the next wave: the internet of things and security€¦ · quantified self 802.11ah embedded...

37
© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity." F. Christian Byrnes Twitter: @cbyrnes The Next Wave: The Internet of Things and Security

Upload: others

Post on 01-Oct-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered trademark of Gartner, Inc. or its affiliates. This publication may not be reproduced or distributed in any form without Gartner's prior written permission. If you are authorized to access this publication, your use of it is subject to the Usage Guidelines for Gartner Services posted on gartner.com. The information contained in this publication has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information and shall have no liability for errors, omissions or inadequacies in such information. This publication consists of the opinions of Gartner's research organization and should not be construed as statements of fact. The opinions expressed herein are subject to change without notice. Although Gartner research may include a discussion of related legal issues, Gartner does not provide legal advice or services and its research should not be construed or used as such. Gartner is a public company, and its shareholders may include firms and funds that have financial interests in entities covered in Gartner research. Gartner's Board of Directors may include senior managers of these firms or funds. Gartner research is produced independently by its research organization without input or influence from these firms, funds or their managers. For further information on the independence and integrity of Gartner research, see "Guiding Principles on Independence and Objectivity."

F. Christian Byrnes

Twitter: @cbyrnes

The Next Wave:The Internet of Things and Security

Page 2: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Let's Get the Big Story Out of the Way Right Now

Page 3: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

1974

Digital Business Moment:

Renting a Car

Page 4: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Customer Experience:Call three rental companies on the phone; wait on hold, eventually find one with a car available. On check-in fill out reams of paperwork with a dozen signatures. Insurance is included in the rental automatically. If an accident occurs call for a tow truck and the rental company brings out a replacement car. When returning wait on line to process car back in.

IT experience:Nightly inventory update job. Nightly billing run. Planned inventory is always highly uncertain. Billing errors require manual correction.

Risks:Lost business due to incorrect inventory. Unhappy customers due to long waits in line, doing paperwork and then eventually getting a car.

Page 5: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

1994

Digital Business Moment:

Renting a Car

Page 6: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Customer Experience:Still call on the phone, but now the agent has a terminal with past customer profiles and a more accurate inventory. On check-in forms are printed partially filled out. A few signatures and initials suffice. Accident: no change. Return: no change.

IT experience:Mainframe OLTP system handles basic transactions and updates inventory.

Risks:Loss of leased communications lines stops reservations. Check-in agent has fall-back to paper as option. Re-entering manual transaction can take days, creating old inventory problems. Most serious risk is database corruption which can take up to a week to repair.

Page 7: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

2014

Digital Business Moment:

Renting a Car

Page 8: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Customer Experience:Reservation made via the web. Fast, clean, minimal effort. No check-in; go straight to car, even pick your car. Show license on exit from parking lot. Insurance costs extra; post-accident services slow to non-existent. On return wait for agent to come to the car and check you out. Email confirmations followed by endless marketing emails.

IT experience:Mobile, networking, cloud and social support built on reliable infrastructure.

Risks:DDOS, client data loss due to security breach, fallback to paper virtually impossible, in part due to reduced staffing that improved profitability. Reputational risk, negative social reviews,

Page 9: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

2034

Digital Business Moment:

Renting a Car

Page 10: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Customer Experience:“Siri, I need a car in Dubai next week.”Siri: “Human driver or self driving?”Siri checks for airline tickets, arranges car according to preference profile. Pickup: walk to car and drive away.Drop-off: Get out of car and walk away.

IT experience:Hundreds of sensors in the car and in the lot. Physical security, car maintenance, etc. Robots service the car in preparation for the next renter.

Risks:Your competitors want your sensor data as well as your client data. Some geographies mandate human drivers; others do not allow them. Cyber-gangs and corporate fiefdoms.

Page 11: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

.

