digital trust in connected critical systems

14
Digital Trust in connected critical systems Nick Cook, Chief Innovations Officer

Upload: others

Post on 16-Oct-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Digital Trust in connected critical systems

Digital Trust in

connected critical

systems

Nick Cook, Chief Innovations Officer

Page 2: Digital Trust in connected critical systems

What is Digital Trust?

People, machines and organisations need to be able to digitally trust each other.

• Trust is built using layers of controls within an ecosystem

• Secure hardware execution and trusted applications

• Data flow and reaction security

• Physical security

• Strong identity is a key component of trust

• If you can’t determine someone or something is who or what they say they are, you cannot trust it

• Trust isn’t one time; it needs ongoing, sustainable management

Page 3: Digital Trust in connected critical systems

What is Digital Trust in the ‘connected

car’?

Page 4: Digital Trust in connected critical systems

Importance of Digital Trust to Functional Safety

Connected critical components must be able to trust

each other

• Components are becoming connected – no longer in islands of

connectivity

• Secure maintenance is critical

• In-vehicle radio connections – e.g. smartphone as important to

consider as long range wireless connections

• Need to consider both trust at POST but also ongoing during

operation

• Run time trust is important to establish

Page 5: Digital Trust in connected critical systems

Digital Trust: Functional Safety

Being connected emphasizes need for authentication

& signatures

• What authentication / signing is required?

• What / who must check?

• Is there any forensic support required? For what purpose?

• Where are the system boundaries?

• Sensors vs gateways

• What are the constraints on the algorithms that can be used?

• What impact is there on the selected hardware?

Page 6: Digital Trust in connected critical systems

Digital Trust: Functional Safety

Being connected emphasizes need for creating secure

managed application silos

• Separation of concerns important

• Architect for different types of service on the same processing

node

• How are the “containers” going to be updated?

• System as a whole needs a clearly obtainable “status” check

capability

Page 7: Digital Trust in connected critical systems

So how do we achieve digital trust?

Page 8: Digital Trust in connected critical systems

Digital Trust from Silicon to Services

A complex ecosystem made simple

• In-vehicle is the same • Chain of trust critical

Page 9: Digital Trust in connected critical systems

Implementation

Cybercriminals are super-sophisticated at exploiting

vulnerability.

• Hardware backed crypto material

• Smart chips

• TPM

• UICC

• TEE

• Execute in protected / silo environments

• Managed apps and outlets

• Create and maintain digital identities

Page 10: Digital Trust in connected critical systems

Identity and Credentials Management

The key to achieving trust

• Establish the person or device is who or what it claims to be

• Delivery of identities locally or over the air

• Locking down credentials

• Ongoing lifecycle management

• Transfer ownership securely – temporarily or permanently

• Revoke permissions

• Secure processes and policy must be applied

Page 11: Digital Trust in connected critical systems

Hardware container management / Trusted Apps

Trusting the software that is running

• Utilize protected execution environments to run security critical

software

• Have end to end security management of the protected

environment and the apps that run inside it

• Be able to OTA update apps securely

• Make it simple to access – readily available

Page 12: Digital Trust in connected critical systems

To conclude…

Page 13: Digital Trust in connected critical systems

Summary

If connected cars are to become trustworthy, a new ’normal’ needs to be established

• A three-tier approach must be applied as appropriate (trust the device, trust the person, trust the application)

• Robust, standards-based, security framework

• Strong authentication & signing is important

• Consumer-grade ease of use

• Enterprise-grade security

• Lifecycle management is critical

• Collaboration is required

Page 14: Digital Trust in connected critical systems

Thank you Further information:

Nick Cook

+44 (0)1455 558 111

[email protected]

www.intercede.com