ben goodman cybersecurity in the iiot

15
© 2016 ForgeRock. All rights reserved.

Upload: masstlc

Post on 22-Jan-2018

50 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Page 2: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Industry 4.0

By ChristophRoser at AllAboutLean.com, own work, CC BY-SA 4.0, https://commons.wikimedia.org/w/index.php?curid=47640595

Page 3: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Top Barriers to IoT Adoption

Page 4: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Internet of Things Top Concerns

Security & Privacy Concerns

Value Assessment, Case Studies &

Organizational Consensus

Lack of Solution Knowledge

Legacy Infrastructure, Lack of Skills,

Integration & Costs

Lack of Standards & Interoperability

1

2

3

4

5

Source: IoT Institute, 2016 IoT Trends

Survey

Page 5: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Connected Car Hacked

Charlie Miller

Chris Valasek

Kill Engine

Brake /

Disable

July 2015

Track / Steer

Jeep

Cherokee

Page 6: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved. 6

Connected Health Hacked

Jack Barnaby

Medtronic Insulin Pump

Adjust /

Disable

February

2012

Page 7: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Internet of Things Other Hacks

HackedConnected Home

Connected Industry Hacked

Smart Livestock Unsure

Page 8: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Why is it that these connected devices are being hacked over and over again?

The list below, while not exhaustive, explains some of the reasons why these new connected devices are so easy to hack and why we’re likely to see more hacks in the future.

• MVP mindset

• Usability > security

• Lack of skills and resources

• Ship and forget mindset

• You (the user)

• Complex supply chain

• Cybercrime as a service

Page 9: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Security Adoption Cycle

”Oh

Crap”

Page 10: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Identity Access Management Identity Relationship Management

Customers

(millions)

On-premises

People

Applications

and data

PCs

Endpoints

Workforce

(thousands)

Partners and

Suppliers

Customers

(millions)

On-premises Public

Cloud

Privat

e

Cloud

People

Things

(Tens of

millions)

Applications

and data

PCs PhonesTablet

s

Smart

Watches

Endpoints

Business Has Changed: Enterprises now require Identity Relationship Management (IRM)

Page 11: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Perimeter-Based Security Identity-Centric Security

Enables Digital

Business

Untrusted

Truste

d

Inhibits Digital

Business

Old Security Model is Broken. Security Must Now Be

Identity-Based, and implemented by design.

Page 12: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

IAM in the age of the digital

business is more typically

characterized by a web of

paths involving a variety of

application locations,

endpoint devices, and things.

Workforce

(thousands)

Partners and

Suppliers

Customers

(millions)

On-premises Public

Cloud

Private

Cloud

People

Things

(Tens of

millions)

Applications

and data

PCs PhonesTablet

s

Smart

Watches

Endpoints

Next Generation IAM

Page 13: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

Why IoT Needs Identity

•An object must be identified in order to be secured

•Unified identities of applications, cloud services, software code and connected devices

•IoT authorization decisions requires real-time processing of

•Complex relationships

•Context

•User digital interactions must be constantly monitored.

•In addition to using contextual cues to evaluate customer behavior,

•user identity and access rights can be verified through multi-factor authentication

Page 14: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

IoT reference architecture

Page 15: Ben goodman cybersecurity in the iiot

© 2016 ForgeRock. All rights reserved.

End-to-end IoT Identity Platform

BIG

DATA

Little DataEnd-to-End Security, Web, Data Objects & Management

IP and Web to the

edge

Solutions

Edge

Identity Platform

• Consumers

• Customers

• Partners

• Contractors

• Employees

• …

FROM DEVICE TO

CLOUD IoT Services Enterprise