SlideShare a Scribd company logo
Understanding and Mitigating IoT Security Hazards
Mark Benson, CTO
@markbenson
IoT Developers Conference, 7 May 2015
The IoT threat and opportunity
Recent Economist survey:
Expect their company to be
using IoT within 3 years
“IoT is our single biggest
threat AND biggest
opportunity over the next 10
years” – Brand-name fortune
500 board of directors
*Source:	
  ABI	
  Research,	
  Cisco,	
  Craig	
  Hallum	
  Es9mates	
  
0	
  
2	
  
4	
  
6	
  
8	
  
10	
  
12	
  
14	
  
16	
  
18	
  
20	
  
$0	
  	
  
$50	
  	
  
$100	
  	
  
$150	
  	
  
$200	
  	
  
$250	
  	
  
Devices	
  Billions	
  
Market	
  Size	
  Billions	
  
Big	
  Data	
  Analy4cs	
  (53%	
  
CAGR)	
  
Connected	
  Device	
  PlaCorms	
  
(33%	
  CAGR)	
  
PlaCorms	
  (33%	
  CAGR)	
  
Applica4on	
  Enablement	
  
PlaCorms	
  (32%	
  CAGR)	
  
Value	
  Added	
  Services	
  (26%	
  
CAGR)	
  
System	
  Integra4on	
  Services	
  
(24%	
  CAGR)	
  
Hardware	
  (23%	
  CAGR)	
  
Connec4vity	
  (12%	
  CAGR)	
  
Internet-­‐connected	
  devices	
  
(Cisco	
  Es4mate)	
  
95%
The Internet of Things?
More like the Internet of Attack Vectors
•  Attack surfaces are expanding rapidly
•  Physical access to systems is becoming easier
•  Consumer privacy concerns are rising
•  Consequences of a breach are becoming more severe (critical
infrastructure, brand deterioration, data privacy issues, etc.)
•  Product companies are being forced outside of their comfort zones
•  Three dimensions that make IoT security challenging…
1. Resource constraints
MAC/PHY
IP
TLS/TCP
HTTP
App Data
MAC/PHY
IP
TLS/TCP
HTTP
App Data
MAC/PHY
IP
TLS/TCP
HTTP
App Data
MAC/PHY
IP
DTLS/UDP
CoAP
Binary Data
MAC/PHY
IP
DTLS/UDP
CoAP
Binary Data
SensorMAC/PHY
Binary DataRest
Use Motion
Motion
Motion
Use
Use
Use
Rest Rest
Enterprise Web Services IoT Data Platform Gateway or Aggregator Sensing Node
Has moderate resource constraints Has severe resource constraintsDeals with resource constraintsHas virtually no resource constraints
Network
MAC/PHY
Binary Data
Network
2. Deployment topologies
Gateway IoT Cloud
Gateway On-prem
Gateway IoT CloudOn-prem
Gateway IoT CloudOn-prem Analytics
Analytics
Sensors Short RF Gateways On-prem SW Long-haul Cloud Platform Analytics platform
A. No cloud
D. Closed network
C. Multi-site
E. Comprehensive
B. Standard
Local
Display
3. Usage modes
• Device cloud registration
* Secure authentication
* Secure API transports
* Secure storage
Initialization Operation Modification Retirement1 2 3 4
• Secure flash
* OTP parts
* Secure boot
* Secure provisioning
• Secure firmware updates
* Disable test/debug interfaces
* Factory defaults fallback
* Disable test interfaces
• Secure change of ownership
• Device de-registration process
• Optionally reenable retired devices
• Secure encryption key deletion
Things	
  to	
  note	
  about	
  IoT	
  usage	
  modes	
  that	
  affect	
  security:	
  
