SlideShare a Scribd company logo
1 of 47
Download to read offline
Introduction to the Industrial Internet Security
Framework
Stan Schneider, Ph.D., RTI CEO, IIC Steering Committee
Hamed Soroush, Ph.D., RTI Senior Research Security Engineer, IIC Security WG Co-Chair
©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
The smart machine era will be the most disruptive in the history of IT
-- Gartner
The IIoT Disruption
The real value is a common architecture that connects
sensor to cloud, interoperates between vendors, and
spans industries
You don’t compete against competitors.
You compete against market transitions.
– John Chambers
©2016 Real-Time Innovations, Inc.
Safe & Secure Apps in the IIoT
• RTI experience 1000+ projects
• Safety and Security critical to most
• Requirements surprisingly similar across industries
©2016 Real-Time Innovations, Inc.
Security is not a change driver
Security is a change gate
IIoT is the change driver
©2016 Real-Time Innovations, Inc.
Change Driver:
Central Generation Fails
The Grid must be Distributed©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
Change Gate: DER Grid will be Secure
• The OpenFMB (Field Message Bus) architecture
integrates solar, wind, and storage into the grid
• Dozens of vendors, several utilities, and standards
organizations are building devices, user interfaces,
and analytics
• OpenFMB uses DDS for secure communications
©2016 Real-Time Innovations, Inc.
Change Driver: Mistakes Kill
Hospital error is the 3rd leading cause of death in the US
©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
Change Gate: New IIoT Architecture is Secure
"GE Healthcare is leveraging the GE
Digital Predix architecture to connect
medical devices, cloud-based analytics,
and mobile and wearable instruments.
The future communication fabric of its
monitoring technology is based on RTI's
data-centric Connext DDS platform.”
-- Matt Grubis, Chief Engineer, GE
Healthcare's Life Care Solutions
http://www.rti.com/mk/webinars.html#GEHEALTHCARE
©2016 Real-Time Innovations, Inc.
Change Driver: Getting There is Dangerous and Slow
©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
Change Gate: Why Drive?
• Autonomous cars (“carbots”)
– Safer, faster, easier
– Change everything
• 30% of all jobs will end or
change
• Distributed carbot/city
infrastructure will be secure
©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
Change is Not Easy
©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
Cloud Services
Sensing
Planning
Radar, LIDAR Vehicle Platform Navigation
Error
Management
Visualization
Situation Analysis
Situation Awareness
Vision Fusion
Cameras, LIDAR,
Radar
…
Data Fusion
LoggingVehicle Control
Localization
DDS Secure Databus
Traffic Maps
DDS Databus
Cars now Compete on Software
The Real Disruption: Culture
“If you went to bed last
night as an industrial
company, you’re going to
wake up this morning as a
software and analytics
company”
-- Jeff Immelt
GE CEO
©2016 Real-Time Innovations, Inc. Permission to distribute
granted.
The Future of Secure, Distributed Software
©2016 Real-Time Innovations, Inc.
“If you went to bed last
night as a software and
analytics company,
you’re going to wake up
this morning as a
networking and security
company”
-- Stan Schneider
The IISF
• Major contribution
• Only wide voice on
security for IIoT
• First of 3 releases from
IIC in the next few
months!
• Challenge: make it
practical
©2016 Real-Time Innovations, Inc.
IISF Table of Contents
• Introduction
– Overview
– Motivation
– Key System Characteristics for Enabling Trustworthiness
– Distinguishing Aspects of Securing the IIoT
©2016 Real-Time Innovations, Inc.
IISF Table of Contents (cont.)
• Business Viewpoint
– Managing Risk
– Permeation of Trust in the IIoT System Lifecycle
©2016 Real-Time Innovations, Inc.
IISF Table of Contents (cont.)
• Functional & Implementation Viewpoints
– Functional Viewpoint
– Protecting Endpoints
– Protecting Communications & Connectivity
