towards a (secure ? !) digital nation - nceg · 2018-04-20 · architecture, physical offices,...

35
Towards a (Secure ? !) Digital Nation Vision, Strategy and Roadmap Sanjay Deshpande Managing Partner & Chief Scien1st FortyTwo42 Labs Date: 9 th January 2017

Upload: others

Post on 27-Mar-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Towards a (Secure ? !) Digital Nation

Vision, Strategy and Roadmap

SanjayDeshpandeManagingPartner&ChiefScien1st

FortyTwo42LabsDate:9thJanuary2017

Page 2: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

The Structure

Real-Timee-Governance

[TheGoal]

DigitalTrust[Fidelity]

TheReality[Introspec=on]

TheVision[TheFuture]

TheStrategyandRoadmap

[GamePlan]Ac=onPlanandHope

Page 3: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  UnitedKingdom:TimeboundprogramslaunchedforSecureSmartCi=esandFINTECHinnova=ons

•  India:MassivepushforDigitalFinancialEcosystemandReal-Timee-Governance

•  Switzerland:SwisscomSecureIOTnetwork

•  SouthKorea:DeploymentofubiquitoussensornetworkdedicatedforIOTdrivenpublicservices

•  Germany:Na=onalpriori=za=onforIndustry4.0

Key Global Initiatives in Secure Digital Transformations

Page 4: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Towards a (Secure?) “Digital Na7onal” NextGenera=onStrategyforEconomicGrowth,GovernanceandPolicyExecu=on

Page 5: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Makeeconomicenvironmentconduciveforinnova9onIns9tu9onbuilding,publicskilldevelopmentandtrainingEfficient,equal,transparent,servicesdeliverytoallci9zensCreateopendebateaboutacceptabilityofnewsystems,par=cularlyrelatedtoprivacy,safety,security,andresilienceCreateandsupportdynamic,compe99vemarket

Government’s Role in Accelerating Economic Growth

Page 6: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

PrimeMinisterShriNarendraModilaunchedtheDigitalIndiaprogramwithavision“totransformIndiaintoadigitallyempoweredsocietyandknowledgeeconomy”CoreAreas•  Digitalinfrastructureasau=litytoeveryci=zen•  Governance&servicesondemand•  Digitalempowermentofci=zens•  Digitaleconomy•  Cyber-physicalengagement

The DIGITAL INDIA VISION

Page 7: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Ref:LayneandLeeModelofe-Governance

eGovernment Maturity Model: Type 1

Page 8: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Ref:AndersenandHenriksen

e-Government Maturity Model: Type 2

Page 9: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Fidelity of Real-Time eGovernance

TransformingeGovernancetoReal-TimeeGovernance@theSpeedof“?”:Ci=zensareaveryimpa=entlotFidelityofeGovernanceanditsfundamentalroleWhataboutDigitalTrustandhowtoachieveit?

Page 10: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

IFWEDON’TFIXANDINSTALLANATIONALCYBERSECURITYINFRASTRUCTURE…WITHAMISSIONMODEPRIORITY….….WEAREHEADINGFORAMASSIVEDISRUPTIONINECONOMICGROWTH.PERIOD.

Page 11: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

DIGITAL TRUST Why,WhatandHow?

Page 12: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

PrivilegedandConfiden=alInforma=on12

Real-TimeeGovernanceneedstoensurefidelityoftheirdigitaltransac=ons,whiledeliveringdigitalservicesacrossvariouschannelstoitsusersinordertopreventcyberfraud.

What is Digital Trust?

Page 13: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

PrivilegedandConfiden=alInforma=on

Allthetransac=ngpar=esareauthen=cated

Transac=ondetailsareprivate

Transac=onisnotmodified/tamperedlater

Transac=ngPar=escannotdenythe

transac=oninthefuture

Transac=onisauthorized&verified

Mul9-PartyIDENTITY&

AUTHENTICATION

DynamicKeyDataENCRYPTION

EmbeddedDATAINTEGRITY

In-LineTransac9onSiging

NONREPUDIATION

WorkflowbasedAUTHORIZATION&

VERIFICATION

13

DeliveringTransac9onFidelitywithaSingleUnifiedTechnology.Seamlessly.

