IoT Security and Horizontal Integration

38
Eliot Lear Released: September 12, 2016 IoT Security and Horizontal Integration

Transcript of IoT Security and Horizontal Integration

Page 1: IoT Security and Horizontal Integration

Eliot LearReleased: September 12, 2016

IoT Security and Horizontal Integration

Page 2: IoT Security and Horizontal Integration

What’s a Thing?

Smart thermostatRefrigeratorsParking meters Security cameras

Hospital equipmentPrintersInfusion pumps Smart lighting

Point of saleTraffic lightsHVAC system Baby monitor

Page 3: IoT Security and Horizontal Integration

For Today

A thing is a networked device that has a single or small number of intended uses.

Page 4: IoT Security and Horizontal Integration

Number of connected devices (Billions)

0

10

20

30

40

50

60

2012 2013 2014 2015 2016 2017 2018 2019 2020

Page 5: IoT Security and Horizontal Integration

• Entire house Internet-enabled

• A single lightbulb took down his IoT house.

• It was an SNMP bug.

Introducing Raul Rohas

From Fusion.net (3 March 2015)

Page 6: IoT Security and Horizontal Integration

• Japanese Bluetooth toilet hacked• Remote flushing• Lid open and close• Bidet activation

It’s not just lightbulbs

Page 7: IoT Security and Horizontal Integration

• German smelting plant was hacked

• Blast furnace was taken over

• Not able to be shut down

Not just the house

By AMIR MARINE - Own work, CC BY-SA 3.0, https://commons.wikimedia.org/w/index.php?curid=28937609

Page 8: IoT Security and Horizontal Integration

Many vertical approaches: Here is industrial (ISA99)

8

Level 5

Level 4

Level 3

Level 2

Level 1

Level 0

Terminal Services

Patch Management AV Server

Application Mirror

Web Services Operations

ApplicationServer

Enterprise Network

Site Business Planning and Logistics NetworkE-Mail, Intranet, etc.

FactoryTalkApplication

Server

FactoryTalk Directory

Engineering Workstation

Domain Controller

FactoryTalkClient

Operator Interface

FactoryTalkClient

Engineering Workstation

Operator Interface

Batch Control

Discrete Control

Drive ControlContinuous

Process Control Safety Control

Sensors Drives Actuators Robots

Enterprise Zone

DMZ

Manufacturing Zone

Cell/Area Zone

WebE-Mail

CIP

Firewall

Firewall

Site Manufacturing Operations and Control

Area Supervisory Control

Basic Control

Process

Page 9: IoT Security and Horizontal Integration

Enterprise Problem: Number of Types of Things

$

$

Page 10: IoT Security and Horizontal Integration

Cost of configuration

Static environments Dynamic systems

– +

Page 11: IoT Security and Horizontal Integration

• What the device is

• How the network should protect it

The Network Needs Two Pieces of Information

Page 12: IoT Security and Horizontal Integration

• What the device is

• How the network should protect it

The Network Needs Two Pieces of Information

IEEE 802.1X/AR+ ANIMA

ManufacturerUsageDescriptions

Page 13: IoT Security and Horizontal Integration

IEEE 802.1X with EAP-TLS: a scalable approach

Luminaire

Thermostat

Intranet

Registrar

• EAP-TLS makes use of certificates to identify new elements

• IEEE 802.1AR specifies a device certificate format

• Assertion about device is initially from manufacturer, and then from administrator. • NOT from the device!

• Requires a common trust anchor

• Constrained devices lack capacity for common trust anchors

Page 14: IoT Security and Horizontal Integration

ANIMA Flow: ActorsNew Entity Proxy Domain Vendor

Service

Factory Default for all settings/configuration

Enrolled in the domainLogical entity or physical after 1st hop

Handles fragmentation issues

The domain Registration Authority, Certificate Authority, Authorization Database etc

Cloud Service

Page 15: IoT Security and Horizontal Integration

Problems to solveNew Entity Domain Vendor

Service

Authentication

Imprint

Authentication

Enroll

Data StorageAuthzmodel

Authorization

handles fragmentation

Proxy

Connectivity & Discovery

Page 16: IoT Security and Horizontal Integration

Discovery, ConnectivityNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

New entity boots in CLEAN STATERFC3927 IPv4 Link-Local AddressRFC4862 IPv6 Stateless Address Autoconfiguraion <— design for this

RFC6763/RFC6762 mDNS query (or ietf-anima-grasp-02 GRASP query) using unsolicited broadcasts.