– Security Monitoring & Analysis
– Security Configuration & Management
• Looking Ahead: The Future of the IIoT
©2016 Real-Time Innovations, Inc.
IISF on Trustworthiness
Permeation of Trust
Security Building Blocks
Endpoint Security Functions
Communications & Connectivity Security
Functions
Security Monitoring & Analysis Functions
Security Configuration & Management Functions
Deeper Look at Protecting Communications &
Connectivity
Communications & Connectivity Layers
Connectivity Standards & Security
• Requirements for Core Connectivity Technology:
– be an open standard with strong independent, international
governance, such as IEEE, IETF, OASIS, OMG, or W3C,
– Be horizontal and neutral in its applicability across industries,
– Be applicable, stable, and proven across multiple industries,
and
– Have standard-defined gateways to all other connectivity
standards
Building Blocks for Protecting Exchanged
Content
• Explicit Endpoint Communication Policies
• Cryptographically Strong Mutual Authentication
Between Endpoints
• Authorization Mechanism for Enforcing Access
Control Rules from Policy
• Cryptographically Backed Mechanisms for Ensuring
Confidentiality, Integrity, and Freshness of
Exchanged Information
Examples
Information Flow Protection
• Network Segmentation
• Gateways & Filtering
– Layer 2, Layer ¾, Application/Middleware, Message
rewriting, Proxies, Server Replication
• Network Firewalls
• Unidirectional Gateways
• Network Access Control
Closing Remarks
©2016 Real-Time Innovations, Inc.
Security is Wide and Deep
©2016 Real-Time Innovations, Inc.
Practical Security Needs Many Layers
• System edge
• Host
– Machine/OS/Applications/Files
• Network transport
– Media access (layer 2)
– Network (layer 3)
– Session/Endpoint (layer 4/5)
• Dataflow
– Control application interaction
©2016 Real-Time Innovations, Inc.
Secure systems need all four
Systems are About the Data
Data Centricity Definition
a) The interface is the data.
b) The infrastructure understands that data.
c) The system manages the data and imposes
rules on how applications exchange data.
©2016 Real-Time Innovations, Inc. Permission to distribute unmodified granted.
Database Databus
Data centric storage and
search of old data
Data centric sharing and
filtering of future data
Application
Application
Message centric
Remote Objects
SOAs
Application
Application
Data
Practical Security Must Match Architecture
• DDS Databus controls dataflow
• DDS Security secures dataflow
– Control r,w access to each data item for
each function
• Complete Protection
– Discovery authentication
– Data-centric access control
– Cryptography
– Tagging & logging
– Non-repudiation
– Secure multicast
• No API. No code changes.
• Plugin architecture for advanced uses
CBM AnalysisPMU Control Operator
State Alarms SetPoint
Topic Security model:
• PMU: State(w)
• CBM: State(r); Alarms(w)
• Control: State(r), SetPoint(w)
• Operator: *(r), Setpoint(w)
©2016 Real-Time Innovations, Inc.
Practical Security Combines Protection and
Detection
©2016 Real-Time Innovations, Inc.
Practical Security is a Culture
©2016 Real-Time Innovations, Inc.
IIC Testbeds!
• IIC has by far the
industry’s most
comprehensive
testbed program
• Key goals
- Ensure practical
guidance
- Make impact
- Span the
industry
©2016 OMG. Permission to distribute granted.
Security Claims Evaluation Testbed
• IIC Sponsor Companies
- Xilinx
- Underwriters
Laboratories (UL)
- Aicas
• Collaborating Companies
- Algotronix, EYETech,
iVeia, JUXT, PFP
Cybersecurity, RTI,
SOC-e
Endpoint - DDS
DDS Stack
For Public Release
©2016 Real-Time Innovations, Inc. Permission to distribute granted.
The smart machine era will be the most disruptive in the history of IT
-- Gartner
But only if it’s secure!
Audience Q & A
Dr. Stan Schneider,
Chief Executive Officer,
RTI
Hamed Soroush,
Senior Research Security
Engineer,
RTI
Thanks for joining us
Event archive available at:
http://ecast.opensystemsmedia.com/
E-mail us at: jgilmore@opensystemsmedia.com

