IoT Security Challenges and Solutions
IoT Security Challenges and Solutions
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
IoT Is Here Now – and Growing!
50
50 Billion
“Smart Objects”
40
Adoption rate of
Billions of Devices
digital infrastructure:
30 5X faster than
electricity and telephony
Inflection
point
20 25
12.5
10
World Population
6.8 7.2 7.6
0
Timeline
2010 2015 2020
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Relation to Internet of Everything (IoE)
People Process
Connecting people in more Delivering the right information
relevant, valuable ways to the right person (or machine)
at the right time
IoE
Data Things
Leveraging data into more useful Physical devices and objects
information for decision making connected to the Internet and each
other for intelligent decision making
Information Operational
Technology Technology Smart
Objects
(IT) (OT)
7
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Smart City
Reduced congestion
Improved emergency services response times
Lower fuel usage
Increased efficiency
Power and cost savings
New revenue opportunities
Online entertainment
Mapping, dynamic re-routing, safety and security
Reduced congestion
Increased efficiency
Safety (hazard avoidance)
Knowledge
Information
01010100101010101010101010101
Data 01010101010001010100101010101
01110101010101010101 Less Important
Applications
Application Interfaces
Unified Platform
Infrastructure Interfaces
Infrastructure
11
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
… but it also adds complexity.
APPLICATION
New AND BUSINESS
Business Models INNOVATION
Partner Ecosystem
Application
Data Integration Big Data Applications
Analytics Control Systems
Integration
Application Interfaces
Unified
APPLICATION Platform PLATFORM
ENABLEMENT
Infrastructure Interfaces
+
> “Hactivism”
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Security Challenges
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
IoT Security Challenges
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
IoT Expands Security Needs
New Applications
Threat Diversity
Impact and Risk
Remediation
Protocols
Compliance and Regulation
IoT CONNECTIVITY
17
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Mitigating The Security Risk Across the Extended
Network – The 20,000 FT View
IT and OT are Inherently Different
IT OT
• Connectivity: “Any-to-Any” • Connectivity: Hierarchical
• Network Posture: Confidentiality, • Network Posture: Availability, Integrity,
Integrity, Availability (CIA) Confidentiality (AIC)
• Security Solutions: Cybersecurity; Data • Security Solutions: Physical Access
Protection Control; Safety
• Response to Attacks: • Response to Attacks: Non-stop
Quarantine/Shutdown to Mitigate Operations/Mission Critical – Never
Stop, Even if Breached
19
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
IT/OT Converged Security Model
IT
Cloud
Network Security
Enterprise Network
Application Control
Identity Services
DMZ Demilitarised Zone
Secure Access
OT
Supervisory
Config
Mgmt
Automation & Control
Presentation_ID 20
Cisco and/or its affiliates. All rights reserved. Cisco Public
The Secure IoT Architecture – IT Plus OT!
APPLICATION
New AND BUSINESS
Business Models INNOVATION
Partner Ecosystem Cloud-based
Threat Analysis /
Protection
Data Control Application
Integration
Big Data Applications
Analytics
Systems Integration
Network and
Perimeter
Application Interfaces Security
End-to-End Data
Encryption
Device and Sensor Innovation
21
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Cisco Security Model
Attack Continuum
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Security/Attack Continuum - IT
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Security/Attack Continuum - OT
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Mitigating The Security Risk Across The Extended
Network – Technical View
Exposure In IoT Networks
MITM
• Sniff traffic MITM
• Modify data • Sniff traffic Compromise
• Impersonation • Modify data • Unauthorized use
• Impersonation • Malware infection
• Service disruption
Compromise
• Unauthorized
Compromise access
• Unauthorized access • Device tampering
• Device tampering
• Service disruption
Compromise • Service disruption
• Unauthorized • Sniff traffic
• Sniff traffic
Hack Device access
• Unauthorized device • Device tampering
• Device tampering • Service disruption
• Malware infection • Sniff traffic
management
BEFORE
Before DURING
During AFTER
After
Control Detect Scope
Discover
Enforce Block Scope
Contain
Harden
Enforce Defend Remediate
Contain
Harden Remediate
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public 27
BEFORE an attack
management
DURING an attack
www