1.  Some	
  modes	
  are	
  normal	
  and	
  standard	
  solu5ons	
  exist	
  
2.  Some	
  modes	
  are	
  new	
  and	
  standards	
  are	
  s5ll	
  emerging	
  
3.  Some	
  modes	
  are	
  becoming	
  more	
  vulnerable	
  due	
  to	
  resource	
  constraints	
  
Usage Modes
Sim
ple
NovelStandard
D
eploym
entTopologies
C
om
plex
Resource
Constraints
High
Low
The	
  IoT	
  security	
  problem	
  area	
  
A.  High	
  resource	
  constraints	
  
B.  Complex	
  deployment	
  topologies	
  
C.  Novel	
  usage	
  modes	
  
Mo’ IoT, mo’ problems
The 4th dimension: time
Now we have a Tesseract
The	
  difficulty	
  with	
  IoT	
  security	
  is	
  that	
  
the	
  landscape	
  is	
  constantly	
  changing,	
  
even	
  aYer	
  products	
  are	
  deployed	
  
	
  
Security	
  should	
  be	
  designed	
  for	
  from	
  
the	
  beginning	
  and	
  embraced	
  as	
  a	
  
journey	
  throughout	
  
	
  
It	
  starts	
  with	
  a	
  process…	
  
Modes
Topologies
Constraints
Time
The web you should be weaving
Secure processes => secure products => secure brand integrity
Security
Requirements
Planning Design Implementation Verification Validation Deployment Operations
Risk Analysis Threat Modeling
Secure Design
Practices
Security-Focused
Design Reviews
Secure Coding
Practices
Third Party Security
Audit
Security-Focused
Testing
User Testing to
Expose Weakpoints
Penetration Testing
Secure Deployment
Practices
Operational Risk
Assessment
Incident Response
Preparedness
Vulnerability
Management
Training and awareness
Information Security Management System (ISMS) policies, procedures, and compliance audits
Corporate strategy, governance, metrics, and optimization
Conclusion
Takeaways:
1.  Security processes. Have a security architecture from the beginning and evolve throughout
(constraints, topologies, modes)
2.  Technology selection. Make informed technology selections from the beginning that are
aligned with security goals for the company and product
3.  Operations planning. Plan and prepare for how you will respond if and when a security
incident occurs in the field
Checklists
•  http://owasp.org/
•  http://builditsecure.ly/
Embrace the journey
Thank you
Mark Benson
@markbenson

More Related Content

PPTX
IoT security patterns
PPTX
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
PDF
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
PPTX
Vulnerabilities in Android
PDF
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
PDF
Internet of Things Security Patterns
PPTX
Bryley - mobility in the work place
PDF
IoT/M2M Security
IoT security patterns
OWASP Poland Day 2018 - Michal Kurek - Application Security in IIoT World
IoT Device Hacking and New Direction of IoT Security Evaluation Using Common ...
Vulnerabilities in Android
A lightweight and_robust_secure_key_establishment_protocol_for_internet_of_me...
Internet of Things Security Patterns
Bryley - mobility in the work place
IoT/M2M Security

What's hot (20)

PPTX
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
PPTX
Evento 15 aprile
PDF
IoT security-arrow-roadshow #iotconfua
PDF
Io t security defense in depth charles li v1 20180425c
PDF
Ryan Wilson - ryanwilson.com - IoT Security
PPT
IoT Security – Executing an Effective Security Testing Process
PDF
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
PPTX
Iot Security, Internet of Things
PPTX
Security Testing for IoT Systems
PPTX
Safe and secure autonomous systems
PPTX
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
PPTX
CyberSecurity Best Practices for the IIoT
PPTX
Broke Note Broken: An Effective Information Security Program With a $0 Budget
PPTX
Security Issues in Internet of Things
PDF
Mcq arya. s 24 cyber privacy
PPTX
IoT Security Briefing FBI 07 23-2017 final
PDF
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
PDF
Take a Holistic Approach to Securing Connected Manufacturing
PDF
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
PPTX
The challenges of BYOD for campus network by Leonard Raphael
"Cybersecurity - Current Landscape and Future Challenges", Anish Mohammed, Le...
Evento 15 aprile
IoT security-arrow-roadshow #iotconfua
Io t security defense in depth charles li v1 20180425c
Ryan Wilson - ryanwilson.com - IoT Security
IoT Security – Executing an Effective Security Testing Process
IoT and Cybersecurity: What can be done? by Gerald Faulhaber at Inform[ED] Io...
Iot Security, Internet of Things
Security Testing for IoT Systems
Safe and secure autonomous systems
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
CyberSecurity Best Practices for the IIoT
Broke Note Broken: An Effective Information Security Program With a $0 Budget
Security Issues in Internet of Things
Mcq arya. s 24 cyber privacy
IoT Security Briefing FBI 07 23-2017 final
Mark Horowitz - Stanford Engineering - Securing the Internet of Things
Take a Holistic Approach to Securing Connected Manufacturing
Security Fundamental for IoT Devices; Creating the Internet of Secure Things
The challenges of BYOD for campus network by Leonard Raphael
Ad

