Application security as crucial to the modern distributed trust model

18
© 2017 Intertrust Technologies Corporation. All rights reserved. Application security as crucial to the modern distributed trust model LINE-Intertrust Security Summit 1 —Tokyo May 17, 2017 Dave Maher, CTO Intertrust

Transcript of Application security as crucial to the modern distributed trust model

Page 1: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Application security as crucial to the modern distributed trust modelLINE-Intertrust Security Summit 1 —TokyoMay 17, 2017

Dave Maher, CTO Intertrust

Page 2: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Three drivers for Application layer security

2

1. Scale

2. Hyper-connectivity

3. Implications of Merger of the Cyber and Physical worlds

Page 3: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Scale

3

20204

BILLIONConnected People

$4 TRILLIONRevenue Opportunity

25+ MILLION

Apps

25+ BILLION

Embedded and Intelligent Systems

50 TRILLION

GBs of Data

Page 4: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Hyperconnectivity and dynamic and ephehemeral networks

4

Page 5: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Merger of Cyber and Physical worlds bring huuuuge risks

5

Page 6: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Isolation defeats the purpose of connectivity

6

Page 7: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Ransomware and other malware

7

Page 8: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Software self-defense addresses scale

8

Things must become responsible for themselves

Page 9: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved. 9

Page 10: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

• Security within the device or application — self-defense

• Security mechanisms that are simple for users, self-maintaining, inexpensive yet strong

• Security can be lightweight yet strong

• Defense-in-depth: Additional layers, including

• Network security where appropriate

• Cloud-based services that can detect patterns of illicit activity

• Protection of application data and device sensor info

• Protection of resources

• Secure delegation: Make it easy to give access to legitimate users but hard for illicit users

Trust models — what we rely on for Safety, Security, Privacy

10

Page 11: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Model for an internet connected thing

11

Sensors

Physical Interfaces

Communications

Security Associations

Remote Controller

CloudServices

Thing

Remote Front Panel Status

Security Manager

Page 12: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

• Except by legitimate users

• Part of a defensed in depth strategy

• When a device or application appears on a network, don’t shout out too much

• Incremental and tokenized discovery can keep things friendly for legitimate users

• Protocols can help assure things appear uninteresting to illegitimate users

Make valuable devices difficult to discover

12

Page 13: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Reference Monitor

13

Reference Monitor

Security Associations

Audit Trail

Device ControlsUser

Page 14: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

• A Security Association (SA) is the establishment of shared security attributes between two network entities to support secure communication

• We can use a similar approach for authorization using Message Authentication Codes

• We can include permissions in an SA authorizing use of commands or access to state and sensor data in a device or application

• Keys are typically part of an SA

• We can use cloud services to simplify SA management and associated key management for IoT devices and applications

Security Associations

14

Page 15: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Secure Key Vault

15

• Access to applications and devices can be protected using cryptographic keys in security associations

• Need a secure place to keep them

Page 16: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

• Collect behavior info from devices and applications

• Learn normal behavior

• Detect and classify anomalies

• Determine threat thresholds

• Set alarms and notifications

• All without tipping off intruders

Secure Telemetry and Threat Analytics

16

Page 17: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

1. When we design applications and IoT devices today we must keep in mind• Scale• Hyper-connectivity• Implications of Merger of the Cyber and Physical worlds

2. We CAN keep things simple and friendly but we must take care

17

Conclusion

Page 18: Application security as crucial to   the modern distributed trust model

© 2017 Intertrust Technologies Corporation. All rights reserved.

Thank you