More Related Content

What's hot

Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
Real-Time Innovations (RTI)
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
Real-Time Innovations (RTI)
 

What's hot (20)

Space Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from MarsSpace Rovers and Surgical Robots: System Architecture Lessons from Mars
Space Rovers and Surgical Robots: System Architecture Lessons from Mars
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned Aircraft
 
System integration in offshore supply vessels – how we applied DDS and redefi...
System integration in offshore supply vessels – how we applied DDS and redefi...System integration in offshore supply vessels – how we applied DDS and redefi...
System integration in offshore supply vessels – how we applied DDS and redefi...
 
Data Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of ThingsData Distribution Service Security and the Industrial Internet of Things
Data Distribution Service Security and the Industrial Internet of Things
 
What Does Interoperability Mean for the IoT?
What Does Interoperability Mean for the IoT?What Does Interoperability Mean for the IoT?
What Does Interoperability Mean for the IoT?
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
How to Cut $2 Million of Your Safety Cert Costs
How to Cut $2 Million of Your Safety Cert CostsHow to Cut $2 Million of Your Safety Cert Costs
How to Cut $2 Million of Your Safety Cert Costs
 
FACE-ing Reality: Maintaining our Military Edge in the Modern World
FACE-ing Reality: Maintaining our Military Edge in the Modern WorldFACE-ing Reality: Maintaining our Military Edge in the Modern World
FACE-ing Reality: Maintaining our Military Edge in the Modern World
 
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Introduction to RTI DDS
Introduction to RTI DDSIntroduction to RTI DDS
Introduction to RTI DDS
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial SystemsThe Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
The Inside Story: How OPC UA and DDS Can Work Together in Industrial Systems
 
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
Upgrade Your System’s Security - Making the Jump from Connext DDS Professiona...
 
Integrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachIntegrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approach
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
Blueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The ArchitectureBlueprint for the Industrial Internet: The Architecture
Blueprint for the Industrial Internet: The Architecture
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 

Viewers also liked

Response to intervention
Response to interventionResponse to intervention
Response to intervention
Susanful
 

Viewers also liked (14)

ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control Systems
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Interventions Strategies in Special Education
Interventions Strategies in Special EducationInterventions Strategies in Special Education
Interventions Strategies in Special Education
 
Experiencing the Live IIoT
Experiencing the Live IIoTExperiencing the Live IIoT
Experiencing the Live IIoT
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.
 
response to intervention.ppt
response to intervention.pptresponse to intervention.ppt
response to intervention.ppt
 
Global C4IR Masterclass Cambridge Hayward - CIR 2017
Global C4IR Masterclass Cambridge Hayward - CIR 2017Global C4IR Masterclass Cambridge Hayward - CIR 2017
Global C4IR Masterclass Cambridge Hayward - CIR 2017
 
Connected Car by Ashish Bhasin
Connected Car by Ashish BhasinConnected Car by Ashish Bhasin
Connected Car by Ashish Bhasin
 
Response to intervention
Response to interventionResponse to intervention
Response to intervention
 

Similar to The Inside Story: Leveraging the IIC's Industrial Internet Security Framework

Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Gerardo Pardo-Castellote
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Norm Barber
 

Similar to The Inside Story: Leveraging the IIC's Industrial Internet Security Framework (20)

Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
Network security security landscape-10-11-2016 part i 1200 dpi (vgarr)
 
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
DDS - The Proven Data Connectivity Standard for the Industrial IoT (IIoT)
 
Industrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity StandardIndustrial IOT Data Connectivity Standard
Industrial IOT Data Connectivity Standard
 
IOT - internet of Things - August 2017
IOT - internet of Things - August 2017IOT - internet of Things - August 2017
IOT - internet of Things - August 2017
 
Industrial Internet of Things: Protocols an Standards
Industrial Internet of Things: Protocols an StandardsIndustrial Internet of Things: Protocols an Standards
Industrial Internet of Things: Protocols an Standards
 
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and SimulinkApplying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
 
IoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardwareIoT spending to surpass $800 billion in 2017, led by hardware
IoT spending to surpass $800 billion in 2017, led by hardware
 
DDS Secure Intro
DDS Secure IntroDDS Secure Intro
DDS Secure Intro
 
IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017IOT - Internet of Things - September 2017
IOT - Internet of Things - September 2017
 
Cisco connect winnipeg 2018 unlocking business value with network programma...
Cisco connect winnipeg 2018   unlocking business value with network programma...Cisco connect winnipeg 2018   unlocking business value with network programma...
Cisco connect winnipeg 2018 unlocking business value with network programma...
 
Skip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWSSkip the Security Slow Lane with VMware Cloud on AWS
Skip the Security Slow Lane with VMware Cloud on AWS
 
Iia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V FinalIia 2012 Spring Conference Philly V Final
Iia 2012 Spring Conference Philly V Final
 
Internet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and SoftwareInternet of Things (IoT) Costs, Connectivity, Resources and Software
Internet of Things (IoT) Costs, Connectivity, Resources and Software
 
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - SanitizedMigrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
 
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitizedMigrating Critical Applications to the Cloud - isaca seattle - sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
 
Learn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successfulLearn how to make your IoT pilot projects and POCs successful
Learn how to make your IoT pilot projects and POCs successful
 
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)ION Hangzhou - Developing the Internet of Things (Morning Keynote)
ION Hangzhou - Developing the Internet of Things (Morning Keynote)
 
Understanding the Internet of Things Protocols
Understanding the Internet of Things ProtocolsUnderstanding the Internet of Things Protocols
Understanding the Internet of Things Protocols
 
