Brian Russell, Leidos Co-chair IoT WG © Cloud Security Alliance, 2015 Agenda • IoTWG Introduction • Security Recommendations for Early IoT Adopters • IoTWG Collaborations • IoTWG Research Roadmap • New Research Discussion • • • • IoT IAM Summary Guidance Hardware Security Analysis Cloud security for Smart Cities Version 2 IoT Guidance • How to contribute © Cloud Security Alliance, 2015 IoTWG Introduction • IoTWG originally created as an initiative within the Mobile WG • Branched out as a stand-alone WG earlier this year • Many volunteers have contributed to our guidance • Released Security Guidance for Early Adopters of the IoT • April 2015 • Received positive feedback and a request for collaboration • Now working on multiple documents that cover a range of IoT needs © Cloud Security Alliance, 2015 Security Recommendations for Early Adopters of the IoT 1. 2. 3. 4. 5. 6. 7. Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment Apply a Secure Systems Engineering approach to architecting and deploying a new IoT System Implement layered security protections to defend IoT assets Implement data protection best-practices to protect sensitive information Define lifecycle controls for IoT devices Define and implement an authentication/authorization framework for the organization’s IoT Deployments Define and implement a logging/audit framework for the organization’s IoT ecosystem © Cloud Security Alliance, 2015. Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment • Important to consider the potential privacy ramifications to all stakeholders prior to putting the system into an operational state. • Analysis should be undertaken to understand the indirect privacy ramifications of the various IoT component operations. • Examine privacy of data-in-aggregate vs. privacy of the data collected by a single system to identify potentially serious privacy concerns • Companies should reevaluate their personal data breach notification program to cover the aspects related to IoT. • In the case of the IoT, it is critically important that trade-offs between functionality, security and privacy be made early on in the design process in order to ensure that all objectives are met equally. • Stakeholders should be made aware of when data is provided to third parties, the controls used to secure it, and how and when the data is disposed of. © Cloud Security Alliance, 2015. Analyze privacy impacts to stakeholders and adopt a Privacy-by-Design approach to IoT development and deployment (continued) • If it is found that a device collects, processes or stores Privacy Protected Information (PPI), more stringent controls will be required. These controls should be a mix of policy-based and technical. For example: • Provisioning of the device may require more administrative approvals • A review by Internal Audit or Compliance should be conducted to determine if it is viable to have PPI data on IoT devices • Data stored on the device should be encrypted using sufficiently strong cryptographic algorithms • Data transmitted from/to the device should be encrypted using sufficiently strong cryptographic algorithms • Access to the device, both physical and logical, should be restricted to authorized personnel © Cloud Security Alliance, 2015. Apply a Secure Systems Engineering approach to architecting and deploying a new IoT System • Most IoT value-added capabilities will be the result of a number of diverse components working together with data traversing many networks. • As these systems are architected, it is important to define and inject security requirements into the designs to account for the implementation of security functionality prior to deployment. • Threat modeling of IoT systems during design is recommended • Includes definition of a protection architecture for the IoT © Cloud Security Alliance, 2015. Implement layered security protections to defend IoT assets • Network Layer • Increasingly, IoT devices are storing their data in the cloud for analysis. It is important to secure this data appropriately through encryption and other means. (e.g. transmitting sensitive data such as healthcare data from a patient monitoring device to cloud storage). • Application Layer • Ask for the security code review report from the vendor for any vulnerabilities that were uncovered during the development of the IoT platform and their corresponding remediation. • Device Layer • Ensure that the device’s firmware gets upgrades, updates, and patches regularly • Limit the data that is being collected or aggregated by a gateway to what is really necessary • Physical Layer • Document where devices are located. If possible, develop a graphical map showing where IoT assets are located within a building. • Human Layer • Designate a few leaders who are security evangelists. • These people should have the personality and the drive to be on the forefront of keeping the IoT initiative going successfully with the least amount of security challenges. • Update User security training © Cloud Security Alliance, 2015. Implement data protection best-practices to protect sensitive information • Protection of data in its various states requires the application of encryption. • The National Institute of Standards and Technology (NIST) provides good recommendations for algorithms, modes and key lengths to use for the protection of sensitive information. • Performance considerations are important dealing with constrained devices such as those typically seen in the IoT. • Elliptic Curve Cryptography (ECC) provides strong algorithms, yet small asymmetric key sizes, for: • Encryption key establishment (Elliptic Curve Diffie-Hellman - ECDH) • Digital signatures (Elliptic Curve Digital Signature Algorithm - ECDSA) for message/data signing operations • When paired with a symmetric algorithm such as the