Integrated Security Management Framework · Establishing an Integrated Security Management...

14
Integrated Security Management Framework Critical for Securing the Future of IoT Nampuraja Enose Principal Consultant- Industry 4.0 / Industrial Internet 17 Nov 2016

Transcript of Integrated Security Management Framework · Establishing an Integrated Security Management...

Page 1: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Integrated Security Management Framework

Critical for Securing the Future of IoT

Nampuraja Enose

Principal Consultant- Industry 4.0 / Industrial Internet

17 Nov 2016

Page 2: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Internet Of Things – The Vision2

Integrated Informed Intelligent

Equipment and Systems seamlessly

interconnected to collaborate with

each other in entirely new ways

Leveraging big and small data to

draw real-time visibility to drive

innovation and growth

Advanced analytics and data-driven

diagnostics to optimize processes

leading to autonomy

Instrumented

Cyber-Physical Systems

Interoperable Networks

Big Data Processing

Real-time Visualization &

Advanced Analytics

Enabling Platforms

Disruptive Technologies

Ability to sense, measure and

monitor the condition of almost

everything

MONITOR MANAGE AUTOMATE

Page 3: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

It is Happening!3

Past 15 years

A B2C Revolution

Next 10 years

A B2B Revolution

• Cisco projects 40 billion intelligent things connected by 2019

• ABI Research estimates 35 billion networked devices by 2019

• IDC predicts 212 billion devices connectable by 2020

• Gartner anticipates 19 billion IoT devices by 2019 & 25 billion by 2020

• Harbor projects 21.7 billion IoT devices by 2019

• Business Insider Intelligence estimates 23.4 billion IoT devices by 2019

Source: Intel Intelligent Systems

Page 4: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

The Billions of Devices and Trillions in Impact4

Source: McKinsey Global Institute (MGI); Findings from the Infosys – FIR Joint Study on Industry 4.0 ‘The state of the Nations’

Performance Efficiency

Maintenance Efficiency

Information Efficiency

Service Efficiency

Energy Efficiency

20-25%Equipment Efficiency

& Effectiveness

20-40%Increase in

Equipment Lifetime

30 - 40%Service Margin

5- 10%Saving in

Business Expenditure

25%Reduction in

Energy Consumption

$3.9 trillion -11.1 trillion per year in 2025- McKinsey

Add about $15 trillion to global GDP

by 2030

- GE

To grow at CAGR of 7.9% reach $8.9 trillion by 2020

- IDC

IOE a $19 Trillion opportunity

- Cisco

Projected Economic Benefits

Page 5: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Delayed IoT Adoption? Security and Privacy may be the Reason5

The Security threat is more serious than you think

Control systems, vehicles, homes and even the human body can be accessed and manipulated causing injury or worse

– CSA (cloud security alliance)

secu

rity

led

ger

.co

m

Ref. SmartFactory, DFKI

80 Percent of Best-Selling Small Office/Home Office (SOHO)

Wireless Routers Have Security Vulnerabilities

Security is definitely one of the biggest barrier for IoT adoption

Page 6: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

6

Big Data Processing

Seamless Interoperability

Advanced Analytics

Smart

Applications &

Services

Cyber Physical Systems

Shop-floor

ERP

MES

SCM

Producer(smart) Supplier

(smart) Customer

Cyber

meets

Physical

Systems

Source: Infosys & FIR

What does it Mean to be on ”Internet of Things?

IT- OTIntegration

Ressource Flow

Information Flow

“cyberizing the physical”Amplifying physical subsystems with

computational abstractions

“physicalizing the cyber”expressing abstractions of software

components to represent physical systems

• Edge Intelligence• Semantic Interoperability

Synchronous

operation

Asynchronous

operation

The IT – OT Convergence

Page 7: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

7

Shop-floor

ERP

MES

SCM

Producer

Source: Infosys & FIR

What does it Mean to be on ”Internet of Things?

Horizontal Integration

Ve

rtic

al C

on

ve

rge

nc

e

Big Data Processing

Seamless Interoperability

Advanced Analytics

Smart

Applications &

Services

Cyber Physical Systems

Establishing an end-to-end ‘digital thread’ of the physical world, across the (manufacturing) value-chain enabled by the advent of cyber-physical systems (CPS)

Sensor Level

Device Level

Supply chain Level

Control Level

Entrprise Level

IOTServices

The Horizontal and Vertical Convergence

Page 8: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

8

Shop-floor

ERP

MES

SCM

Producer(smart) Supplier

(smart) Customer

Source: Infosys & FIR

What does it Mean to be on ”Internet of Things?

