SlideShare a Scribd company logo
Enterprise IoT: Security
Turning a prototype into a viable solution
© 2017. All Rights Reserved
What is Security?
How does it apply to the Internet of Things?
© 2017. All Rights Reserved
© 2017. All Rights Reserved
Security Fact
100% Secure
from 100% of Threats
is 100% Impossible
© 2017. All Rights Reserved
Therefore, security is …
© 2017. All Rights Reserved
In the beginning … (Before 1990)
People had personal computers (PC) …
Security concern was physical theft of the PC
© 2017. All Rights Reserved
By 1990
Security evolved to a warning ...
May contain viruses
© 2017. All Rights Reserved
In the Early 1990’s
We then connected computers in a local network …
Physical theft still remained the primary concern …
© 2017. All Rights Reserved
Early 1990’s
… and yes, unscrupulous floppy disks still contained viruses!
May contain viruses
© 2017. All Rights Reserved
In the Late 1990’s
AOL introduced people to the internet …
But CxO’s feared the internet and refused employee access.
© 2017. All Rights Reserved
In the Mid 2000’s
Thanks to AOL and software sales reps,
CxO’s began seeing value in what the internet offered …
© 2017. All Rights Reserved
In the late 2000’s
IT Security profession evolved to create …
Guidelines and Standards
• SSAE16
• ISO 27001
• NIST
• FEDRAMP
• DFAR
© 2017. All Rights Reserved
Today
We now have an entire industry providing IT security as a service …
• IDS/IPS – Intrusion Detection System,
Intrusion Prevention System
• DDOS – Distributed Denial of Service
• SOC/NOC – Security Operations Center,
Network Operations Center
• SIEM – Security Information and Event
Management
© 2017. All Rights Reserved
What does this have to do with IoT?
© 2017. All Rights Reserved
Smart Devices are Everywhere
In our homes
In our offices In our factories
In our vehicles
© 2017. All Rights Reserved
Smart Devices are Everywhere
In our homes
In our offices In our factories
In our vehicles
Like PC’s in the 1990’s,
security is to prevent theft and physical harm
© 2017. All Rights Reserved
Now we want smart devices connected
© 2017. All Rights Reserved
Connecting devices introduces new risks
© 2017. All Rights Reserved
Connecting devices introduces new risks
We need new standards, tools, and services
© 2017. All Rights Reserved
Challenges
Is the device physically
secure?
Can the device encrypt
data?
Can the device password
be remotely changed?
Can the device firmware be
updated?
Can the device be
controlled remotely?
© 2017. All Rights Reserved
When people demanded internet access…
we figured it out.
We will figure out how to secure IoT devices.
Until then …
Don’t make it easy for bad things to happen
© 2017. All Rights Reserved
SoftwareInternetThings
© 2017. All Rights Reserved
What Bad Could Happen?
Unwanted access / use Unwanted change
Inability to access
Availability
For each potential threat:
1. Weigh Impact
• Safety of people
• Protection of physical assets
• Protection of data
• Compliance with regulations
• Cost of a breach
2. Assess Probability
3. Prioritize what to mitigate
4. Put appropriate controls in place
• Include risk mitigation into the design specification
© 2017. All Rights Reserved
Establish Priority
© 2017. All Rights Reserved
Thing Development: Hardware/Device
ENGINEERING CONSTRAINTS: COST | POWER | SIZE
© 2017. All Rights Reserved
Thing Development: Hardware/Device
ENGINEERING CONSTRAINTS: COST | POWER | SIZE
© 2017. All Rights Reserved
Internet: Communication Channel
DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE
LTE
3G LoRaWiFi
Sigfox TCP
CoAP MQTT
REST
Network
Mode of transporting data
Internet Protocol
Packaging data for transport
over a network
© 2017. All Rights Reserved
Internet: Communication Channel
DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE
LTE
3G LoRaWiFi
Sigfox TCP
CoAP MQTT
REST
Network
Mode of transporting data
Internet Protocol
Packaging data for transport
over a network
© 2017. All Rights Reserved
Software: Cloud Capabilities
Connect
Devices
Enable
Applications
Process
Data
ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
© 2017. All Rights Reserved
Software: Cloud Capabilities
Connect
Devices
Enable
Applications
Process
Data
ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
© 2017. All Rights Reserved
IoT System Security Controls (examples)
Device Level Application LevelConnectivity Level
• SSL certificates
• Unique device passwords
• Whitelisted IP addresses
• Whitelist phone number (SMS)
• Checksum algorithms
(delivery reliability)
• OTA firmware Updates
• SSL/TLS between platform and device
• VPN to securely send SMS text
messages using SMPP gateways
• Manage and frequently change device
passwords
• Manage firmware updates
• Standard cloud security
(DDOS, IPS/IDS, …)
• Authentication, authorization to access
the platform and applications
• Database encryption
• VPC (Virtual Private Cloud) zone
protected by a firewall (or an equivalent
concept)
© 2017. All Rights Reserved
Security – What can you do today?
Identify potential threats early and continuously
Assess Impact and Probability
Put appropriate controls in place
Apply best practices where they exist
100% secure from 100% of threats is 100% impossible, but …
Don’t make it easy for bad things to happen.
Questions?
Learn more at Bridgera.com/IOT
© 2017. All Rights Reserved
Ron Pascuzzi
Ron.Pascuzzi@bridgera.com
919-757-1941
© 2017. All Rights Reserved
Bridgera IoT
One Platform to Accelerate Your Enterprise IoT Solution
Connect
Devices
Enable
Applications
Process
Data

