cybesecurity of the iot

36
Copyright 2007-2016, The PTR Group, Inc. CYBERSECURITY OF THE IO T Mike Anderson The PTR Group, Inc. [email protected] http://www.ThePTRGroup.com

Upload: altoros

Post on 23-Jan-2018

724 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

CYBERSECURITY OF THE IOT

Mike Anderson

The PTR Group, Inc.

[email protected] http://www.ThePTRGroup.com

Page 2: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Who is The PTR Group? The PTR Group was founded in 2000 We are involved in multiple areas of work:

Robotics (NASA space arm) Flight software (over 35 satellites on orbit) Offensive and Defensive cyber operations

Embedded software ports to RTOS/Linux/bare metal IoT systems architecture and deployment

Predix-BOS-0609- 2

Page 3: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Who am I? Over 39 years in the embedded space Long-time developer in the RTOS field Instructor for Linux/Android internals Mentor for FRC #116 FIRST Robotics Team Frequent speaker at:

Embedded Linux Conference Embedded Systems Conference CIA Emerging Technology Conference

Predix-BOS-0609- 3

Page 4: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

What does it mean to be secure? What are we trying to protect? Who are the attackers? Physical access Secure boot techniques Encryption, certificates, code signing and digital signatures Characteristics of a secure system Steps to secure the data center, border gateway and the edge devices

Predix-BOS-0609- 4

Page 5: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

The Dimensions of Security The definition of security varies depending on the audience For some, it means having locks, alarms and guards as in physical security For others, it is all about protection from outside hackers as in cyber security Many will confuse privacy with security

There is a spectrum for security Usability on one end and protection on the other

Predix-BOS-0609- 5

Page 6: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Security Facets

consider the following elements: Confidentiality Integrity Authentication Authorization Non-repudiation

Each of these topics need to be addressed at some level to be

With these elements, we need to consider physical security, data security and network security at a minimum

Predix-BOS-0609- 6

Page 7: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

What is the Internet of Things?

Advances in power management, wireless communications and CPU architectures enables the embedding of intelligence into devices that

The data that is produced from the things needs to go someplace for use

This could be used locally -- e.g., a thermostat Could be collected at the border gateway and preprocessed to be forwarded to the servers

Or, sent directly to the servers

The cloud systems provide command and control and data analytics

Predix-BOS-0609- 7

Page 8: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge, Middle and Cloud We can think of the IoT as being comprised of devices on the edge, middle box and cloud portions of the ecosystem Edge devices are where the sensors and actuators are found

Often, battery operated with low-power networks Consumer edge devices may have wall power

Source: eurotech.com

Predix-BOS-0609- 8

Page 9: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge, Middle and Cloud #2 The middle boxes are better known as border routers/gateways

Translate from the low-power network of edge devices to standard Internet protocols like IPv4/IPv6 May provide data pre-processing

The cloud portion provides: Connectivity to external controllers (smartphones, tablets, etc.) Data aggregation and analytics Both connectivity and data services

Source: fortune.com

Predix-BOS-0609- 9

Page 10: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Who are the Attackers? Amateur hackers

Most of the hacking that done on the Internet currently is the effort of amateur hackers

Professional hackers Blackhats

Ransomware Credit card thieves Malware-to-order

Whitehats (theoretically, not a bad guy)

Frequently employed to detect security vulnerabilities Pentesters

Grayhats Living in the gray area between the legal and illegal

State-sponsored hackers Often blackhats that are paid by Governments to find and obtain classified information, conduct industrial espionage or launch coordinated cyber-attacks

Not in it for the money per se

Source: freethoughtblogs.com

Source: slideshare.net

Predix-BOS-0609- 10

Page 11: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Understanding the Scope of Security Security starts at your employees

threat

Physical access to a system always represents a security hole

Tamper-the device, etc. are merely an annoyance to the dedicated hacker You should always assume that your system is already physically compromised

Predix-BOS-0609- 11

Page 12: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Confidentiality This is probably one of the easiest characteristics of security to understand The goal of confidentiality is simply that no unauthorized individuals can read the data you want protected This data breaks down to:

Data-in-flight Data in the form of message traffic transiting your connections

Data-at-rest Data like encryption keys and certificates stored on your system

Data-in-use Temporary use of decrypted keys or certificates in RAM

Encryption technology is most closely related to issues of confidentiality Confidentiality is often associated with privacy

But, we can achieve privacy without encryption

Predix-BOS-0609- 12

Page 13: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Encryption Background Without getting too far into the topic, encryption can be thought of as either symmetric or asymmetric With symmetric encryption, there is a pre-shared key that must be known on both sides

E.g., AES, DES, Twofish, Rijndael, Triple-DES The question is how to exchange the keys?