Advanced Encryption Standard (AES), this cryptographic suite offers strong cryptographic protections suitable for disadvantaged devices. © Cloud Security Alliance, 2015. Implement data protection best-practices to protect sensitive information (continued) • Organizations adopting IoT capabilities need to first create an enterprise data security policy that includes approaches for protection of IoT data. • begin with an explicit task of identifying data elements and associated classifications for information that the IoT devices transmit, receives or stores as part of an application • Consider the range of data protection techniques for a unique IoT system • • • • • Data At Rest (DAR) Security Data In Transit (DIT) Security Data In Use (DIU) Security Data Loss Prevention (DLP) Data Integrity and Aggregation Policies © Cloud Security Alliance, 2015. Define lifecycle controls for IoT devices 1. Plan • Consider he supporting infrastructure required for security management and monitoring. • Identify appropriate interfaces to existing security equipment, updating network architectures to segment specific IoT enclaves. 2. Deploy • Secure configurations for devices 3. Manage • Management of the edge devices themselves, the software and firmware that is loaded onto those edge devices, licenses, and the application of routine patch updates to mitigate vulnerabilities in the devices. 4. Monitor & Detect • Planning for the capture of security-relevant data and establishment of rules for identifying events or combinations of events-of-interest should be conducted early on in the engineering lifecycle 5. Remediate • Update incident response plans to incorporate new IoT systems and define the procedures for handling compromise events. 6. Dispose • Establish policies and procedures for the secure disposition of devices that have held sensitive information or key material that could provide access to sensitive information. Authentication Options within IoT Protocols Protocol M2m Authentication Options Discussion MQTT MQ Telemetry Transport username/password MQTT (m2m comms) allows for sending a username and password, although recommends that the password be no longer than 12 characters. Username and password are sent in the clear, and as such it is critical that TLS be employed when using MQTT. CoAP Constrained application protocol preSharedKey rawPublicKey certificate (web transfer protocol) CoAP supports multiple authentication options for device-to-device communication. Pair with Datagram TLS (D-TLS) for higher level confidentiality services. XMPP Extensible Messaging and Presence Protocol Multiple options available, depending on protocol XMPP supports a variety of authentication patterns via the Simple Authentication and Security Layer (SASL – RFC4422). Mechanisms include one-way anonymous as well as mutual authentication with encrypted passwords, certificates and other means implemented through the SASL abstraction layer. DDS Data distribution service X.509 Certificates (PKI) using RSA and DSA algorithms. Tokens (publish/subscribe for real-time comms) Provides endpoint authentication and key establishment to perform subsequent message data origin authentication (i.e., HMAC). Both digital certificates and various identity / authorization token types are supported. Zigbee (802.15.4) Pre-shared keys Zigbee provides both network and application level authentication (and encryption) through the use of Master key (optional), Network (mandatory) and, optionally, Application Link © keys Cloud Security Alliance, 2014. Authentication Options within IoT Protocols (continued) Protocol M2m Authentication Options Discussion Bluetooth Shared Key The Standard pairing method is automatic; the Simply pairing method includes a human-in-loop to verify (following a simple Diffie-Hellman exchange) that the two devices display the same hash of the established key. Bluetooth offers both oneway as well as mutual authentication options. Bluetooth secure simple pairing offers ‘Just works’, ‘Passkey entry’ and ‘Out of Box’ options for device-device authentication. Bluetooth-LE (low energy) Unencrypted data authenticated using Connection Signature Resolving Key (CSRK) Device Identity/Privacy is via an Identity Resolving Key (IRK) Bluetooth-LE introduces to the Bluetooth world a two-factor authentication system, the LE Secure Connections pairing model which combines – based on device capability – several of the available association models available. In addition, Elliptic-Curve Diffie Hellman is used for key exchange. HTTP/REST Basic Authentication (cleartext) (TLS methods) OAUTH2 HTTP/REST typically requires the support of the TLS protocol for authentication and confidentiality services. Although Basic Authentication (where credentials are passed in the clear) can be used under the cover of TLS, this is not a recommended practice. Instead attempt to stand up a tokenbased authentication approach such as OAUTH 2. © Cloud Security Alliance, 2015. Define and implement a logging/audit framework for the organization’s IoT ecosystem • Given the constraints of today’s IoT devices, a tailored approach to maintaining situational awareness of an IoT ecosystem must be adopted. • IoT deployments can include single sensors or consolidations of multiple sensors and other devices. • In the latter case, it may be prudent to deploy a multi-layered architecture that consists of endpoints logging to a consolidator or propagator. • This tiered architecture allows for the placement of highly constrained devices at the edge. • These devices typically have minimal capabilities and are connected via some wireless protocol. • These devices can connect back to a more capable device which is connected to the organization’s Local Area Network (LAN) and then offload collected information to another node for