More Related Content

PDF
Bridgera enterprise IoT Software Solutions
PPTX
Talk To Your Things
PDF
ARM Bryan Lawrence at Smart Homes 2013 Cambridge
PDF
MILCOM 2013 Keynote Presentation: Larry Payne
PDF
IoT Panel- Cisco and Intel
PPTX
Internet of everything
DOCX
Ipx explained
PDF
Keepler | IoT Analytics & AI on Edge Computing
Bridgera enterprise IoT Software Solutions
Talk To Your Things
ARM Bryan Lawrence at Smart Homes 2013 Cambridge
MILCOM 2013 Keynote Presentation: Larry Payne
IoT Panel- Cisco and Intel
Internet of everything
Ipx explained
Keepler | IoT Analytics & AI on Edge Computing

What's hot (20)

PDF
The State of Edge Computing for IoT
PDF
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
PDF
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
PDF
Delivering the IoT ecosystem
PDF
WSO2 Platform Introduction
PDF
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
PPTX
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
PPTX
Eclipse IoT for Industry 4.0
PDF
Accelerating Digital Leadership
PPTX
IOTprotocols and overview (SSI)
PDF
Wearables and IoT Strategy
PDF
Creating an Internet of Everything
PDF
Industries On Transformation
PPTX
IoT Platform with MQTT and Websocket
PPTX
IoT Security
PDF
PDF
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
PDF
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
PPT
Physical Security, IoT & The Role of Open Standards
PDF
Jisc cloud services: helping our members deliver their cloud strategies
The State of Edge Computing for IoT
Developing Enterprise-Level IoT Solutions by Fariz Saracevic
Sensinode ARM Smart Homes & Cleanpower 2013 Cambridge, UK via CIR www.hvm-uk.com
Delivering the IoT ecosystem
WSO2 Platform Introduction
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Cisco Connect 2018 Indonesia - Delivering intent for data center networking
Eclipse IoT for Industry 4.0
Accelerating Digital Leadership
IOTprotocols and overview (SSI)
Wearables and IoT Strategy
Creating an Internet of Everything
Industries On Transformation
IoT Platform with MQTT and Websocket
IoT Security
Final----News-Release----LEC-and-Distrix-Partner-to-Enhance-IIoT-Security----...
The Case for an Open IoT ‘Data Fabric’ for Smart Buildings Integration
Physical Security, IoT & The Role of Open Standards
Jisc cloud services: helping our members deliver their cloud strategies
Ad

Similar to Bridgera enterprise IoT security (20)