Page 17: IoT Security and Horizontal Integration

New Entity AuthenticationNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

Authentication

(d)TLS established. This is to-be RFC7030 EST with a bootstrapping extension.The New Entity authenticates with IEEE 802.1AR credentials

The Domain authenticates with current Domain credentials which the new entity *PROVISIONALLY* accepts. This is to support (d)TLS model and is EST compatible.

Page 18: IoT Security and Horizontal Integration

Authorization by the DomainNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

AuthenticationAuthorization

<Verify 802.1AR credential against white list?>Extract MASA server information from 802.1AR credential extensions (via MUD extensions) else the registrar needs to be configured appropriately

Page 19: IoT Security and Horizontal Integration

Logging or Decision by the VendorNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

Authentication Logging

Authzmodel

Authorization

OPTIONAL: MASA *or* NETCONF ownership voucher flowNOTE: Can occur in advance!!

MASA: Manufacturer Authorized Signing AuthorityA certified log mechanism: “Append Only, Cryptographically Assured, Publically Auditable” - CT

All decisions made within the Domain. The MASA only facilitates logging.EST extensions

NETCONF: Vendor service “knows” which Domain owns which device

Page 20: IoT Security and Horizontal Integration

Transmit back to deviceNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

Authentication

Provisional authentication now replaced with vendor authorized message(Verify then forward the Vendor Service response)

Authentication

Logging

Authzmodel

Authorization

Page 21: IoT Security and Horizontal Integration

ImprintNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

Authentication

Imprint

Authentication

Logging

Authzmodel

Authorization

Device verifies Logging proof or signed Vendor authorization.At this point the Device has key material of the Domain

Page 22: IoT Security and Horizontal Integration

Device Enrolls: Joins domainNew Entity Proxy Domain Vendor

Service

Connectivity & Discovery

Authentication

Imprint

Authentication

Enroll

Logging

Authzmodel

Authorization

Page 23: IoT Security and Horizontal Integration

• What you get• Device gets a trust root and a certificate for the local deployment• Local deployment now has authenticated the device• Device can connect to network using certificate

• What you don’t get• Automated selection of network• Automated profiling of the device• Application-specific authorization model

(but you have an identity anchor to build such a thing)

What you get and don’t with all of that…

Page 24: IoT Security and Horizontal Integration

Clouds offer-

• A rendezvous point

• Substantial processing power

Cloud capabilities will continue to expand.

A word about the cloud and IoT…

Page 25: IoT Security and Horizontal Integration

Many things need talk only to a few things

Mobile phone

Controllers

Enterprise /

Internet

Usage descriptions for each device

Control signals from cloud controller

Attacks

Enterprise network

and Internet

Page 26: IoT Security and Horizontal Integration

Expanding the attack surface

Mobile phone

Controllers

Usage descriptions for each device

Control signals from cloud controller

Attacks

Enterprise network

and Internet

Page 27: IoT Security and Horizontal Integration

Cisco Routers are in the right place to defend these devices

Mobile phone

Controllers

Usage descriptions for each device

Control signals from cloud controller

Attacks

Enterprise network

and Internet

Page 28: IoT Security and Horizontal Integration

Manufacturer usage descriptions can improve this security

Manufacturer Usage Descriptions

Mobile phone

Controllers

Usage descriptions for each device

Control signals from cloud controller

Attacks

Enterprise network

and Internet

Page 29: IoT Security and Horizontal Integration

Assumptions and AssertionsAssumptions Assertions

Because a Thing has a single or a small number of intended uses, it all other uses must be unintended

Any intended use can be clearly identified by the manufacturer

All other uses can be warned against in a statement by the manufacturer

Manufacturers are in a generally good position to make the distinction

A Thing has a single use or a small number of uses.

