How to secure and identify devices in the Internet of ...

21
How to secure and identify devices in the Internet of Everything In the Internet of Everything, identity is everything. By Ronald De Temmerman (VP Strategic Sales & PKI Services EMEA) GlobalSign Webinar

Transcript of How to secure and identify devices in the Internet of ...

Page 1: How to secure and identify devices in the Internet of ...

How to secure and

identify devices in the

Internet of Everything

In the Internet of Everything, identity is everything.

By Ronald De Temmerman (VP Strategic Sales & PKI Services EMEA)

GlobalSign Webinar

Page 2: How to secure and identify devices in the Internet of ...

MEET THE

PRESENTER

RONALD DE

TEMMERMAN

VP Strategic Sales &

PKI Services EMEA

Page 3: How to secure and identify devices in the Internet of ...

WHAT

YOU WILL

LEARN

TODAY

1 The role of identity and

security in the IoE

2 New considerations for the IoE

3 PKI case studies for IoE

4 Strategic planning for IoE

5 Managing identities and

access rights in the IoE

Page 4: How to secure and identify devices in the Internet of ...

///THE ROLE OF

IDENTITY& SECURITY

IN THE IOE

Page 5: How to secure and identify devices in the Internet of ...

By 2020…

…50bn devices

…250m connected vehicles…50 trillion GBs data

Sources: Gartner, Cisco, Capgemini

…more than 25m apps

…4bn connected people

Page 6: How to secure and identify devices in the Internet of ...

ROLE #1 -

AUTHENTICATION

“The only solution to assured authentication is –

and always will be – to combine and use

multiple factors or modalities.”

- Lumidigm

///

Page 7: How to secure and identify devices in the Internet of ...

ROLE #2 -

ENCRYPTION///“[In the Internet of Things] Privacy needs to be

thought of as a functional requirement and not

just a quality attribute…built-in and not bolted

on.”

- Jonathon Fox & Tyson Macaulay, McAfee

Page 8: How to secure and identify devices in the Internet of ...

ROLE #3 –

DATA INTEGRITY

“Privacy might cost you some embarrassment,

but integrity can easily cost you your life.”

- Martin Ruubel, Guardtime

///

Page 9: How to secure and identify devices in the Internet of ...

NEW

CONSIDERATIONS

FOR THE IOE///

Page 10: How to secure and identify devices in the Internet of ...

NEW CONSIDERATIONS FOR IOE

Trust Models/////

Diversity of devices and processing power /////

Size, Scale, and Scope of your Ecosystem/////

Lifecycle management across device & cloud/////

Page 11: How to secure and identify devices in the Internet of ...

/// PKI CASE STUDIES

FOR THE IOE

Page 12: How to secure and identify devices in the Internet of ...

Certificates enable secure boot

process, authenticate the

antennae, and encrypt the data

transmission to main appliance

76%

API to automatically embed

during manufacturing & reissue

throughout device lifespan

Embed certificates in their radio

and service nodes for wireless

coverage in buildings with poor

coverage

63%

CELLULAR

SIGNAL

AMPLIFIER

WHAT

WHY

HOW

Page 13: How to secure and identify devices in the Internet of ...

Secures the connection between

device and users, and device and

company’s back end

Used GlobalSign’s highly

customizable PKI option to

achieve push certificates to

each device and replace every

10 days

Embed SSL certificates into

network management devices in

public locations

NETWORK

ACCESS

DEVICES

WHAT

WHY

HOW

Page 14: How to secure and identify devices in the Internet of ...

STRATEGIC

PLANNING FOR

THE IOE

///

Page 15: How to secure and identify devices in the Internet of ...

ADAPTING

PKI TO

MEET IOE

NEEDS

Shorter root hierarchies

Flexible subject parameters

Strong cryptographic algorithms

ECC Availability

Both longer & shorter certificate validities

Custom EKUs

Bootstrapped trust & revocation

Page 16: How to secure and identify devices in the Internet of ...

IOE ECOSYSTEM KEY PLAYERS

Platform Providers

Application Developers

Thing Producers

The Things

Page 17: How to secure and identify devices in the Internet of ...

PLATFORM PROVIDER USE CASE

The Things

Consumer

Administrator

Business

3rd

Party

Application

Vendor

Data Web Services

AdminPortal

Thing Web Services

Consumer Web Portal

Partner Web Portal

Cloud Provider

Public Trust

Private Trust

Trust needs are

scenario dependent

Page 18: How to secure and identify devices in the Internet of ...

DEVICE MANUFACTURER USE CASE

Manufacturing

Enrollment

Usage

• Install software – including trust roots

• Possible to add certificate now

• Device comes online, needs to authenticate

to cloud services

• Possible to add certificate now

• Lifecycle of credentials

Page 19: How to secure and identify devices in the Internet of ...

MANAGING

IDENTITIES &

ACCESS RIGHTS

///

Page 20: How to secure and identify devices in the Internet of ...

IS PKI THE ANSWER TO

SECURING IOT?

///// Arguably the best option currently

///// Established standard, covers authentication,

encryption, and data integrity

///// Each deployment is going to have its own needs!

Page 21: How to secure and identify devices in the Internet of ...

THANK YOU!

GET IN TOUCH

www.globalsign.de

GlobalSign SSL

@globalsign_de

GlobalSign Deutschland

GMO GlobalSign Ltd

[email protected]