Thursday, 26 May 2016 10:23

Data-Centric security for IoT

By

Securing those 20 billion Internet of Things (IoT) devices is not as easy as running an anti-virus program on them. Many are legacy, purpose-built devices and lack of standards hamper attempts to secure them.

Yet an IoT device — consumer or commercial  is a computer, it connects via the Internet to a cloud or network, it's capable of sending data and alerts and is potentially a prime attack vector for cyber criminals. The new dependence on the cloud has created critical security challenges:

  • Securing the data stream from interception, alteration and theft as it is generated, collected and analysed
  • Protecting IoT devices from potential use as attack vectors

Hewlett Packard Enterprise (HPE) resident IoT expert (South Pacific’s head of enterprise security products) Shane Bellos has penned a really interesting article on IoT.

In his opinion it’s the data integrity that matters – especially where personally identifiable information is involved.

Big data and IoT – an ecosystem with expanded security risks

Most big data projects include real-time analytics for operational insights, and centralised data acquisition or staging for other systems. These projects can include massive quantities of sensitive payment card, personally identifiable and protected health information (PCI, PII and PHI). These projects alone hold major risk and now, with the advent of IoT, sensor data from devices (like fitness trackers) adds to the sensitivity, risk factors and urgency.

The risk of data breach is high. HPE Security research indicates that 70% of consumer IoT devices are vulnerable to attack, with an average of 25 vulnerabilities per IoT product analysed. The research covered a range of popular consumer IoT devices from manufacturers including televisions, webcams, remote power outlets, hubs for controlling multiple devices, door locks and alarms. All devices analysed had mobile applications which could be used to access or control the devices remotely, and a majority of devices included some form of cloud service.

Attackers first build a network map laying to identify which systems are located where. Their goal is to set up mechanisms to acquire data over as long a run as possible and monetise it. When a business builds a big data environment, the target has already done a lot of work for the attacker. With big data, the enterprise has created a single collection location for the data assets the attackers are seeking.

While perimeter security is important (secure the network at the edge), it is increasingly inadequate. On average it takes over 200 days before a data breach is detected and fixed, leaving the most sensitive data assets exposed while attackers funnel data out of their target, with the breach scale growing every day.

With IoT connected devices, physical risk is added to the data breach risk. For example, there are Internet-connected devices that allow consumers to open and close the door to their homes from their cell phones. What prevents the attacker from doing the same thing to a business? Imagine an HVAC system (heating, ventilating, and air conditioning;), gas appliance or medical device. If an attacker can control these systems, it becomes an attack on the individual, where the attacker can sit anywhere in the world. This is why everyone needs to be concerned about security in the IoT age.

With IoT devices there are multiple attack vectors such as impersonation of the device user, or of the service provider. These vectors can be protected against through the use of SSL technology, 2-factor authentication, and certificate pinning, so that SSL certificates only enable the device to connect to a server when the certificate matches certain criteria and can be trusted. IoT devices can be designed not to accept inbound connections directly, but rather to accept a request to “call me now” for connection to the genuine service provider. Device software security can be enabled through best practices in the application development process.

Data-centric protection from the device to the big data platform

To protect sensitive data assets whether in a business or at home, a new approach is needed — one that actually protects the data itself. Consider the most advanced payment security technologies to protect credit card data. Strong encryption is implemented inside the card reader to protect data as it enters this hardened device and before it ever gets to the Point-of-Sale (POS) terminal. Data passed from the card reader to the POS terminal is thus not usable by attackers.

A similar approach is needed in IoT. Since each device is different in terms of the data it collects and sends to the backend server, it is important to understand what data is sensitive. With that understanding, it is a best practice to use data-centric, field-level encryption to protect individual data fields. This should be done through a special form of encryption referred to as Format-Preserving Encryption (FPE), implemented throughout the ecosystem — in the devices, the communications channels and the Big Data platform.

FPE is proven and in the process of being recognised by key standards bodies such as NIST (publication SP800-38G). It is a form of AES encryption that has been in use for some time — but unlike AES, which encrypts data into a large block of random numbers and letters, FPE encrypts the original value into something that looks like the original, so that, for example, a credit card number still looks like a credit card number. Sub-fields can be preserved so that the inherent value of this information can be maintained for analytical purposes. Analytics can almost always be done with the protected data, securing sensitive data from both insider risk and external attack.

Encrypting the Internet of Things

The Internet of Things, with double-digit growth and billions of devices, creates great new opportunities but also new levels of risk for companies and consumers alike. Traditional security measures alone are not enough. Enterprises implementing IoT strategies need to apply a data-centric security solution end-to-end from the big data platform to the IoT infrastructure. Using FPE to encrypt data values on a field level, from the device to the infrastructure and remote control element, removes risk and enables protection against remote takeover of an IoT device — the biggest threat to IoT security.

CHIEF DATA & ANALYTICS OFFICER BRISBANE 2020

26-27 February 2020 | Hilton Brisbane

Connecting the region’s leading data analytics professionals to drive and inspire your future strategy

Leading the data analytics division has never been easy, but now the challenge is on to remain ahead of the competition and reap the massive rewards as a strategic executive.

Do you want to leverage data governance as an enabler?Are you working at driving AI/ML implementation?

Want to stay abreast of data privacy and AI ethics requirements? Are you working hard to push predictive analytics to the limits?

With so much to keep on top of in such a rapidly changing technology space, collaboration is key to success. You don't need to struggle alone, network and share your struggles as well as your tips for success at CDAO Brisbane.

Discover how your peers have tackled the very same issues you face daily. Network with over 140 of your peers and hear from the leading professionals in your industry. Leverage this community of data and analytics enthusiasts to advance your strategy to the next level.

Download the Agenda to find out more

DOWNLOAD NOW!

Ray Shaw

joomla stats

Ray Shaw ray@im.com.au  has a passion for IT ever since building his first computer in 1980. He is a qualified journalist, hosted a consumer IT based radio program on ABC radio for 10 years, has developed world leading software for the events industry and is smart enough to no longer own a retail computer store!

VENDOR NEWS & EVENTS

REVIEWS

Recent Comments