Page 12: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

2020

SECURITY SCENARIO

Page 13: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Enterprise Individual

FORCE 1:

Target

Page 14: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

FORCE 2:

Authority

Enterprise Individual

Tribal

Monolithic

FORCE 1:

Target

Page 15: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

ControllingParent

NeighborhoodWatch

Enterprise Individual

Tribal

Monolithic

Coalition Rule

RegulatedRisk

Page 16: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

The Third Industrial Revolution

• The first industrial revolution – 1780-1850

• The second industrial revolution – 1870-1930

• The third industrial revolution – 1940-2025(?)

- In Germany the result is called “Business 3.0”

If history provides any guidance:

Industrial revolutions end with a game changer.

Of the five pillars of a stable society, prosperity is always threatened at the end of an industrial revolution. That threat leads to major changes in the economy.

15

Page 17: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

The Nexus of Forces is a game changer

16

Mobile, social and

cloud create massive

data and shift control

away from the

enterprise.

This is the largest change since 1966.

Its next phase technical

implementation is

embodied in the Internet of Things (IoT).

Page 18: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

The Internet of Things:15 Billion or One Trillion Things by 2020?

Smart Meters

LightBulbs

SmartHubs

Page 19: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Internet of Things Hype Cycle, 2014

Innovation Trigger

Peak ofInflated Expectations

Trough of Disillusionment

Slope of EnlightenmentPlateau of Productivity

time

expectations

Plateau will be reached in:

less than 2 years 2 to 5 years 5 to 10 years more than 10 yearsobsoletebefore plateau

As of July 2014Digital SecuritySmart Dust

Licensing and EntitlementManagement

Ambient Energy Harvestersfor the Internet of Things

IoT PlatformOperational Intelligence Platforms

Smart Workspace

Quantified Self

802.11ahEmbedded Software and Systems Security

Internet of Things in InsuranceVehicle-to-Grid

Decisions andRecommendations as a Service

WeightlessMessage Queue Telemetry Transport

Machine Learning

High-Performance Message InfrastructureSmart City Framework

Autonomous VehiclesInternet of Things for Government

IT/OT Integration

Context Delivery ArchitectureiBeacons and Bluetooth Beacons

Intelligent Business OperationsSensor Fusion

Smart Transportation

Home Energy Management/Consumer Energy ManagementInternet of ThingsLow-Cost Development Boards

Consumer Smart AppliancesInternet of Things for Manufacturing Operations Wearable User InterfacesWireless Power Charging

Bluetooth 4

Complex-Event Processing

Big DataFacilities Energy Management

Operational Technology Security

Asset Performance Management

Advanced Metering Infrastructure

Machine-to-Machine Communication Services

Mobile HealthMonitoring

Operational TechnologyPlatform Convergence

Vehicle-to-InfrastructureCommunications

Enterprise Manufacturing Intelligence

AMQP

Vehicle-to-Vehicle Communications

RFID for Logistics and Transportation

ZigBee

Consumer Telematics

Wireless HealthcareAsset Management

Commercial Telematics

Page 20: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

What Can We Learn From “Legacy” IoT?

Over the past five years changes in

- Capability

- Deployment

- Connection

- External environment

of operational technology have forced changes within enterprises to secure OT.

What can we learn from them as we approach securing the Internet of Things?

19

Page 21: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Hype Cycle for Operational Technology

20G00246894

Page 22: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Operational Technology Exists in All Industries …

Operational technology is technology used in the running of a

business that senses or controls physical assets.

Page 23: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

The Things of OT & the Lesson of Target

NativeIP Equipment

LegacySCADA

IPConnectors

Page 24: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Strategic Planning Assumption

By 2017, half of global enterprises responsible for OT will have integrated IT/OT cybersecurity planning practices.

Reasons why SPA will be true:

• The budget for increasing

complexity in IT and OT security

requires cost savings moves.

• IT security technology is being

applied increasingly to OT

security problems.

• OT is the first of several integration

phases for security and risk in the

enterprise — stay tuned for

physical security and the

securing the Internet of Things.

Reasons why SPA may be false:

• Differences in mission, culture

and process will keep IT and

OT apart longer.

• Progress delays in technical

standards for OT security will

slow market adoption.

• Skills shortages will take longer

to overcome.