Page 14: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

The Reality Introspec=on

Page 15: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  Theendusersofthee-GovernmentinfrastructureremainvulnerabletovarietyofthreatssuchasPacketSniffing,Probe,Malware,InternetInfrastructureAeacks,DenialofService(DOS)Aeack,RemotetoLocal(R2L)Aeack,UsertoRoot(U2R)Aeack

•  Datathe],financial/digitaltransac9ona_acks,corrup=onofdata,defacement,extor=on,cyberbullying,intellectualpropertytheh,businessespionage.

•  Governmentalins=tutesandcri=calinfrastructuresbearsignificantweightintheamountofaeackstheyencounter.

•  Anaeackermayhavepoli9cal,economic,military,intellectualandfinancialaims.

•  Mosthighimpacta_acksarenoworchestratedbyna9onstates.

Current Threat Landscape

Page 16: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

PrivilegedandConfiden=alInforma=on16

WeimportmostofthecybersecuritytechnologiesfromrestoftheworldTherearenoincen9vestructuresforbuildingindigenouscu`ngedgenextgenera9oncybersecuritytechnologiesAna9onalpriorityoncrea9ngarobustcybersecurityinfrastructureisfundamentallymissingAcultureofinnova9onandleadershipinbuildingbothdefenceand“a_ackfordefence”plabormsisdormantinspiteoftheavailabilityofvastamountoftalentandcapitalWeworkinsilosandgroups(whilethehackersworkcollec9velyasonevirtualunit)

Current Innovation Scenario

Page 17: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

PrivilegedandConfiden=alInforma=on17

LackofEnd-to-EndIden9ty,Authoriza9onandControlWorkflow

CostandComplexityofSecuritystSta9cSecurityPosture

PoorUsability

LowerAdop9onLoweradop=on,lowercustomeracquis=onandcannotbeprovisionedforalltransac=ontypes,customertypesandacrossalldigitalservicesduetocost.

Current Technology Scenario

Page 18: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

The Vision: Secure Hi-Fidelity Real-Time eGovernance LeadingtheWorldthroughCukngEdgeInnova=oninSecureCompu=ngandCommunica=ons

Page 19: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

To create a world-class secure and safe real-time eGovernance “ecosystem” that is built on top of a future proof, dynamic and evolving national cyber security infrastructure to protect the Citizens, the Financial, Industrial Ecosystem and Indian Defence from external and internal cyber threats to rapidly accelerate the economic growth of the country.

THE VISION

Page 20: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Sohwaredefinedautomated,machinelearningadap=veagile

securitycontrolplalorm.

Adap9veDigitalControl

ControlLifeCycleManagement[Design,Provision,Opera9onalize,Monitor,Adapt]

So]wareDefinedControlModel

DigitalAssets[Transac9ons,IOT,Devices,Apps,Docs,Data]

So]wareDefinedIden9ty

Crypto-ID

PrivilegedandConfiden=alInforma=on20

Technology Vision : Towards Adaptive Security Control

Page 21: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

PrivilegedandConfiden=alInforma=on21

CryptographicIden=ty

UserIDsGoogle,Facebook,MobileNumber

EnterpriseIDsAccountNumber,

InternetBankingUserID

Users/Enterprises/

Things[Iden9tyChaining]

GovernmentIDs

Aadhaar,Passport,PAN

IDVxI-AM™Iden=ty

Verifica=onIndex

Iden==esareestablished

Transac=onisPrivate

Transac=onissealed NobodycandenyTransac=onisverified

IDENTITY ENCRYPTION DATAINTEGRITY

NONREPUDIATIONAUTHORIZATION

UnifiesEnd-UserIden99esEnablesIden9tyChaining

DynamicConfigurableVerifica9onIndexPKIGradeCryptoStrength

THE IDENTITY

Page 22: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

A Non-PKI Digital World::[An Example of Disruptive Innovation] @ FortyTwo Labs in Vizag