Viewers also liked (13)

PDF
MT82 IoT Security Starts at Edge
PDF
IoT: Security & Privacy at IGNITE 2015
PDF
White Paper: IoT Security – Protecting the Networked Society
PPTX
Security in IoT
PDF
IoT Security: Problems, Challenges and Solutions
PDF
The 5 elements of IoT security
PPT
IoT security (Internet of Things)
PPTX
IoT Security Risks and Challenges
PDF
Internet of Things (IoT) Security Measures Insights from Patents
PPTX
IoT Cloud architecture
PDF
Internet of Things - Privacy and Security issues
PPTX
Nuestra institución
PDF
IoT architecture
MT82 IoT Security Starts at Edge
IoT: Security & Privacy at IGNITE 2015
White Paper: IoT Security – Protecting the Networked Society
Security in IoT
IoT Security: Problems, Challenges and Solutions
The 5 elements of IoT security
IoT security (Internet of Things)
IoT Security Risks and Challenges
Internet of Things (IoT) Security Measures Insights from Patents
IoT Cloud architecture
Internet of Things - Privacy and Security issues
Nuestra institución
IoT architecture
Ad

Similar to Understanding and Mitigating IoT Security Hazards (20)

PPTX
5 phases of IoT
PDF
IoT Security and Privacy Considerations
PDF
Technology & Policy Interaction Panel at Inform[ED] IoT Security
PPT
Security Requirements in IoT Architecture
PPTX
IIoT Endpoint Security
PPTX
IoT Security, Threats and Challenges By V.P.Prabhakaran
PPTX
Key challenges facing the future of IoT
PPTX
Future of IoT: Key Challenges to Face
PPTX
Security aspect of IOT.pptx
PPT
dataProtection_p3.ppt
PDF
IoT Security Challenges and Solutions
PPTX
Application security meetup k8_s security with zero trust_29072021
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PDF
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
PDF
Advance security in cloud computing for military weapons
PDF
UCT IoT Deployment and Challenges
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
PPTX
Solnet dev secops meetup
PDF
3 steps to gain control of cloud security
PDF
What I learned from RSAC 2019
5 phases of IoT
IoT Security and Privacy Considerations
Technology & Policy Interaction Panel at Inform[ED] IoT Security
Security Requirements in IoT Architecture
IIoT Endpoint Security
IoT Security, Threats and Challenges By V.P.Prabhakaran
Key challenges facing the future of IoT
Future of IoT: Key Challenges to Face
Security aspect of IOT.pptx
dataProtection_p3.ppt
IoT Security Challenges and Solutions
Application security meetup k8_s security with zero trust_29072021
From IT to IoT: Bridging the Growing Cybersecurity Divide
Luncheon 2016-01-21 - Emerging Threats and Strategies for Defense by Paul Fle...
Advance security in cloud computing for military weapons
UCT IoT Deployment and Challenges
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Solnet dev secops meetup
3 steps to gain control of cloud security
What I learned from RSAC 2019

More from Mark Benson (20)

