced Malware Protection For IoT AMP for Networks AMP for Endpoints Detection Services & Big Data analytics ✖ ✔ On-Prem SSL:443 | 32137 proxy FireSIGHT Management Center SaaS Manager Heartbeat: 80 # FireSIGHT/ASA Sensor # The catch? Detection is “in the cloud”. AMP Malware license “On-prem” addresses cloud objections. Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public 44 Sophisticated and Continuous Protection Point-in-Time Protection Retrospective Security Breadth and Control points: WWW Email Network Endpoints IPS Web Devices Telemetry Stream One-to-One Fuzzy Signature Finger-printing Machine Learning Advanced Analytics Dynamic Analysis File Fingerprint and Metadata Continuous feed 1000111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 0001110 1001 1101 1110011 0110011 101000 0110 00 0111000 111010011 101 1100001 110 0100001100001 1100 0111010011101 1100001110001110 1001 1101 1110011 0110011 101000 0110 00 File and Network I/O Process Information File Reputation & Sandboxing Presentation_ID Cisco and/or its affiliates. All rights reserved. Continuous Analysis Cisco Public Analyse The IoT Threat! 1. Submission Analyst (portal) or system (API) submits suspicious sample to Threat Grid. 4. Enriched Content Integration Actionable intel generated that can be packaged and integrated in to a variety of existing systems 2. Proprietary Analysis An automated engine observes, deconstructs, and analyzes using multiple techniques. 3. Correlation at Unprecedented Scale System correlates sample result with millions of other samples / billions of artifacts. Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public 100I II0I III00II 0II00II I0I000 0II0 00 Endpoints Web II II0000I II0 Advanced Industry Disclosures WWW Email I00I II0I III00II 0II00II 101000 0110 00 I00I II0I III0011 0110011 101000 0110 00 Research Response 1100001110001III0 110000III000III0 1100001 110 101000 0II0 00 0III000 III0I00II Threat I00I III0I III00II 0II00II I0I000 0110 00 Intelligence 10I000 0II0 00 0III000 II1010011 101 Networks IPS Devices Outreach Activities Dynamic Analysis 100 TB Intelligence Threat Centric Detection Content 1.6M sensors 180,000+ Files per Day 150 million+ endpoints 1B SBRS Queries per Day Sandbox 35% email world wide 3.6PB Monthly though CWS VDB SEU/SRU Security Intelligence FireAMP™, 3+ million Email & Web Reputation 13B web req Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public Bringing It All Together Network-Wide Security with Differential Applications Security Activity IT • • Secure Access • Before • Role-based access for individuals and groups VPN/remote access for most systems throughout the network Complex passwords with lockout policies Tags traffic based on device policy Enforces access control based on tag • • • • • Role-based access to few individuals VPN to few systems and users Badge readers/integrated sensors Simplified passwords (except for the most critical systems) Enhanced segmentation for required groups only Dynamic, topologyindependent enforcement Security Group Tagging • Intrusion Prevention/Detection IPS – enforces policies IDS – sends security alert only Threat Mitigation Quarantine affected system Analysis of the threat to determine appropriate action Data Integrity and Confidentiality Data Loss Prevention (DLP) Combined physical and cybersecurity access controls During Network-wide Policy Enforcement After OT Differentiated actions based on value, function, and location of the device Retrospective Security Policies Presentation_ID • Cisco and/or its affiliates. All rights reserved. Centralised remediation and adaptation Cisco Public IoT Can Actually Increase Security Posture Network of Security Devices – Cyber Security Firewall, IDS – Physical Security NG Firewall IP cameras, badge readers, analytics IDS Security Intelligence Actionable Security Intelligence – Automated / M2M – Human Response Video+Analytics Remote Capabilities Secure Access – Configuration and Management – Collaboration Between Groups Presentation_ID 50 Cisco and/or its affiliates. All rights reserved. Cisco Public Conclusion: Securely Embrace IoT! New challenges require new thinking! – – – – avoid operational siloes networking and convergence are key a sound security solution is integrated throughout build for the future Security must be pervasive – inside and outside the network – device- and data-agnostic – proactive and intelligent Intelligence, not data – convergence, plus analytics – speed is essential for real-time decisions Presentation_ID 52 Cisco and/or its affiliates. All rights reserved. Cisco Public