Page 25: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Part 3

How can organizations prepare for the IoT?

Page 26: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Understand your new role in the IoT security universe

Cybersecurity

Information Security

IT Security

OT Security

OT Security

PhysicalSecurity

IoTSecurity

IoTSecurity

Digital Security

Page 27: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Map the role of IoT security into the 2020 security scenario

Coalition

Rule

Neighborhood

Watch

Regulated

Risk

Controlling

Parent

TARGET

AUTHORITY

Enterprise Individual

Tribal

Monolithic

Page 28: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Embrace secure IoT practice as part of the new digital workplace

27

DataScience

CognitiveScience

BehavioralScience

SocialScience

Page 29: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Ensure your IoT strategy has privacy and trust as foundations

Privacy

Trust

Digital SecurityBuy It and Give Control to Customer

Earn It

Build It

Great products, services, experiences

Page 30: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Ensure that IoT and cloud security are part of the same framework

Security Services Broker

(Enterprise and cloud)

Enterprise Security Application 'Store'

Mobile,

OT and

IoT

Security

Services

Mobile,

OT and

IoT

Security

Services

The Digital Business Enterprise

Private

Cloud

Security

Services

Public

Cloud

Security

Services

Managed

or

Hosted

Security

Services

Managed

or

Hosted

Security

Services

Enterprise

Security

Infrastructure

Page 31: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Leverage Written Guidance, Frameworks and Methodologies

ISO/IEC 27001IEC 62443/ISA-99NIST SP Guides

ES-ISACDHS-TSA

DHS-CFAT

NERC CIP

RG 5.71

CERT

CPNI

ENISA

SANS

UCA

Strategy and Governance Management and Operations

Page 32: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Organizations Must Address the Security Skills Shortfall

OTEngineering

IT IT

Security

OT Security

Relationship and Relative Availability

Source: Protecting Industrial Control Systems from Electronic Threats, by Joseph Weiss

Page 33: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Security Architecture Becomes Critical

32

• Identify the constituencies – in the IoT constituencies are

not just people• Determine the number of different security baselines (2-5)

• Define baselines as control sets

• Map the constituencies, their boundaries and their shared functional requirements

• Define the connection requirements between

constituencies – specify proxies to support them with filtering and monitoring controls as appropriate

• Design a network architecture that creates zones, each at

or above a defined baseline, to contain each constituency.

Page 34: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Deploy an Adaptive Protection Architecture

33

Next-generation security protection platforms

Th

reat

Inte

llig

en

ce

Co

mm

un

ity In

tellig

en

ce

Ven

do

r L

ab

s

Po

licy

Vu

lnera

bil

ity In

sig

hts

Co

nte

xt

Continuous Monitoring

EmbeddedAnalytics

Page 35: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

IoTControlZones

Design for new security challenges in a world of ‘zones’

34

CoreIT

Zones

IT to IoTManagement

Zones

The World“Back office”

Page 36: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Recommendations

� Engage your business — make sure you know how they are developing IoT-related business initiatives.

� Actively increase awareness to the business of IoT security and risk implications and impact.

� Plug into industry initiatives and standards development around secure embedded systems and M2M communications.

� Establish education and training for selected security planners in IoT principles and concepts.

Page 37: The Next Wave: The Internet of Things and Security€¦ · Quantified Self 802.11ah Embedded Software and Systems Security Internet of Things in Insurance Vehicle-to-Grid Decisions

© 2014 Gartner, Inc. and/or its affiliates. All rights reserved.

Recommended Gartner Research

� Forecast: The Internet of Things, WorldwidePeter Middleton, Peter Kjeldsen, and Jim Tully (G00259115)

� What Securing the Internet of Things Means for CISOs Earl Perkins (G00259020)

� Cool Vendors in the Internet of Things, 2014 Alfonso Velosa and others (G00262623)

� The Impact of the Internet of Things on Data CentersFabrizio Biscotti and others (G00250562)

� Hype Cycle for the Internet of ThingsHung LeHong (G00252763)

For more information, stop by Gartner Research Zone.