PPTX
The Organizational Psychology of the Internet of Things: How to Use Technolog...
PPTX
Building an Organizational IoT Competency: How to Prevent Disaster
PPTX
IoT for Organizations: Avoiding Common Pitfalls
PDF
Improving Energy Efficiency of Intelligent Buildings with Smart IoT Retrofits
PDF
Enabling Service-Delivery Business Models with Remote Sensing Technology
PDF
Data Analytics for IoT Device Deployments: Industry Trends and Architectural ...
PDF
Future on Water: IoT Infiltration into Water Management Solutions
PDF
The Rise of Platforms in the IoT
PDF
A Modern Platform Approach for Creating Smart Connected Products
PDF
Developing a Future-Proof IoT Roadmap for Connected Devices and Data
PDF
Business Analytics and the Internet of Things
PDF
Industrial Business Transformation Through Connected Products
PDF
Building Sticky Brand Loyalty with a Connected Product Strategy
PDF
Disruptive Innovation Through IoT
PPT
Cloud 101 for Embedded Designers
PPTX
Introduction to the M2M Ecosystem: Emerging Trends
PPTX
Trading Power and Performance to Achieve Optimal Thermal Design for Battery-P...
PPTX
Preparing For Future Health Technology Trends by Analyzing Current Consumer D...
PPTX
Multi-Core Architectural Decomposition Methods for Low-Power Symmetric and As...
PDF
Android Adoption and its Economic Impacts to Software Strategy
The Organizational Psychology of the Internet of Things: How to Use Technolog...
Building an Organizational IoT Competency: How to Prevent Disaster
IoT for Organizations: Avoiding Common Pitfalls
Improving Energy Efficiency of Intelligent Buildings with Smart IoT Retrofits
Enabling Service-Delivery Business Models with Remote Sensing Technology
Data Analytics for IoT Device Deployments: Industry Trends and Architectural ...
Future on Water: IoT Infiltration into Water Management Solutions
The Rise of Platforms in the IoT
A Modern Platform Approach for Creating Smart Connected Products
Developing a Future-Proof IoT Roadmap for Connected Devices and Data
Business Analytics and the Internet of Things
Industrial Business Transformation Through Connected Products
Building Sticky Brand Loyalty with a Connected Product Strategy
Disruptive Innovation Through IoT
Cloud 101 for Embedded Designers
Introduction to the M2M Ecosystem: Emerging Trends
Trading Power and Performance to Achieve Optimal Thermal Design for Battery-P...
Preparing For Future Health Technology Trends by Analyzing Current Consumer D...
Multi-Core Architectural Decomposition Methods for Low-Power Symmetric and As...
Android Adoption and its Economic Impacts to Software Strategy

Recently uploaded (20)

PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
cuic standard and advanced reporting.pdf
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
MYSQL Presentation for SQL database connectivity
Programs and apps: productivity, graphics, security and other tools
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Review of recent advances in non-invasive hemoglobin estimation
cuic standard and advanced reporting.pdf
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Spectral efficient network and resource selection model in 5G networks
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation_ Review paper, used for researhc scholars
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
MYSQL Presentation for SQL database connectivity