Computa=onally(QuantumCompu9ng)SecureCryptographicIden=ty

NoChainNoAuthority

MassivelyScalableSimpleCostEffec9ve

CredibilityBasedPeer-To-PeerTrustNetworks

UnifiedIden=tyModel

Media9onbasedIden9tyGenera9onandDistribu=onModel

Adap9veandEvolving

BEYOND PKI

Page 23: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

The Strategy and Roadmap A (7me bound!) Execu7on

Page 24: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

#1 End-to-End Integrated Adaptive Holistic Security Control Ecosystem

PeripheralDefense

NetworkDefense

HostComputersDefense

Applica=onProgramsDefense

DataDefense

PhysicalSecurity

Page 25: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  Collabora9veModel

•  Securingtheen9reinter-connectedchain

•  CyberWarfareReadinessandAn9-Terrorism

•  IntegratedReal-TimeCERTandCyberThreatIntelligence

•  IndigenousPreven9on/Defense/A_ackSolu9ons

#2 Components of a Holistic End-To-End National Cyber Security Ecosystem

•  BestinClassGlobaldetec9onsolu9ons&SIEM/SOC

•  IncidentResponse(Tools,Processes,SkillsandValues)

•  BusinessCon9nuityandDisasterRecovery

•  PhysicalSecurity

Page 26: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  Step1:Mapallthecri9calna9onaldigital(andsome9mesnon-digital)assetsvis-à-visthethreatvectors.Thismightincludesecurityprocedures,datastores,networkarchitecture,physicaloffices,centralservers,portabledevices.

•  Step2:Conductadetailed/comprehensivena9onallevelthreatlandscapesurvey-thisanalysiswillhelpcreateacoherentriskmapthatenablescontrols,andsecuritymeasurestobeputintoplaceinanintelligentmannerwhiletakingintoconsidera=onthetruenatureoftheexposure.

•  Step3:Iden9fyallthecontours/perimetersofdefense/a_ack–thisanalysisshouldcoveralltheusers,devices,applica=ons,servers,network,anddatacenter(hardwareandsohware).

•  Step4:Define,ProvisionandEnforcePoliciesandrelevantsecuritytechnologiesforeachoftheassetsinthecontoursinrela=ontothecyberthreats

#3 Securing the National Digital Infrastructure : A Four Step Process

Page 27: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  UserIden=tyandAuthen=ca=onPolicies/Technologies

•  Device/IOTAuthen=ca=onPolicy

•  DataEncryp=onStandards

•  Applica=onDevelopmentProcess

•  DataCenterAccessPolicies

•  Applica=onandDeviceAccesspolicy

#4 Design and Deploy Holistic End-To End Security Controls

•  Con=nuousThreatMonitoring

•  Businesscon=nuitytechnologiesandpolicies.

•  Iden=tyandAccessmanagementpoliciesandinfrastructure.

•  Privilegedaccesscontrolpoliciesanddatabreach/leakagedetec=onandcontrol

SYSTEMSENGINEERINGAPPROACH

Page 28: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  Na9onalCyberSecurityThreatindexshouldbedefinedandcomputedinreal-=meandcommunicatedtoalltheconcernedstakeholders.

•  Suchanindex(likethestockmarket)willprovidethecurrent“temperature”ofthecyberthreattoalltheconcernedstakeholdersinreal-9meforthemtoac9vatetherequiredresponsestrategiesinreal-=metherebydras=callyreducingthethreatresponsereac=on=mes.

•  TheNa9onal/StateLevelCyberSecurityIndexisareal-9memeasureoftherisktothecorporate,industrial,andgovernmentalinforma9oninfrastructurefromaspectrumofcybersecuritythreats.

•  Itisbasedbothonthesen9mentaswellasreal9medatacollectedonthecyberthreatsfromacrosstheecosysteminrecogni=onoftherapidchangeincybersecuritythreatsandpostures,thestateofcybersecuritymetricsasaprac=calart,andthedegreeofuncertaintyinanyrisk-centeredfield.