PDF
Cybersecurity in the Age of IoT - Skillmine
PPTX
Iot(security)
PPTX
Security Testing for IoT Systems
PDF
The Internet of Things: the 4 security dimensions of smart devices
PDF
[TestWarez 2017] Securing the Internet of Things
PDF
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
PDF
An Internet of Things Reference Architecture
PPTX
All The Things: Security, Privacy & Safety in a World of Connected Devices
PPTX
IoT security
PDF
Drobics trustworthy io-t-for-industrial-applications
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PDF
How Secure are you Around “IoT”_.pdf
PDF
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
PDF
Internet of things (IoT) Architecture Security Analysis
PDF
Io t security defense in depth charles li v1 20180425c
PPTX
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
PDF
Protecting your home and office in the era of IoT
PPTX
Security aspect of IOT.pptx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
DOCX
Final Research Project - Securing IoT Devices What are the Challe.docx
Cybersecurity in the Age of IoT - Skillmine
Iot(security)
Security Testing for IoT Systems
The Internet of Things: the 4 security dimensions of smart devices
[TestWarez 2017] Securing the Internet of Things
CIS 2015 How to secure the Internet of Things? Hannes Tschofenig
An Internet of Things Reference Architecture
All The Things: Security, Privacy & Safety in a World of Connected Devices
IoT security
Drobics trustworthy io-t-for-industrial-applications
IoT Security: Debunking the "We Aren't THAT Connected" Myth
How Secure are you Around “IoT”_.pdf
逃避可恥還沒有用- 你不可不知的物聯網安全問題與挑戰(Ashley Shen & Belinda Lai)
Internet of things (IoT) Architecture Security Analysis
Io t security defense in depth charles li v1 20180425c
Thought Leadership Webinar - Internet of things (IoT): The Next Cyber Securit...
Protecting your home and office in the era of IoT
Security aspect of IOT.pptx
Final Research Project - Securing IoT Devices What are the Challe.docx
Final Research Project - Securing IoT Devices What are the Challe.docx
Ad

Recently uploaded (20)

PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
Understanding_Digital_Forensics_Presentation.pptx
Unlocking AI with Model Context Protocol (MCP)
NewMind AI Weekly Chronicles - August'25 Week I
Reach Out and Touch Someone: Haptics and Empathic Computing
Dropbox Q2 2025 Financial Results & Investor Presentation

