secure and reliable data exchange with iot devicesthe framework is intended to serve as a common...

28
Secure and Reliable Data Exchange with IoT Devices Vinny Sakore & Amit Trivedi February 29, 2016

Upload: others

Post on 17-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Secure and Reliable Data Exchange with IoT Devices

Vinny Sakore & Amit Trivedi February 29, 2016

Page 2: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Mobile and Internet of Things (IoT)

Security Risk With IoT Technology

Page 3: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Nepal Earthquake (April 25, 2015)

Saturday 8AM – find out an earthquake hit Nepal within a mile of where our friends are. 9AM – our friend’s parents FB post that they are OK. 1PM – We find out through FB that all thirty of the team is alive, and OK. Monday – Safety check notifies me who hasn’t “checked in” and I start getting requests for donations.

Page 4: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Fellowship in a mobile world

Instead of grabbing a cup of coffee with a friend or the Wall Street Journal, we grab a cup of coffee with our iPhone and our friends on Facebook or Instagram

Page 5: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Finance in a mobile world

Page 6: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Healthcare in a mobile world

Page 7: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Q: What is the Internet of Things (IoT)?

Page 8: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Answer: Anything with a power button connected to the Internet.

Page 9: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

The future of IoT and mobile devices

Page 10: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

The drive to 25 billion connected devices

Page 11: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Connected…Yes… Secure…Not So Much

Regarding IoT….“the big takeaway for companies is data security, data security, data security!”

Julie Brill, Federal Telecommunications Commission

Source: At a recent workshop at the IAPP Global Summit on privacy, FTC Commissioner Julie Brill, commenting on its IoT report, was quoted as saying the “big takeaway for companies is data security, data security, data security.”

Page 12: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied
Page 13: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied
Page 14: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

83 percent of the world’s top 400 mobile apps come from unique developers –

that is, teams, that typically serious lack security expertise

Did you know?

Page 15: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied
Page 16: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Security issues with mobile apps

"Mobile security breaches are - and will continue to be -- the result of misconfiguration and misuse on an app level, rather than the outcome of deeply technical attacks on mobile devices" – Gartner

Page 17: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

The hacking of an insulin pump!

Page 19: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Best Practices

Securing Mobile and IoT Devices

Page 20: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

(1): mobility

- We live in a mobile world and we will never go back, without catastrophe, to not having mobility as a major part of our lives. Mobile apps, mobile devices and IoT devices are here to stay and we have to be ready to live “connected lives.”

- As consumers we need to understand what and how much of our information is online and “uncontrolled.”

Page 21: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Internet of Things (IOT)

- Because IoT is about physical things, hackers that gain access can not just perform the usual attacks like stealing data, moving money or shutting down web sites; they can also cause havoc by tampering with infrastructure like electrical grids and traffic signals. They can also put lives at risk by meddling with healthcare devices, airplanes, automobiles and elevators.

- While IoT is widely hailed as the Next Big Thing, the key ingredients –network connectivity, information security and infrastructure – have existed for decades.

Page 22: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Risk Management

• Security by Design – Whether it’s appliances, software, toys or electronics, the manufacturer should integrate security into the design process. When considering coverage, it is important that security is implemented into the design of each product throughout the product’s lifecycle.

• Encryption is Essential – Manufacturers should have a strong policy that utilizes encryption. If a data breach happens, but the data is encrypted, a number of “safe harbor” type provisions will be in effect. For example if the data is encrypted, then its loss is generally not considered a breach.

• Built-In Risk Analysis Program – How often does the manufacturer they’re underwriting conduct risk analysis and are they standard in the product’s development lifecycle? It is important to gauge the maturity of a manufacturer’s information security program.

• Authorize Connected Devices - Devices that are connected to the Internet should require some type of authorization such as authentication via digital certificates that confirm its identity as well as its access. If a hacker gains access to a small part of a system, it can gain access to all of it. Authentication can help contain these types of breaches.

• Independently Tested and Certified Products - All product manufacturers should have their security independently tested and certified by a third-party provider. This adds a layer of protection as the products go through rigorous testing, and adhere to security standards.

22

Page 23: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Security & Interoperability Standards

- NIST: DRAFT Framework for Cyber Physical Systems (September 2015). The Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied as smart energy grids, wearable devices, and connected cars.

- FTC: IoT devices come in a variety of forms and shapes, but they have a handful of similar attributes that make security an even greater challenge. The FTC released a staff report recently that took a comprehensive look at IoT and security, including secure APIs, authentication, and product updates, was a key theme.

- Open Web Application Security Project (OWASP): The OWASP Internet of Things Project is designed to help manufacturers, developers, and consumers better understand the security issues associated with the Internet of Things, and to enable users in any context to make better security decisions when building, deploying, or assessing IoT technologies. The project looks to define a structure for various IoT sub-projects such as Attack Surface Areas, Testing Guides and Top Vulnerabilities.

Page 24: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Additional Resources

- The Personal Connected Health Alliance (PCHA) is an organization

convening, constraining and advocating global technology standards to advise developers of end-to-end interoperable solutions for personal connected health. It publishes the Continua Design Guidelines that clearly define interoperable interfaces that enable the secure flow of medical data among sensors, gateways, and end services, removing ambiguity in underlying healthcare standards and ensuring consistent implementation through product certification.

- Integrating the Healthcare Enterprise (IHE): IHE International is a global not for profit organization that enables the collaboration of healthcare providers and industry leaders to improve the exchange of healthcare information and patient care using IHE's proven framework for interoperability. Medical Equipment Management (MEM): Medical Device Cyber Security – Best Practice Guide (Oct. 2015)

Page 25: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Internet of Things (IOT)

Cloud Security Alliance Guidance

Page 26: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Dependability Assurance Framework For Safety-Sensitive Consumer Devices

Page 28: Secure and Reliable Data Exchange with IoT DevicesThe Framework is intended to serve as a common blueprint for the development of safe, secure, and interoperable systems as varied

Questions?

Thank you! Amit Trivedi Program Manager, Healthcare @a3vedi Vinny Sakore, CIPT Assistant HIPAA Security Officer @VinnySakore