Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics...

21
Enhance Production control with the Secure Desktop Provisioner

Transcript of Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics...

Page 1: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Enhance Production control with the Secure Desktop Provisioner

Page 2: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Agenda

Problem statementThreatsThreat Defense Technologies IAR Systems SolutionsSummary

Page 3: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Problem Statement

Page 4: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Supply Chains are complex

enterprise iot insights, 2017

All the news is about attacks here i.e.IoT devices in

service

But attacks can also occur here …

… and here

Page 5: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

IoT Supply Chains are even more complex

SoftwareApplicationDeveloper

IoTDeviceOEM

End User

Contract Manufacturer

SiliconPlatformVendor

ProvisioningCentre

ProgrammingCentre

Page 6: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Threats

Page 7: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Attacks targeting IoT devices

Top countries being targeted, and from which other countries, for the first half of 2019 (Source: F-Secure)

Page 8: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

What is driving attacks?

Page 9: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Surge in IoT device attacks

Visual summary of IoT topics discussed in five underground hacking communities (Source: Trend Micro)

https://www.bankinfosecurity.com/attacks-targeting-iot-devices-windows-smb-surge-a-13082

Page 10: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

The need for security has never been higher

0 5000 10000 15000 20000 25000 30000

Jewellery (71)

Pharmaceuticals (30)

Toys (95)

Perfumery and cosmetics (33)

Clothing, non knitted or crocheted (62)

Instruments, optical, medical etc. (90)

Watches (91)

Electrical machinery and equipment (85)

Articles of leather (42)

Clothing, knitted or crocheted (61)

Footwear (64)

Counterfeit Goods Seizures by Units **

* : OECD, April 2016. Trade in Counterfeit &Pirated Goods Mapping The Economic Impact**: OECD, April 2015. http://dx.doi.org/10.1787/888933345913

$500B+ per year• Intellectual property theft• Counterfeiting• Cloning and over-production

• Combined GDP of Ireland & Netherlands• Electronic devices Rank #4 & #6 by volume; #1 by

value• Overproduction & Counterfeiting Rampant• Offshoring has led to massive rise in issues• Transition of value moving to IP & Software

*

Page 11: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Threat Defence Technologies

Page 12: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Available security technologies

HSM

Root Certificate Authority

Self-signedRoot

Certificate

Root Private Key

Device

Device Private Key

Root Certificate Authority

DeviceCertificate

Digital Certificates

Public Key Infrastructures

Cryptography

Hash Algorithms

Page 13: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Hardware TechnologiesHardware Security Modules (HSM)

Trusted computers with the following features:o Perform cryptographic operations

• Key generation• Certificate generation/signing• HASHing functions• True random number generation (with good entropy)

o Manufactured with specialised hardware• Tamperproof

‒ Shrouded by conductive mesh‒ Encased in epoxy resin

o Runs on security oriented OSo Limited network accesso Management access controlled by strict processeso Actively hides and protects cryptographic material

Page 14: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Our solutions

Page 15: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Security Development Tools

Page 16: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Embedded Trust• Integrates identity and certificate

management• Implements a Secure Boot Manager• Protects your IP by inhibiting

unauthorized manufacturing• Provides secure deployment with

integrated manufacturing mastering• Enables release management with

versioning and update infrastructure

Page 17: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

C-Trust

• Implements a Secure Boot Manager• Protects your IP by inhibiting

unauthorized manufacturing• Provides secure deployment with

integrated manufacturing mastering• Enables release management with

versioning and update infrastructure• Plug-in to IAR Embedded Workbench• C-STAT static analysis tool

Page 18: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Secure Desktop ProvisionerKey benefits

– Easy import of Secure Production Packages from C-Trust

– No additional security measures required, such as secure rooms

– Supports multiple products from multiple designers/OEMs

– Runs on a modern desktop or laptop– Example application to provision “out-of-the-box”– Full integration into IAR Embedded Workbench and

C-Trust development tools

Page 19: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Export Options

Create new versionand Master

Generate Encrypted User Application

Create secure Production Package for manufacture

Sign & authorisemanufacturing

Cloud Service

Page 20: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Secure Desktop Provisioner softwareSimple to use application allows:

o Selection of product to provisiono Selection of number of boards to provisiono Multiple target boards to be connected and

provisioned simultaneously (up to max of 4)o Semi-automated operationo Provisioning of authorised quantities only

Page 21: Enhance Production control with the Secure Desktop Provisioner...Toys (95) Perfumery and cosmetics (33) Clothing, non knitted or crocheted (62) Instruments, optical, medical etc. (90)

Summary

• We make security simple• We provide software and hardware

tools that ensure secure provisioning