AFTER an attack NF analyzer policy server (ISE) web security email security
firewall
ips
advanced malware protection
Profiling
• ISE builds device database by MAC address
• Profile with SNMP (LLDP), DHCP, NMAP, www
NetFlow drives MAC-based access policy NF analyzer policy server (ISE) web security email security
• ISE manages policy
Benefit firewall
• Visibility and access control ips
• MAC linked with device ID and location advanced malware protection
MAB
802.1x
• Authenticates device before activating
access www
• ISE manages policy NF analyzer policy server (ISE) web security email security
Benefit
• Operational simplicity and control firewall
• Dynamic device authentication ips
• Single policy management advanced malware protection
SGT / SGACL
• Tags traffic based on device policy
• Enforces access control based on tag www
• ISE manages policy NF analyzer policy server (ISE) web security email security
Benefit
• Operational simplicity and speed firewall
• Dynamic, topology-independent ips
enforcement advanced malware protection
NetFlow Analyzer
• Collect full NetFlow across network
• Detect behavioral anomalies www
• ISE provides context NF analyzer policy server (ISE) web security email security
Benefit
• Full threat visibility firewall
• Detect threats in any part of network ips
• Detect access abuse advanced malware protection
NF NF NF
IPS / AMP
• Monitor traffic and file threats www
WSA / ESA
• Reputation-based web threat blocking www
• Reputation-based email threat blocking
NF analyzer policy server (ISE) web security email security
Benefit
• Block advanced web / email threats
• Intelligence-driven threat detection firewall
ips
advanced malware protection
NF Analyzer
• Record 90 days of communications
activity www
• Scope extent of breach NF analyzer policy server (ISE) web security email security
• Report policy and compliance
Benefit firewall
• Full Accountability ips
• Map threat trajectory advanced malware protection
• Evidence-based auditing
NF
NF NF NF
IPS / AMP
• Retrospective analysis of threats www
• Contain infected devices and files
• ISE provides quarantine NF analyzer policy server (ISE) web security email security
Benefit
• Fast threat scoping and remediation firewall
ips
• Trace and eliminate infections with the advanced malware protection
click of a button
• Map threat trajectory
✖ ✔
On-Prem
SSL:443 | 32137
FireSIGHT Management Center
proxy SaaS Manager
Heartbeat: 80
#
FireSIGHT/ASA Sensor #
Telemetry
Stream
Process Information
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Analyse The IoT Threat!
1. Submission
Analyst (portal) or system (API) submits
suspicious sample to Threat Grid.
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Threat I00I III0I III00II 0II00II I0I000 0110 00 100I II0I III00II 0II00II I0I000 0II0 00
Research
II II0000I II0 101000 0II0 00 0III000 III0I00II
Intelligence 10I000 0II0 00 0III000 II1010011 101 1100001 110
I00I II0I III00II 0II00II 101000 0110 00 Response
1100001110001III0
110000III000III0 I00I II0I III0011 0110011 101000 0110 00
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Bringing It All Together
Network-Wide Security with Differential Applications
Security Activity IT OT
• Role-based access to few
• Role-based access for
individuals
individuals and groups
• VPN to few systems and users
Secure Access • VPN/remote access for most
• Badge readers/integrated
systems throughout the network
sensors
• Complex passwords with
Before • Simplified passwords (except
lockout policies
for the most critical systems)
• Tags traffic based on device • Enhanced segmentation for
policy required groups only
Security Group Tagging
• Enforces access control based • Dynamic, topology-
on tag independent enforcement
Intrusion Prevention/Detection IPS – enforces policies IDS – sends security alert only
Analysis of the threat to determine
Threat Mitigation Quarantine affected system
appropriate action
During
Combined physical and
Data Integrity and Confidentiality Data Loss Prevention (DLP)
cybersecurity access controls
Network-wide Policy Enforcement Differentiated actions based on value, function, and location of the device
50
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public
Conclusion: Securely Embrace IoT!
New challenges require new thinking!
– avoid operational siloes
– networking and convergence are key
– a sound security solution is integrated throughout
– build for the future
Security must be pervasive
– inside and outside the network
– device- and data-agnostic
– proactive and intelligent
Intelligence, not data
– convergence, plus analytics
– speed is essential for real-time decisions
52
Presentation_ID Cisco and/or its affiliates. All rights reserved. Cisco Public