dr. galen hunt - afitc education & training event · dr. galen hunt distinguished engineer...

Post on 14-Jun-2020

2 Views

Category:

Documents

0 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Dr. Galen HuntDISTINGUISHED ENGINEER & MANAGING DIRECTOR

Microsoft Azure Sphere

Radio

MCU

9 BILLION new MCU devices

built and deployed every year

The microcontroller (MCU)

a low-cost, single chip computer

Before this chip, no MCU was ever connected to the internet.

Data +

intelligence

Optimize

operations

Transform

products

Engage

customers

Empower

employees

Products

Customers

Empower

employees

Large portions of the

organization are not digitized

Data is siloed across

different parts of

the organization

Operations

1

2

Disjoint data

&

intelligence

Data +

intelligence

Optimize

operations

Transform

products

Engage

customers

Empower

employees

New monetization avenues due to IoT-related services

Companies that increased revenue as a result of IoT implementation

Average increase in operating income (avg. 8%) among the most digitally transformed enterprises

p

p

p

Connected “things” by 2025 generating 180ZB of data

p

Data +

intelligence

Optimize

operations

Transform

products

Engage

customers

Empower

employees

Opportunity Risk

What happens when you connect

a device to the internet?

“When smart gadgets spy on you: Your home life is less private than you think”

“Protecting Your Family: The Internet of Things Gives Hackers Creepy New Options”

Mirai Botnet attackOctober 2016

Everyday devices are used to launch an attack that takes down the internet for a day

Hackers attack casino

Attackers gain access to casino database through fish tank

The internet security battle.

We’ve been fighting it for decades. We have experience to share.

SECURITY IS FOUNDATIONAL

It must be built in from the beginning.

Hardware

Root of Trust

Defense

in Depth

Small Trusted

Computing Base

Dynamic

Compartments

Certificate-Based

Authentication

Failure

Reporting

Renewable

Security

The 7 properties of highly secured devices

Some properties depend only on hardware support

Unforgeable cryptographic keys generated

and protected by hardware

Hardware Root of Trust

• Hardware to protect Device Identity

• Hardware to Secure Boot

• Hardware to attest System Integrity

Hardware

Root of Trust

Internal barriers limit the reach of any

single failure

Dynamic Compartments

• Hardware to Create Barriers

• Software to Create Compartments

Some properties depend on hardware and software

Dynamic

Compartments

Defense in

DepthSmall Trusted

Computing Base

Device security renewed to overcome

evolving threats

Renewable Security

• Cloud to Provide Updates

• Software to Apply Updates

• Hardware to Prevent Rollbacks

Some properties depend on hardware, software and cloud

Certificate-Based

Authentication

Failure

ReportingRenewable

Security

9 BILLION new MCU devices

built and deployed every year

Is it possible to create

a secure MCU platform?

Azure Sphere

Certified MCUs

The Azure Sphere

OS

The Azure Sphere

Security Service

Azure Sphere is an end-to-end solution for securing MCU powered devices

Azure Sphere Certified MCUs with a built-in hardware root of trust

created from Microsoft’s learnings securing

three generations of Xbox consoles.

The Azure Sphere OS a multi-layer defense-in-depth OS that

merges the best of Microsoft and OSS

technologies to create a trustworthy

platform for new IoT experiences

The Azure Sphere Security Service guards every Azure Sphere device; it brokers

trust for connectivity through certificate based

authentication, detects emerging threats

through online failure reporting, and renews

device security through software updates.

Secured MCUs

Secured OS

Securing Cloud Service

Even MCUs can be secured if you are committed.

Opportunity Risk

Opportunity RiskResponsibility

Hardware

Root of Trust

Defense

in Depth

Small Trusted

Computing Base

Dynamic

Compartments

Certificate-Based

Authentication

Failure

Reporting

Renewable

Security

The 7 properties of highly secured devices

Let’s secure the future.

top related