#5 National and State Level Real Time Cyber Security Threat Index

Page 29: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  CyberSecurityMaturityModelwillenablethestatetomeasurethecybersecuritymaturitylevelvis-à-visastandardmodel.

•  Thesemodelscanbecustomizedforvariousdigitalen99eswithinthecybersecurityecosystem–ci=zens,enterprises,governmentdepartmentsandcri=calinfrastructure.

•  Theoverallna9onalcybersecuritymaturitylevelcanbemodeledasanintegra=onoftheseindividualsub-models.

•  Thestatecanfurtherenforce/recommendcompliancebyci9zens,enterprises,governmentdepartmentsinaccordancetothismaturitymodel.

#6 Cyber Security Maturity Model for eGovernance Ecosystem (CSM2 for eGov)

Page 30: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

CyberSecurityClusteris-  anetworkofdedicatedcyberandinfosecurityspecialists,investors,start-ups,academia,researchins9tutes,privatelabscomingtogetheringroups

-  whoac9velyworktocreateuniquesolu9onsandbuildIPfore-Governance,na9onalcri9calinfrastructuresecurityandothercommercialcybersecuritytechnologies.

# 7 Create World Class Cyber Security Clusters

Page 31: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

•  TheseCybersecurityclusterswillactasacatalysttosupportthemembersoftheclusterbycommunica=ngstrategicini=a=vescri=caltostatee-Governanceimplementa=on

•  Theywillprovideanetworkingplalormtoshareideasandbestprac=ce,canfindnewwaystogrowandspurinnova=onandtechnologyIPcrea=oninthefieldofcybersecurity.

•  Specialistcybersecuritycompanies,labs,R&Dcenterswillbuildcybersecurityknowledge,skills,andcapabili=esintheregion,tomakebusinessesmoreresilienttocyber-aeacks.

•  APGovt’sfastandcollabora=veapproachenablesandplacesAPGovt.tobealeaderinthefieldofcybersecurity.VizaghasalreadylaunchedIndia’sfirstCyberSecurityandFINTECHcluster.

# 7 Create World Class Cyber Security Clusters

Page 32: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

# 7 Create Frameworks and Policies for Secure IOT Infrastructure for Secure Smart Cities, Real-Time Sensor Data Networks for Agriculture and Home Land Security

•  Ins=tu=onalizeandprovisionapolicyforsecuringIOTinfrastructuretoensurethesafetyofthecyber-physicalworld

•  Set-upstateandna=onalLevelR&DCentersinaPPPmodeltodevelopnewsecuritymodelsandtechnologieswillberequiredtobeinnovated

•  Iden=fycri=calinfrastructure(smartci=es,surveydata,agriculturedata,homelandsecurity/drones/surveillance)andsecurethemonhighestpriorityina=me-boundmanner

Page 33: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

Trustingovernmentisoneofthemostpreciousstateassets.Publicsupportcanhelpmobilizeambi9ousandinnova9vegovernmentpolicies.Necessarycybersecuritymeasuresmustbeincorporatedbydesignintothesystem.Aholis9ccybersecurityinfrastructureisthefundamentalbuildingblockontopofwhichsafeandsecureRealTimee-GovernancedeliverysystemscanbebuiltAPStateandVizagiswellpoisedtoleadthecountryandtheworld.Inordertofulfillthisvisionthestateleadershipwillhavetopriori9zeandallocatethenecessarybudgets,andexecutethecri9calcybersecurityrelatedini9a9vesina9meboundandmissionmode.

Way Forward The VIZAG Cyber Security Cluster

Page 34: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

We should aim to be bold,

courageous, and innovative

Page 35: Towards a (Secure ? !) Digital Nation - NCeG · 2018-04-20 · architecture, physical offices, central servers, portable devices. • Step 2: Conduct a detailed/comprehensive naonal

[email protected]

@VIZAG

India’sFirstCyberSecurityand

FintechClusterwithanAmazingBeach!