Top Banner
SESSION ID: #RSAC Tyson Macaulay IoT Security and Risk Management GPS1-R03 Chief Security Strategist, Fortinet
25

IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

Mar 23, 2018

Download

Documents

trinhkhuong
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

SESSION ID:

#RSAC

Tyson Macaulay

IoT Security and Risk Management

GPS1-R03

Chief Security Strategist,Fortinet

Page 2: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

IoT Security is a BIG STORY!

Page 3: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

2005 2010 2015 2020

7%4%

2%

Security as a % of IT Budget

Source: Gartner: 2005 to 2015

Billion+devices?

20

Page 4: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

“CEO’s Guide to IoT Security” – AT&T, March 2016

of global organizations are considering, exploring, or

implementing an IoT strategy

85%

IoT deployments are on the riseHow many connected devices do you have

in your organization?

of organizations are fully confident that their connected

devices are secure

10%1%

8%20%

35% 32%

5%

None Fewer than 100

100-999 1,000-4,999

5,000+ Don't know

Source: AT&T, March 2016

Page 5: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Customers looking for IoT security services

Source: Fortinet, May 2016

Page 6: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Threat Agents in the IoT

Criminals Hacktivists Industrial Spies Nation States

Terrorists Insiders Chaotic Actors & Vigilantes

Regulators

Page 7: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Top Threats to the IoT (the short list)

Regulatory and Legal Competitive Financial

Privacy Data assurance Resource allocation Audit failures

Skills shortages Failure to use “big data”

effectively Market disruptors Unstable suppliers and

partners

Subscriber fraud and theft of service

Social engineering (accounts info)

Fines (regulatory vs SLA) Liability and insurance

Internal Policy

Standards vacuum

Page 8: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Zoom in! - IoT Transaction Use-case

Automated prescription

fulfillment

Micro-payments for utilities

P2P lending

Food ordering

Stored value and loyalty

Energy Spot-market

settlement

Pay as you go feed stock by inventory managers

Fuel currencies

Page 9: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

A wants to send currency, updated service information or device ownership to B

The transaction grouped with many other transaction occurring in the same period as a "block"

The block is broadcast to every verifying party in the network for agreement that “double spending” or false transactions are not present

The block is encoded with a hash of the previous block and then can be added to the end of the former block to form a chain, which provides an indelible and transparent record of transactions

Those in the network approve the transaction is unique and valid The money / service information

or device ownership moves from A to B

1

A

2

45

3

6

B

Zoom in! – Blockchain IoT Transaction Use-case

Page 10: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Big Threat #1 – Device to Device Attacks

Infected device enters the home and attacks adjacent devices – which in turn launch attacks

Infected/ compromised devices attack internally and externally

Page 11: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Big Threat #2 – IoT as the Weakest Link

Personally Identifiable Info

Sabotage or privacy invasions

Attack on information-rich devices

IoT Cloud services

Man-in-the-Middle or compromise Cloud

Messages pushed to device manager“Upgrade now for your own safety”

Fetch “patches” = malware

MalwareDrop

Compromise of one device leads to all adjacent systems

Social engineering in the IoT

Page 12: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

3

Big Threat #3 – Interdependency and Complexity

IoT ecosystem has many stakeholders and service providers at each point in the architecture

Cascading impacts almost impossible to project or monitor

Assumptions will fail

1 2

Gateway

Service function owner

Gateway owner

Gateway manager

Gateway maker

Supply chain Cloud / DC

Service tenant Platform vendor

Software owner Infrastructure owner

Software manager Infrastructure manage

Software vendor Infrastructure vendors

Platform owner Supply chain

Platform manager

Network

Network provider Equipment maker

Network owner Supply chain

Network manager

End point

Device user(s)

Device owner

Device manager

Device maker

Supply chain

4

Page 13: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

Case Study - 4G to 5G Security Evolution to Support IoT

Page 14: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

4G/IoT Security Today

Page 15: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

4G Security Solutions Today – Carrier-network Focus

Page 16: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

IoT/5G – Heavy Growth Across Infrastructure

Page 17: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Wireless Spectral Efficiency

Availability / Reliability

Data Rate

Mobility

Energy Efficiency

Device Density

Device Cost

End point Battery Life

Cost per Mbps

Latency

4G (capabilities)

Machine 5G (requirements)Human 5G (requirements)

4G versus 5G requirements

Source: Mobile Experts LLC, Feb 2015

Page 18: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

IoT/4G Evolving to IoT/5G – More Challenges

Page 19: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

WHERE DO THE IOT SECURITY ANSWERS LIE?

PARTIALLY WITH THE IOT DEVICES THEMSELVES.

BUT MOSTLY WITH THE NETWORK.

Page 20: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

A Cooperative Security Fabric in the Enterprise

Global Intelligence

Client Security

Network Security

Application Security

Cloud Security

Secure WLAN Access

Alliance Partners

Secure LAN Access

IoT

Local Intelligence

Page 21: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

End-to-End: IoT Security Reference Model

End point Gateways Network Data Center and Cloud

Control & Visibility

Security Services & Framework

END POINTS

(Wireless/Fixed) NETWORK

DATA CENTER & CLOUD

(Smart) GATEWAYS

VirtualizationDistributed Network Function

Virtualization (D-NFV)Network Function

Virtualization (NFV)

Page 22: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Evolving IoT Infrastructure

Page 23: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Evolving IoT Infrastructure with SecurityMicro-segmentation (by in-home service)

Form factor: VirtualMicro-segmentation (by subscriber)

Form factor: Virtual

Page 24: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet

#RSAC

Apply: Call to Action for IoT Risk Management

IoT devices require new approaches to security

Look to the network for better security Gateways, Transport networks, DC / Clouds

Network virtualization brings opportunities for better security, not just operational savings

Increased automation, Scalability and license management

Page 25: IoT Security and Risk Management - RSA Conference · PDF fileSESSION ID: #RSAC Tyson Macaulay. IoT Security and Risk Management. GPS1-R03. Chief Security Strategist, Fortinet