Understanding and Mitigating IoT Security Hazards

  • 1. Understanding and Mitigating IoT Security Hazards Mark Benson, CTO @markbenson IoT Developers Conference, 7 May 2015
  • 2. The IoT threat and opportunity Recent Economist survey: Expect their company to be using IoT within 3 years “IoT is our single biggest threat AND biggest opportunity over the next 10 years” – Brand-name fortune 500 board of directors *Source:  ABI  Research,  Cisco,  Craig  Hallum  Es9mates   0   2   4   6   8   10   12   14   16   18   20   $0     $50     $100     $150     $200     $250     Devices  Billions   Market  Size  Billions   Big  Data  Analy4cs  (53%   CAGR)   Connected  Device  PlaCorms   (33%  CAGR)   PlaCorms  (33%  CAGR)   Applica4on  Enablement   PlaCorms  (32%  CAGR)   Value  Added  Services  (26%   CAGR)   System  Integra4on  Services   (24%  CAGR)   Hardware  (23%  CAGR)   Connec4vity  (12%  CAGR)   Internet-­‐connected  devices   (Cisco  Es4mate)   95%
  • 3. The Internet of Things? More like the Internet of Attack Vectors •  Attack surfaces are expanding rapidly •  Physical access to systems is becoming easier •  Consumer privacy concerns are rising •  Consequences of a breach are becoming more severe (critical infrastructure, brand deterioration, data privacy issues, etc.) •  Product companies are being forced outside of their comfort zones •  Three dimensions that make IoT security challenging…
  • 4. 1. Resource constraints MAC/PHY IP TLS/TCP HTTP App Data MAC/PHY IP TLS/TCP HTTP App Data MAC/PHY IP TLS/TCP HTTP App Data MAC/PHY IP DTLS/UDP CoAP Binary Data MAC/PHY IP DTLS/UDP CoAP Binary Data SensorMAC/PHY Binary DataRest Use Motion Motion Motion Use Use Use Rest Rest Enterprise Web Services IoT Data Platform Gateway or Aggregator Sensing Node Has moderate resource constraints Has severe resource constraintsDeals with resource constraintsHas virtually no resource constraints Network MAC/PHY Binary Data Network
  • 5. 2. Deployment topologies Gateway IoT Cloud Gateway On-prem Gateway IoT CloudOn-prem Gateway IoT CloudOn-prem Analytics Analytics Sensors Short RF Gateways On-prem SW Long-haul Cloud Platform Analytics platform A. No cloud D. Closed network C. Multi-site E. Comprehensive B. Standard Local Display
  • 6. 3. Usage modes • Device cloud registration * Secure authentication * Secure API transports * Secure storage Initialization Operation Modification Retirement1 2 3 4 • Secure flash * OTP parts * Secure boot * Secure provisioning • Secure firmware updates * Disable test/debug interfaces * Factory defaults fallback * Disable test interfaces • Secure change of ownership • Device de-registration process • Optionally reenable retired devices • Secure encryption key deletion Things  to  note  about  IoT  usage  modes  that  affect  security:   1.  Some  modes  are  normal  and  standard  solu5ons  exist   2.  Some  modes  are  new  and  standards  are  s5ll  emerging   3.  Some  modes  are  becoming  more  vulnerable  due  to  resource  constraints  
  • 7. Usage Modes Sim ple NovelStandard D eploym entTopologies C om plex Resource Constraints High Low The  IoT  security  problem  area   A.  High  resource  constraints   B.  Complex  deployment  topologies   C.  Novel  usage  modes   Mo’ IoT, mo’ problems
  • 8. The 4th dimension: time Now we have a Tesseract The  difficulty  with  IoT  security  is  that   the  landscape  is  constantly  changing,   even  aYer  products  are  deployed     Security  should  be  designed  for  from   the  beginning  and  embraced  as  a   journey  throughout     It  starts  with  a  process…   Modes Topologies Constraints Time
  • 9. The web you should be weaving Secure processes => secure products => secure brand integrity Security Requirements Planning Design Implementation Verification Validation Deployment Operations Risk Analysis Threat Modeling Secure Design Practices Security-Focused Design Reviews Secure Coding Practices Third Party Security Audit Security-Focused Testing User Testing to Expose Weakpoints Penetration Testing Secure Deployment Practices Operational Risk Assessment Incident Response Preparedness Vulnerability Management Training and awareness Information Security Management System (ISMS) policies, procedures, and compliance audits Corporate strategy, governance, metrics, and optimization
  • 10. Conclusion Takeaways: 1.  Security processes. Have a security architecture from the beginning and evolve throughout (constraints, topologies, modes) 2.  Technology selection. Make informed technology selections from the beginning that are aligned with security goals for the company and product 3.  Operations planning. Plan and prepare for how you will respond if and when a security incident occurs in the field Checklists •  http://owasp.org/ •  http://builditsecure.ly/ Embrace the journey