In asymmetric encryption, we have public and private keys often referred to as public-key cryptography

E.g., Diffie-Hellman, RSA, elliptic curve

Predix-BOS-0609- 13

Page 14: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Public-Key Cryptography The idea behind public-key cryptography is that you have a public and a private key Anyone can encrypt a message using your public key

But only you can decrypt the message using your private key

A modification to this is the Diffie-Hellman key exchange approach

To send to a recipient, you encrypt with your private key and their public key They then decrypt with your public key and their private key Allows you to set up an encrypted session for the exchange of symmetric keys

Source: wikipedia.com

Predix-BOS-0609- 14

Page 15: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Integrity Integrity encompasses a couple of different concepts

System integrity Message integrity

System integrity can be addressed initially by ensuring a secure boot cycle

More on this is coming up

Message integrity is a somewhat different matter We need to concern ourselves that the message was delivered intact

Source: pinterest.com

Predix-BOS-0609- 15

Page 16: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Secure Booting From a software perspective, security starts with the power-on jump of the processor

Secure booting techniques help avoid the development of rootkits

secure data store such as OTP memory or a TPM to store cryptographic hash values of your measured code

Predix-BOS-0609- 16

Page 17: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Message Integrity Making sure that the message is intact can be addressed through the many checksums or CRCs that we find associated with typical messaging techniques

Ethernet CRC, IP header checksum, UDP payload checksum

However, making sure the message -flight by a MITM

is more complicated As outlined earlier, one approach is to encrypt the message Another is to associate a message integrity code (MIC) or other hash-based message authentication code (HMAC) with the message

Source: slideshare.com

Predix-BOS-0609- 17

Page 18: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Authentication Authentication addresses being able to associate a message,

Single-factor authentication uses a single characteristic to grant access

Password, biometrics, PINs, security tokens, etc.

However, passwords are generally regarded as too weak for security usage

They can easily be compromised due to poor passwords or

Two-factor authentication combines two characteristics to provide more security than a password alone

E.g., Fingerprint and a drawn pattern or iris scan and a security token such as a smart card

Predix-BOS-0609- 18

Page 19: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Authentication #2 While we can get some level of authentication through the use of encryption, the typical mechanism used in system authentication is the certificate Certificates are closely tied to the asymmetric encryption approach

Certificates are a way of binding a particular public key to a specific distinguished name or its alternative such as an e-mail address or DNS entry

Digital signatures and code signing are related to the same approaches as the certificate

Source: free-it.org

Predix-BOS-0609- 19

Page 20: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Authorization Authorization is somewhat more difficult to pin down

control policies

have: Valid credentials for the platform or The appropriate secret key or Knowledge of some private characteristic of the system such as a hidden SSID in a wireless network

Typically tied with a form of authentication such as a pre-shared key

Predix-BOS-0609- 20

Page 21: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Non-Repudiation Recall that non-repudiation means someone not being able to deny that they sent the message

that provide for non-repudiation Often associated with having the private secret needed to encrypt/decrypt a cryptographically sealed message

If we use two-factor authentication to further limit the range of possibilities, we can increase the level of non-repudiation

E.g., biometrics and the secret key

Predix-BOS-0609- 21

Page 22: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Security is all about Risk Management

But, the lack of security can also be expensive Specialized encryption equipment, additional software development, frequent software updates, continuing testing and monitoring of hacking sites, etc.

other development costs However, the amount of money that you spend is related to

-management beliefs

amount of damage if the system is compromised E.g., US OPM and Ashley-Madison

Predix-BOS-0609- 22

Page 23: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Cloud and Border Gateway Security Linux is commonly found in both of these places

So, if we know how to secure the border gateway, we have a pretty good handle on how to secure the cloud servers

Predix-BOS-0609- 23

Page 24: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Implementing Data Center Security Physical security

Two-factor authentication for building entry is a must

Access card and PIN at a minimum

Working surveillance cameras Detailed change logs

Automated logging Logs stored in restricted-access storage

Background checks on prospective employees Periodic reinvestigations of employees

Source: halfelf.org

Predix-BOS-0609- 24

Page 25: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Data Center Security #2 Data security

Implement a secure boot mechanism Encrypt sensitive data

At the partition, directory or file level as appropriate

Use virtualization or sandboxing to isolate communities of interest -

Eliminate all non-essential system services Periodic auditing of installed software Monitor and install software updates for the system regularly Two-factor authentication for accessing the system Use code signing for any software that will be installed Have a solid data backup strategy and test it frequently Implement mandatory access controls and auditing

SELinux or similar MAC system with access control lists and regular review of audit logs

Predix-BOS-0609- 25

Page 26: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Data Center Security #3 Network security

Know what devices are on your network Periodically re-inventory to detect new devices

Implement IPv4 and IPv6 firewall policies Install intrusion detection/prevention system

E.g., snort

Plan for periodic updates to your networking equipment firmware Close all non-essential ports and services

Scan devices with tools like nmap, SATAN, SAINT, etc.