Bridgera enterprise IoT security

  • 1. Enterprise IoT: Security Turning a prototype into a viable solution © 2017. All Rights Reserved
  • 2. What is Security? How does it apply to the Internet of Things? © 2017. All Rights Reserved
  • 3. © 2017. All Rights Reserved Security Fact 100% Secure from 100% of Threats is 100% Impossible
  • 4. © 2017. All Rights Reserved Therefore, security is …
  • 5. © 2017. All Rights Reserved In the beginning … (Before 1990) People had personal computers (PC) … Security concern was physical theft of the PC
  • 6. © 2017. All Rights Reserved By 1990 Security evolved to a warning ... May contain viruses
  • 7. © 2017. All Rights Reserved In the Early 1990’s We then connected computers in a local network … Physical theft still remained the primary concern …
  • 8. © 2017. All Rights Reserved Early 1990’s … and yes, unscrupulous floppy disks still contained viruses! May contain viruses
  • 9. © 2017. All Rights Reserved In the Late 1990’s AOL introduced people to the internet … But CxO’s feared the internet and refused employee access.
  • 10. © 2017. All Rights Reserved In the Mid 2000’s Thanks to AOL and software sales reps, CxO’s began seeing value in what the internet offered …
  • 11. © 2017. All Rights Reserved In the late 2000’s IT Security profession evolved to create … Guidelines and Standards • SSAE16 • ISO 27001 • NIST • FEDRAMP • DFAR
  • 12. © 2017. All Rights Reserved Today We now have an entire industry providing IT security as a service … • IDS/IPS – Intrusion Detection System, Intrusion Prevention System • DDOS – Distributed Denial of Service • SOC/NOC – Security Operations Center, Network Operations Center • SIEM – Security Information and Event Management
  • 13. © 2017. All Rights Reserved What does this have to do with IoT?
  • 14. © 2017. All Rights Reserved Smart Devices are Everywhere In our homes In our offices In our factories In our vehicles
  • 15. © 2017. All Rights Reserved Smart Devices are Everywhere In our homes In our offices In our factories In our vehicles Like PC’s in the 1990’s, security is to prevent theft and physical harm
  • 16. © 2017. All Rights Reserved Now we want smart devices connected
  • 17. © 2017. All Rights Reserved Connecting devices introduces new risks
  • 18. © 2017. All Rights Reserved Connecting devices introduces new risks We need new standards, tools, and services
  • 19. © 2017. All Rights Reserved Challenges Is the device physically secure? Can the device encrypt data? Can the device password be remotely changed? Can the device firmware be updated? Can the device be controlled remotely?
  • 20. © 2017. All Rights Reserved When people demanded internet access… we figured it out. We will figure out how to secure IoT devices. Until then …
  • 21. Don’t make it easy for bad things to happen © 2017. All Rights Reserved SoftwareInternetThings
  • 22. © 2017. All Rights Reserved What Bad Could Happen? Unwanted access / use Unwanted change Inability to access Availability
  • 23. For each potential threat: 1. Weigh Impact • Safety of people • Protection of physical assets • Protection of data • Compliance with regulations • Cost of a breach 2. Assess Probability 3. Prioritize what to mitigate 4. Put appropriate controls in place • Include risk mitigation into the design specification © 2017. All Rights Reserved Establish Priority
  • 24. © 2017. All Rights Reserved Thing Development: Hardware/Device ENGINEERING CONSTRAINTS: COST | POWER | SIZE
  • 25. © 2017. All Rights Reserved Thing Development: Hardware/Device ENGINEERING CONSTRAINTS: COST | POWER | SIZE
  • 26. © 2017. All Rights Reserved Internet: Communication Channel DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE LTE 3G LoRaWiFi Sigfox TCP CoAP MQTT REST Network Mode of transporting data Internet Protocol Packaging data for transport over a network
  • 27. © 2017. All Rights Reserved Internet: Communication Channel DRIVEN BY DEVICE CONSTRAINTS: COST | POWER | SIZE + DISTANCE LTE 3G LoRaWiFi Sigfox TCP CoAP MQTT REST Network Mode of transporting data Internet Protocol Packaging data for transport over a network
  • 28. © 2017. All Rights Reserved Software: Cloud Capabilities Connect Devices Enable Applications Process Data ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
  • 29. © 2017. All Rights Reserved Software: Cloud Capabilities Connect Devices Enable Applications Process Data ENGINEERING CONSTRAINTS: DATA FLOW (3V’S) | RELIABILITY | PROCESSING
  • 30. © 2017. All Rights Reserved IoT System Security Controls (examples) Device Level Application LevelConnectivity Level • SSL certificates • Unique device passwords • Whitelisted IP addresses • Whitelist phone number (SMS) • Checksum algorithms (delivery reliability) • OTA firmware Updates • SSL/TLS between platform and device • VPN to securely send SMS text messages using SMPP gateways • Manage and frequently change device passwords • Manage firmware updates • Standard cloud security (DDOS, IPS/IDS, …) • Authentication, authorization to access the platform and applications • Database encryption • VPC (Virtual Private Cloud) zone protected by a firewall (or an equivalent concept)
  • 31. © 2017. All Rights Reserved Security – What can you do today? Identify potential threats early and continuously Assess Impact and Probability Put appropriate controls in place Apply best practices where they exist 100% secure from 100% of threats is 100% impossible, but … Don’t make it easy for bad things to happen.
  • 32. Questions? Learn more at Bridgera.com/IOT © 2017. All Rights Reserved Ron Pascuzzi Ron.Pascuzzi@bridgera.com 919-757-1941
  • 33. © 2017. All Rights Reserved Bridgera IoT One Platform to Accelerate Your Enterprise IoT Solution Connect Devices Enable Applications Process Data