Functional AI and Pervasive Networking in Automotive
 Functional AI and Pervasive Networking in Automotive Functional AI and Pervasive Networking in Automotive
Functional AI and Pervasive Networking in Automotive
 
InterDrone 2017 Las Vegas - Keynote Address
InterDrone 2017 Las Vegas - Keynote AddressInterDrone 2017 Las Vegas - Keynote Address
InterDrone 2017 Las Vegas - Keynote Address
 

Recently uploaded

TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
mohitmore19
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Recently uploaded (20)

A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
Tech Tuesday-Harness the Power of Effective Resource Planning with OnePlan’s ...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Right Money Management App For Your Financial Goals
Right Money Management App For Your Financial GoalsRight Money Management App For Your Financial Goals
Right Money Management App For Your Financial Goals
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
10 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 202410 Trends Likely to Shape Enterprise Technology in 2024
10 Trends Likely to Shape Enterprise Technology in 2024
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 

The Inside Story: Leveraging the IIC's Industrial Internet Security Framework

  • 1. Introduction to the Industrial Internet Security Framework Stan Schneider, Ph.D., RTI CEO, IIC Steering Committee Hamed Soroush, Ph.D., RTI Senior Research Security Engineer, IIC Security WG Co-Chair
  • 2. ©2016 Real-Time Innovations, Inc. Permission to distribute granted. The smart machine era will be the most disruptive in the history of IT -- Gartner
  • 3. The IIoT Disruption The real value is a common architecture that connects sensor to cloud, interoperates between vendors, and spans industries You don’t compete against competitors. You compete against market transitions. – John Chambers ©2016 Real-Time Innovations, Inc.
  • 4. Safe & Secure Apps in the IIoT • RTI experience 1000+ projects • Safety and Security critical to most • Requirements surprisingly similar across industries ©2016 Real-Time Innovations, Inc.
  • 5. Security is not a change driver Security is a change gate IIoT is the change driver ©2016 Real-Time Innovations, Inc.
  • 6. Change Driver: Central Generation Fails The Grid must be Distributed©2016 Real-Time Innovations, Inc. Permission to distribute granted.
  • 7. Change Gate: DER Grid will be Secure • The OpenFMB (Field Message Bus) architecture integrates solar, wind, and storage into the grid • Dozens of vendors, several utilities, and standards organizations are building devices, user interfaces, and analytics • OpenFMB uses DDS for secure communications ©2016 Real-Time Innovations, Inc.
  • 8. Change Driver: Mistakes Kill Hospital error is the 3rd leading cause of death in the US ©2016 Real-Time Innovations, Inc. Permission to distribute granted.
  • 9. Change Gate: New IIoT Architecture is Secure "GE Healthcare is leveraging the GE Digital Predix architecture to connect medical devices, cloud-based analytics, and mobile and wearable instruments. The future communication fabric of its monitoring technology is based on RTI's data-centric Connext DDS platform.” -- Matt Grubis, Chief Engineer, GE Healthcare's Life Care Solutions http://www.rti.com/mk/webinars.html#GEHEALTHCARE ©2016 Real-Time Innovations, Inc.
  • 10. Change Driver: Getting There is Dangerous and Slow ©2016 Real-Time Innovations, Inc. Permission to distribute granted.
  • 11. Change Gate: Why Drive? • Autonomous cars (“carbots”) – Safer, faster, easier – Change everything • 30% of all jobs will end or change • Distributed carbot/city infrastructure will be secure ©2016 Real-Time Innovations, Inc. Permission to distribute granted.
  • 12. Change is Not Easy ©2016 Real-Time Innovations, Inc. Permission to distribute granted. Cloud Services Sensing Planning Radar, LIDAR Vehicle Platform Navigation Error Management Visualization Situation Analysis Situation Awareness Vision Fusion Cameras, LIDAR, Radar … Data Fusion LoggingVehicle Control Localization DDS Secure Databus Traffic Maps DDS Databus Cars now Compete on Software
  • 13. The Real Disruption: Culture “If you went to bed last night as an industrial company, you’re going to wake up this morning as a software and analytics company” -- Jeff Immelt GE CEO ©2016 Real-Time Innovations, Inc. Permission to distribute granted.
  • 14. The Future of Secure, Distributed Software ©2016 Real-Time Innovations, Inc. “If you went to bed last night as a software and analytics company, you’re going to wake up this morning as a networking and security company” -- Stan Schneider