The IoT architecture may be built from the ground up to leverage IoT (greenfield) or may belegacy devices that will have IoT capabilities added post-deployment (brownfield)

Big Data Processing

Seamless Interoperability

Advanced Analytics

Smart

Applications &

Services

Cyber Physical Systems

Brown Field Green Field

IT- OTIntegration

Ressource Flow

Information Flow

The Brown-Field and the Green-Field

Page 9: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Layered and Flexible Security

Architecture – for optimal security

IT – OT Security

Building Security from the ground up

(greenfield) or top down (brownfield)

Establishing an Integrated Security Management Framework

9

Device Security

Network Security

Data Security

Information Security

Application Security

Physical Devices Layer Device Security

Network Infrastructure Layer

Network Security

Data Processing Layer Data Security

Information Provisioning Layer

Information Security

Applications Management Layer

Application Security

The Layered Architecture with its Key Security Attributes

IoT Security

Internet of Sensors

Inter-Networks

Internet of Data

Internet of Insights

Internet of Services

End point Authorization

End point Authentication

Device Identity

Intrusion Detection

Physical Security

Device/ Data Integrity

Identity Management

Autonomous device coordination

Interoperability

Network Firewalls

Transport Layer Security

Dynamic traffic shaping

Network Segmentation

Routing protocolsecurity

Wrapper and Proxy

Lightweight Cryptography

Encrypted storage

Signature dataMemory

Memory Integrity Checks

AdvancedEncryption Std.

Machine data management

Data accessibility management

Notification Services

PII Security (Privacy)

Data Obfuscation

Digital Signatures

Configuration Data Protection

Stored data Encryption

Hybrid cloud security

Masking Engines

Usage policy Enforcement

User identity ´management

Application Integrity

Malware Protection

Anti-virus

Sandboxing

API Security

Recommended Security Controls

Page 10: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Establishing an Integrated Security Management Framework

Layered and Flexible Security

Architecture

IT – OT Security

Building Security from the ground up

(greenfield) or top down (brownfield)

10

• Physical Security

• Access Controls

• Patch Management for industrial control systems

• Firmware Security

• OS security

OT Security

• Data At Rest (DAR) • Data In Transit (DIT)• Data In Use (DIU) • Data Loss Prevention (DLP) • Data Integrity • Aggregation Policies

IT Security

Physical Devices Layer Device Security

Network Infrastructure Layer

Network Security

Data Processing Layer Data Security

Information Provisioning Layer

Information Security

Applications Management Layer

Application Security

The Layered Architecture with its Key Security Attributes

IoT Security

Internet of Sensors

Inter-Networks

Internet of Data

Internet of Insights

Internet of Services

OT Security

IT Security

Page 11: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Establishing an Integrated Security Management Framework

Layered and Flexible Security

Architecture

IT – OT Security

Building Security from the ground up

(greenfield) or top down (brownfield)

11

• Security in Design

• Secure Systems Engineering approach

• Green Field• Bottom up

In-built Security

• External Security Layers

• Brown Field

• Top down

Add-On Security

Physical Devices Layer Device Security

Network Infrastructure Layer

Network Security

Data Processing Layer Data Security

Information Provisioning Layer

Information Security

Applications Management Layer

Application Security

The Layered Architecture with its Key Security Attributes

IoT Security

Internet of Sensors

Inter-Networks

Internet of Data

Internet of Insights

Internet of Services

In-built Security

Add-On Security

Page 12: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Integrated Security Management - Implementation

12

Physical Devices Layer

Network Infrastructure

Layer

Data Processing Layer

Information Provisioning

Layer

Applications Management

Layer

INTEGRATED SECURITY MANAGEMENT

Surv

iva

bili

ty

Rel

iab

ility

Ava

ila

bil

ity

Res

ilie

ncy

Ass

ura

nce

Distributed Decentralized Lightweighted End to End Collaborative

The Key Principles

• Blockchain • Edge Intelligence• Autonomy

• Peer to peer • Threat Modelling• Incident Response• Lfe cycle controls / Audit

• All stakeholders

Page 13: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

© 2013 Infosys Limited, Bangalore, India. All Rights Reserved. Infosys believes the information in this document is accurate as of its publication date; such information is subject to changewithout notice. Infosys acknowledges the proprietary rights of other companies to the trademarks, product names and such other intellectual property rights mentioned in this document. Exceptas expressly permitted, neither this documentation nor any part of it may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, printing,photocopying,recording or otherwise, without the prior permission of Infosys Limited and/ or any named intellectual property rights holders under this document.

Thank [email protected]

Page 14: Integrated Security Management Framework · Establishing an Integrated Security Management Framework Layered and Flexible Security Architecture IT –OT Security Building Security

Integrated Security Management - Implementation

14

Key Principles

Distributed

– Blockchain

Decentralized

– Edge Intelligence

– Autonomy

Light weight

– Peer to Peer

End to End perspective

– Threat Modelling

– Optimum approach

Physical Devices Layer

Network Infrastructure

Layer

Data Processing Layer

Information Provisioning

Layer

Applications Management

Layer

INTEGRATED SECURITY MANAGEMENT

Surv

iva

bili

ty

Rel

iab

ility

Ava

ila

bil

ity

Res

ilie

ncy

Ass

ura

nce