Things are tightly constrained. Very VERY dumb. Resource constraints are tight.

Even those Things that can protect themselves today may not be able to do so tomorrow

Network administrators are the ultimate arbiters of how their networks will be used

Page 30: IoT Security and Horizontal Integration

Translating intent into config

access-list 10 permit host controller.mfg.example.com

Any intended use can be clearly identified by the manufacturer

All other uses can be warned againstin a statement by the manufacturer

access-list 10 deny any any

è è

Page 31: IoT Security and Horizontal Integration

Router or firewall queries connected.example.com for policy associated with that URI

Device emits a URI using DHCP, LLDP, or through 802.1ar

Expressing Manufacturer Usage Descriptions

https://example.com/.well-known/mud/…

MUD File Server

DeviceMUD

Controller

Internet

Access Switch

Page 32: IoT Security and Horizontal Integration

How to locate the policy? A URL

https://mud.mfg.example.com/.well-known/mud/v1/CAS11LCDLversion2.12

“Manufacturer” Model

Page 33: IoT Security and Horizontal Integration

{

"ietf-mud:support-information": {

"last-update": "2016-05-18T20:00:50Z",

"cache-validity": 1440

},

"ietf-access-control-list:access-lists": {

"acl": [ {

"acl-name": "inbound-stuff",

"acl-type" : "ipv4-acl",

"ietf-mud:packet-direction" : "to-device",

"access-list-entries": {

"ace": [

{

"rule-name": "access-cloud",

"matches": {

"ietf-acl-dnsname:source-hostname": "lighting-system.example.com",

"protocol" : 8,

"destination-port-range" : {

"lower-port" : 443,

"upper-port" : 443

}

},

"actions" : {

"permit" : [null]

}

}

]

}

},

{

"acl-name": "outbound-stuff",

"acl-type" : "ipv4-acl",

"ietf-mud:packet-direction" : "from-device",

"access-list-entries": {

"ace": [

{

"rule-name": "access-cloud",

"matches": {

"ietf-acl-dnsname:destination-hostname": "lighting-system.example.com",

"protocol" : 8,

"source-port-range" : {

"lower-port" : 443,

"upper-port" : 443

}

},

"actions" : {

"permit" : [null]

}

},

]

}

}

]

}

}

The MUD File

Page 34: IoT Security and Horizontal Integration

Expressing Manufacturer Usage Descriptions

https://example.com/.well-known/mud/…

MUD File Server

DeviceMUD

Controller

Internet

Allow access to justcontroller.connected.example.com

Site returns abstractedXML (based on

YANG) to device or firewall

More precise configis instantiated

Access Switch

Page 35: IoT Security and Horizontal Integration

Extend defense in depthAuthenticate devices to the network(Use 802.1x and 802.1AR)

Reduces the threat surface of a Thing by preventing lateral infection

Protect against introduction of devices that are already 0wn3d(Use Cisco ISE or AMP)Provide the first effective security

solution for IoT

Does Does not

This approach…

Page 36: IoT Security and Horizontal Integration

BenefitsCustomer

• Reduces target surface of exploding number of devices

• No additional CAPEX

• Helps to reduce OPEX through efficiency gains

• Standards-based approach uses existing equipment

Manufacturer • Reduces product risk at almost no cost

• Will increase customer satisfaction and reduce support costs

• Easy service location of on-premises controllers

• Standards-based approach

• Reduces risk of government technology mandates

Page 37: IoT Security and Horizontal Integration

• IEEE standards 802.1x, 802.1ar, 802.11i for link layer protection

• IETF ANIMA group for trusted introduction draft-ietf-anima-bootstrap-keyinfra-03

• IETF OPSAWG group for Manufacturer Usage Descriptionsdraft-ietf-opsawg-mud-00.txt

[email protected] for more information from Cisco

Where to go for more information

Page 38: IoT Security and Horizontal Integration