  • 15. The IISF • Major contribution • Only wide voice on security for IIoT • First of 3 releases from IIC in the next few months! • Challenge: make it practical ©2016 Real-Time Innovations, Inc.
  • 16. IISF Table of Contents • Introduction – Overview – Motivation – Key System Characteristics for Enabling Trustworthiness – Distinguishing Aspects of Securing the IIoT ©2016 Real-Time Innovations, Inc.
  • 17. IISF Table of Contents (cont.) • Business Viewpoint – Managing Risk – Permeation of Trust in the IIoT System Lifecycle ©2016 Real-Time Innovations, Inc.
  • 18. IISF Table of Contents (cont.) • Functional & Implementation Viewpoints – Functional Viewpoint – Protecting Endpoints – Protecting Communications & Connectivity – Security Monitoring & Analysis – Security Configuration & Management • Looking Ahead: The Future of the IIoT ©2016 Real-Time Innovations, Inc.
  • 23. Communications & Connectivity Security Functions
  • 24. Security Monitoring & Analysis Functions
  • 25. Security Configuration & Management Functions
  • 26. Deeper Look at Protecting Communications & Connectivity
  • 28. Connectivity Standards & Security • Requirements for Core Connectivity Technology: – be an open standard with strong independent, international governance, such as IEEE, IETF, OASIS, OMG, or W3C, – Be horizontal and neutral in its applicability across industries, – Be applicable, stable, and proven across multiple industries, and – Have standard-defined gateways to all other connectivity standards
  • 29. Building Blocks for Protecting Exchanged Content • Explicit Endpoint Communication Policies • Cryptographically Strong Mutual Authentication Between Endpoints • Authorization Mechanism for Enforcing Access Control Rules from Policy • Cryptographically Backed Mechanisms for Ensuring Confidentiality, Integrity, and Freshness of Exchanged Information
  • 31.
  • 32.
  • 33. Information Flow Protection • Network Segmentation • Gateways & Filtering – Layer 2, Layer ¾, Application/Middleware, Message rewriting, Proxies, Server Replication • Network Firewalls • Unidirectional Gateways • Network Access Control
  • 34.
  • 35.
  • 36. Closing Remarks ©2016 Real-Time Innovations, Inc.
  • 37. Security is Wide and Deep ©2016 Real-Time Innovations, Inc.
  • 38. Practical Security Needs Many Layers • System edge • Host – Machine/OS/Applications/Files • Network transport – Media access (layer 2) – Network (layer 3) – Session/Endpoint (layer 4/5) • Dataflow – Control application interaction ©2016 Real-Time Innovations, Inc. Secure systems need all four
  • 39. Systems are About the Data Data Centricity Definition a) The interface is the data. b) The infrastructure understands that data. c) The system manages the data and imposes rules on how applications exchange data. ©2016 Real-Time Innovations, Inc. Permission to distribute unmodified granted. Database Databus Data centric storage and search of old data Data centric sharing and filtering of future data Application Application Message centric Remote Objects SOAs Application Application Data
  • 40. Practical Security Must Match Architecture • DDS Databus controls dataflow • DDS Security secures dataflow – Control r,w access to each data item for each function • Complete Protection – Discovery authentication – Data-centric access control – Cryptography – Tagging & logging – Non-repudiation – Secure multicast • No API. No code changes. • Plugin architecture for advanced uses CBM AnalysisPMU Control Operator State Alarms SetPoint Topic Security model: • PMU: State(w) • CBM: State(r); Alarms(w) • Control: State(r), SetPoint(w) • Operator: *(r), Setpoint(w) ©2016 Real-Time Innovations, Inc.
  • 41. Practical Security Combines Protection and Detection ©2016 Real-Time Innovations, Inc.
  • 42. Practical Security is a Culture ©2016 Real-Time Innovations, Inc.
  • 43. IIC Testbeds! • IIC has by far the industry’s most comprehensive testbed program • Key goals - Ensure practical guidance - Make impact - Span the industry ©2016 OMG. Permission to distribute granted.
  • 44. Security Claims Evaluation Testbed • IIC Sponsor Companies - Xilinx - Underwriters Laboratories (UL) - Aicas • Collaborating Companies - Algotronix, EYETech, iVeia, JUXT, PFP Cybersecurity, RTI, SOC-e Endpoint - DDS DDS Stack For Public Release
  • 45. ©2016 Real-Time Innovations, Inc. Permission to distribute granted. The smart machine era will be the most disruptive in the history of IT -- Gartner But only if it’s secure!
  • 46. Audience Q & A Dr. Stan Schneider, Chief Executive Officer, RTI Hamed Soroush, Senior Research Security Engineer, RTI
  • 47. Thanks for joining us Event archive available at: http://ecast.opensystemsmedia.com/ E-mail us at: jgilmore@opensystemsmedia.com