cyber secure communication over the internet · •a key driver is the internet of things (iot)...

15
Cyber Secure communication over the internet Hans Klos Scalys BV Scalys E&A 2019 presentatie 1 mei-19

Upload: others

Post on 25-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Cyber Secure communication over the internet

Hans Klos

Scalys BV

Scalys E&A 2019 presentatie 1mei-19

Page 2: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

About Scalys

• Founded 2017, based in Hengelo, the Netherlands.

• We offer a unique set of High-Grade Secure Communication solutions and products.

• We combine leading technology with innovative design concepts to modernize and secure the communication of connected devices.

Scalys E&A 2019 presentatie 2mei-19

Page 3: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Can I trust my device ?

• Will it function as designed?

• Can I reliable identify the device?

• Can I update it securely?

• Will it resist attacks?

• Does it protect sensitive data and assets?

Scalys E&A 2019 presentatie 3mei-19

Page 4: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Need for Hardware Security

• Demand for Hardware Security increasing with growing security needs in embedded, networking devices and cloud services

• A key driver is the Internet of Things (IoT)

• Multi-layered approach to security needed• establishing a trusted computing baseline that anchors trust in tamper-proof

hardware

• A strong hardware security layer essential for realizing secure systems

Scalys E&A 2019 presentatie 4mei-19

Page 5: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Why hardware security in IoT devices?

Today’s IoT is all around us. From smart cities to industries, homes and more. It is an everyday reality and the number of connected devices is rising rapidly.

But the rapid increase of connected devices also may cause a weak spot: Security. Connected devices are potential targets for those seeking unauthorized access to the network and to the device cloud, malicious control of the device, or theft of IoT collected data.

Scalys E&A 2019 presentatie 5mei-19

Page 6: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Developing a cyber secure hardware platform

• Which (security) certifications needs to be met?

• Tamper resistant product?

• Which processing platform will be used?• Intel based, ARM based, other …

• Develop a complete SW layer for security (e.g. implement TEE), or will use Third Party security software vendors

• Long Livety support (impact on selection of components)

• Environmental conditions (consumer, industrial, …)

Scalys E&A 2019 presentatie 6mei-19

Page 7: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Anatomy of a Trustworthy Device

Scalys E&A 2019 presentatie 7mei-19

Related Keys and certificates• OEM• Cloud• Customers

Trusted Boot

Trusted ID

Trusted Execution

Firmware Update

Resilience

Page 8: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

QorIQ® Trust Architecture

The QorIQ Trust Architecture is a set of hardware and software techniques designed to support trusted boot and maintain the trusted environment during runtime.

The Trust Architecture is based on capabilities and intellectual property developed by NXP and deployed on multiple NXP platforms. These capabilities have been modified and extended as appropriate to the needs of secure network and access infrastructure.

The Trust Architecture is implemented via a highly-integrated combination of trusted software and trusted hardware.

Scalys E&A 2019 presentatie 8mei-19

Page 9: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Trust Architecture - Features

• Secure Boot

• Secure Storage

• Key Protection

• Key Revocation

• Secure Debug

• Tamper Protection

• Virtualization and Strong Partitioning

• Manufacturing Protection

Scalys E&A 2019 presentatie 9mei-19

ManufacturingProtection

8

SecureBoot

1Secure

Storage2

KeyProtection

3

KeyRevocation

4

SecureDebug

5

TamperDetection

6

Virtualization/Strong

Partitioning 7

Page 10: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Trust Architecture - Threats

• Unauthorized software

• Faulty software (BUGs) and Malicious external software

• External intrusion

Scalys E&A 2019 presentatie 10mei-19

ManufacturingProtection

8

SecureBoot

1Secure

Storage2

KeyProtection

3

KeyRevocation

4

SecureDebug

5

TamperDetection

6

Virtualization/Strong

Partitioning 7

Page 11: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Trust Architecture - Unauthorized software

Is my device running authorized software, which has not been tampered with?

• Secure boot guaranties no arbitrary code can be used to system

• Security monitor can monitor external memory, to detect external modification of memory. (protect running system software against modification)

• Key revocation system allows for revocation of up-to 3 keys before system becomes obsolete

Scalys E&A 2019 presentatie 11mei-19

Page 12: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Trust Architecture - Hypervisor

• Combination of Hardware and software features to partition HW into separate systems

• Detection of Partitions which try to access unauthorized sections, with configurable result (e.g., Hardware zeroization of memory, and reset of system)

• Multiple hypervisors can be used :• KVM

• Integrity

• XEN

• ....

Scalys E&A 2019 presentatie 12mei-19

Page 13: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Trust Architecture - Faulty software (BUG’s)

• Hypervisor mode of operations allow for strict partitioning of system, preventing escalation of privilege.

• SMMU controls access to peripherals, assuring only authorized partitions can access certain peripherals.

• Detection of unauthorized access attempts allows appropriate action to clear secrets

Scalys E&A 2019 presentatie 13mei-19

Page 14: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Benefits realized

• Firmware protection

• Resilience

• Secure storage

• Key/Certificate based

• Secure firmware updates

• Payload authentication

• Cloud authentication

• Secure communications

• TLS

• OpenSSL engine integrated into secure enclave (isolated)

Scalys E&A 2019 presentatie 14mei-19

Can I TRUST my device ?

Will it function as designed?

Can I reliable identify the device?

Can I update it securely?

Will it resist attacks?

Does it protect sensitive data and

assets?

Page 15: Cyber Secure communication over the internet · •A key driver is the Internet of Things (IoT) •Multi-layered approach to security needed •establishing a trusted computing baseline

Contact us

Scalys E&A 2019 presentatie 15mei-19