transport. • There will be significant opportunity in the near future to begin understanding the relationship between in-line data (operational IoT data) and security audit data. • Tuning data analytics systems to identify potential security events and feeding the filtered output to a SIEM would add significant security value. © Cloud Security Alliance, 2015. IoTWG Collaborations • The IoTWG welcomes collaborations that support relevant research • Two collaborations have been established: • Federal Communications Commission (FCC) IoT SubWG • Focused on providing recommendations on the role of the FCC and technical controls that should be implemented by the FCC to safeguard the IoT • Securing Smart Cities • Acquisition guidance for civic leaders implementing a Smart City • Led by Cesar Cerrudo (IOActive) • CSA IoTWG also provides feedback on other organization artifacts • E.g., European Union Agency for Network and Information Security (ENISA) • Cyber Security for Smart Cities • Cyber Security and Resilience for Intelligent Public Transport © Cloud Security Alliance, 2015. IoTWG Research Roadmap Initiative IoT IAM Initiative Lead Arlene Mordeno Hardware Security Analysis of IoT Devices Priya Kuber Smart Cities Cloud Security Guidance Brian Russell Publication Date Sections 10/1/2015 12/1/2015 Section Lead N/A N/A 12/1/2015 1, Introduction 2, Cloud Risks, Threats and Mitigations for Smart Cities 3. Selecting Governmental vs. Public Clouds and understanding regulations 4. Security Requirements to be covered by the Cloud Service Provider 5. Security Considerations for Big Data 6. Secure Access to Cloud Services 7. Secure Life-cycle management of users and devices through the cloud platform 8. Data Privacy Brian Russell Brian Russell Theodoros Stergiou Ayoub FIGUIGUI Brian Russell Ayoub FIGUIGUI 9. Enabling Secure on-demand access by city officials and citizens 10. Important Reference Information IoT Security Guidance for Early Adopters V2 Brian Russell 2/15/2016 1. Introduction 2. Purpose 3. IoT Threats to Individuals and Organizations 4. Example IoT Use Cases 5. Challenges to Secure IoT Deployments 6. Radio Frequency Communications and the IoT 7. IoT in the Cloud 8. Related Security Guidance for a Secure IoT 9. Recommended Security Controls Appendix A: Mapping to the CSA Cloud Controls Matrix (CCM) Appendix B: References Appendix C: IoT Operating Systems Appendix D: IoT Protocols Appendix E: CSA Software Defined Perimeter (SDP) and the IoT Ayoub FIGUIGUI Ayoub FIGUIGUI Ravi Dhungel Theodoros Stergiou Brian Russell Ayoub FIGUIGUI (can help) Ayoub FIGUIGUI New Research Discussion © Cloud Security Alliance, 2015 IoT IAM Summary Guidance • Publication should occur this week • Led by Arlene Mordeno, Edgile • Thanks to the many contributors: • • • • • • • • • • • • • • • • K S Abhiraj Amit Pick Srinivas Tatipamula Aaron Guzman Tom Donahoe Vinay Bansal Jay Douglas Sabri Khemissa raghavender d Mike Flegel Abhik Chaudhuri, Tata Consultancy Services Drew Van Duren Sudharma Thikkavarapu Shyam Sundaram Ayoub FIGUIGUI, CGI Business Consulting Chiheb chebbi • First in a series of summary guidance aimed at practical and easy to follow (checklist style) recommendations for practitioners © Cloud Security Alliance, 2015. Hardware Security Analysis for the IoT • Led by Priva Kuber, Contributers: Dr Shyam Sundaram, Ayoub FIGUIGUI, CGI Business Consulting & Aaron Guzman • Initial Survey Results of IoT Startups (Priya Kuber) focused on commercial IoT devices • • • • • • • • • Startups don’t consider information stored on a device as sensitive (any sensitive data is stored on a server), Users want to share information (sharing mentality) Startups rely heavily on the use of COTS services Most startups are using AES, although most also consider encryption to be not important Most devices don’t share a master key shared across devices; admin at server side No security applied to the development environment No threat modeling of products No secure firmware updates Investors don’t seem to care about security, much more focus on functionality • Topic headers focused on secure IoT device development • • • • • • Hardware analysis Firmware / Software update process analysis Authentication Analysis Data Security Analysis Protocol Security Analysis Interface Analysis • https://docs.google.com/document/d/1vrzIFV9j-WBs3wLfdv4wF-kCnYxTNT9eFYgp6Ebj0OA/edit?usp=sharing © Cloud Security Alliance, 2014. Guidance for Securing Cloud Services for Smart Cities • Kicking off this guidance document • Established sections and members of the WG are beginning to collaborate on the document • • • • • • • 1. Introduction 2. Cloud Risks, Threats and Mitigations for Smart Cities 3. Selecting Governmental vs. Public Clouds and understanding regulations 4. Security Requirements to be covered by the Cloud Service Provider 5. Security Considerations for Big Data 6. Secure Access to Cloud Services 7. Secure Life-cycle management of users and devices through the cloud platform • 8. Data Privacy • 9. Enabling Secure on-demand access by city officials and citizens • 10. Important Reference Information • https://docs.google.com/document/d/13RWCTqoyCUdiGK6Ao6MbLCiAw2QXUf28KmRK3Pbdfk/edit © Cloud Security Alliance, 2014. Version 2 IoT Security Guidance • This is the 2nd release of our flagship research document • Expected publication February 2016 • Significant expansion of initial document • Heavy emphasis on use cases • New section on Radio Frequency (RF) comms and the IoT • New section on IoT in the Cloud • • • • • • Amazon Web Services Microsoft Azure Cisco Fog Computing Mapping to related security guidance from other organizations Mapping to the CSA Cloud Controls Matrix Discussion on relation between CSA SDP and IoT Security © Cloud Security Alliance, 2014. ? ? ? © Cloud Security Alliance, 2015