Use VPNs for extended-term communications link requirements Use DTLS/TLS/AES for temporary-link security Use certificates for verification of the other end of the pipe Consider hiring penetration testers periodically

Source: trificent.net

Predix-BOS-0609- 26

Page 27: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Border Gateway Security Depending on their implementation, the border gateway security issues are very similar to the data center

May be based on the same O/S and have similar hardware

MMU-based hardware allows running more sophisticated operating systems

A larger attack surface

Typically powered on all the time But, may also be powered-off for extended periods of time Power/thermal management policies need to be considered

Assume that there will be physical access by non-authorized personnel Plan for spares so compromised devices can be replaced and sent back to HQ for analysis and remediation

Predix-BOS-0609- 27

Page 28: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Border Gateway Security Physical security

Unlike the data center, there may not be any enforceable physical boundaries

Remove any debugging interfaces Blow the e-fuses, if available, to prevent access to internal registers or storage

Place the unit in a tamper-resistant case Use potting, special screws, etc.

Assume the device will be compromised physically

Source: tampertech.net

Predix-BOS-0609- 28

Page 29: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Border Gateway Security #2 Data security

All of the data center data security steps that apply Virtualization/sandboxing may not apply

Depending on the CPU horsepower and amount of data-at-rest on the device, you should encrypt the data store

Especially for store-and-forward applications

Implement certificates for authentication Make sure you have a solid certificate revocation approach to deal with compromised devices

Implement code signing for updates Keep gateways up to date with security patches

Use mandatory access control and ACL policies if possible

Predix-BOS-0609- 29

Page 30: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Border Gateway Security #3 Network security

Again, most of the data center network security features apply Like the data center, remove all non-essential services

Micro servers may be an option

If CPU and storage permit, implement IDS/IPS Periodic virus/malware scans as well

Monitor the sensor network and track devices as they check in Report new devices found on the network immediately Track IDs of compromised sensors and inform the rest of the network of the compromise

Use encryption/DTLS/TLS for all links to the edge devices Use a VPN or encryption/TLS to talk to the data center Implement log management to prevent potential DoS attacks filling up the logs and crashing the gateway Use non-routable network on the sensor links

Predix-BOS-0609- 30

Page 31: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge Device Security Edge devices represent a special set of problems

Might not always be powered on Often will not have an MMU or be able to run a securable O/S Easy accessibility by unauthorized personnel Low RAM and CPU performance

Complicates encryption of storage and/or network

Only connectivity may be wireless Difficult to provision every sensor without physically touching every one

NFC might be an approach

Source: blogspot.com

Predix-BOS-0609- 31

Page 32: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge Device Security #2 In general, try to make the edge devices as dumb and as throwaway as possible

Edge devices are often replaced rather than repaired

Physical security Remove debugging interfaces and blow e-fuses if possible

Pot the device and place in tamper-resistant case

Expect that no matter what you do, the device will be physically compromised

Source: unlockfiretv.com

Predix-BOS-0609- 32

Page 33: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge Device Security #3 Data security

Boot sequence may not really exist per se E.g., running bare-metal code

Avoid using RTOS solutions for which you do not have the source code Implement certificates for authentication Plan for some mechanism to do software updates

Implement code signing, if possible

Try not to store collected data Maybe in RAM, but not in permanent storage unless you can use encryption or something like smartcard technology

Encrypt all sensitive data like encryption keys Provide mechanism for revocation of certificates and isolation of compromised devices

Predix-BOS-0609- 33

Page 34: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge Device Security #4 Network security

Take advantage of encryption units in radio interfaces Use DTLS/TLS for connection to the gateway or nearest neighbor

Negotiate pair-wise keys on a per-neighbor basis Make sure that the keys expire periodically

Key management strategies can get rather complex Try to use certificates where applicable

If possible, track nearest neighbor identities and deactivate if there is a radical change unless alerted that there is a network change coming

Avoids potential MITM attacks or intrusion by unauthorized network nodes

Predix-BOS-0609- 34

Page 35: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Edge Device Security #5 Leverage any security provisions in the communications protocol

E.g., some messaging systems like DDS provide security constructs

Store sensitive data in smart card chips or other secure storage

Low resources on the device may rule out network filtering and IDS/IPS

Predix-BOS-0609- 35

Page 36: Cybesecurity of the IoT

Copyright 2007-2016, The PTR Group, Inc.

Summary By now, you should be aware that securing the IoT and the various parts can be a daunting task

Security will cost you money, but your risk assessment will determine the risks you are willing to live with in your system

network All direct communications are from the gateway or other edge nodes

Do not allow your edge devices to be visible on the Internet

Understand how certificates work and develop a strategy for updating devices in the field Ask for and expect to pay for help in developing a security strategy Periodically, hire pentesters to verify your system against the latest techniques

Predix-BOS-0609- 36