SlideShare une entreprise Scribd logo
1  sur  24
Télécharger pour lire hors ligne
Making	
  the	
  Jump	
  to	
  Connext	
  DDS	
  Secure	
  
The	
  Industrial	
  Internet	
  of	
  Things	
  Connec<vity	
  Company™	
  
#RSAC
Niheer	
  Patel	
  
Niheer	
  Patel,	
  Product	
  Manager,	
  
RTI,	
  has	
  over	
  11	
  years	
  of	
  
experience	
  in	
  embedded	
  
soFware	
  and	
  distributed	
  
systems.	
  Niheer	
  has	
  a	
  Computer	
  
Science	
  and	
  Engineering	
  degree	
  
from	
  the	
  University	
  of	
  California,	
  
San	
  Diego	
  and	
  a	
  Master	
  of	
  
Business	
  Administra<on	
  degree	
  
from	
  University	
  of	
  California,	
  
Berkeley.	
  	
  
	
  
#RSAC
Agenda	
  
•  Speaker	
  Introduc<on	
  
•  Industrial	
  Internet	
  and	
  Security	
  Frameworks	
  
•  DDS	
  Security	
  Highlights	
  
•  Connext	
  DDS	
  Secure	
  Pre-­‐Requisites	
  &	
  Configura<on	
  
•  Connext	
  DDS	
  Secure	
  Shapes	
  Demo	
  
–  Integrity	
  
–  Confiden<ality	
  
•  Addi<onal	
  Resources	
  
•  Q&A	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Industrial	
  Internet	
  Consor<um:	
  250+	
  Companies,	
  25+	
  Countries	
  
IIC	
  Founding	
  and	
  Contribu/ng	
  Members	
  
#RSAC
Industrial	
  Internet	
  Reference	
  Architecture	
  
•  IIRA,	
  recently	
  released	
  v1.8	
  
•  Comprehensive,	
  high	
  level	
  
architecture	
  guidance	
  
•  Standards	
  based	
  approach	
  to	
  
Industrial	
  IoT	
  Systems.	
  
hp://www.iiconsor<um.org/IIRA.htm	
  
#RSAC
Industrial	
  Internet	
  Connec<vity	
  Framework	
  
•  IIRA	
  defines	
  the	
  “layered	
  databus	
  
architecture”	
  
•  IICF	
  defines	
  proper<es	
  for	
  core	
  
connec<vity	
  pla`orms	
  
hp://www.iiconsor<um.org/IICF.htm	
  
#RSAC
Industrial	
  Internet	
  Security	
  Framework	
  
•  Extends	
  from	
  IIRA	
  
•  Guidance	
  for	
  security	
  in	
  the	
  
context	
  of	
  an	
  IIoT	
  system	
  
architecture	
  
•  Reference	
  for	
  testbeds	
  that	
  
provide	
  con<nual	
  feedback	
  on	
  
security	
  frameworks	
  
hp://www.iiconsor<um.org/IISF.htm	
  
#RSAC
Industrial	
  Internet	
  Security	
  Framework	
  
#RSAC
Communica<ons	
  and	
  Connec<vity	
  Protec<on	
  
#RSAC
Securing	
  System	
  Boundaries	
  
•  System	
  Boundary	
  
•  Network	
  Transport	
  
–  Media	
  access	
  (layer	
  2)	
  
–  Network	
  (layer	
  3)	
  security	
  
–  Session/Endpoint	
  (layer	
  4/5)	
  security	
  
•  Host	
  
–  Machine/OS/Applica<ons/Files	
  
•  Data	
  &	
  Informa<on	
  flows	
  
DDS	
  Security	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Threats	
  in	
  a	
  Pub/Sub	
  System	
  
•  Unauthorized	
  Subscrip<on	
  
•  Unauthorized	
  Publica<on	
  
•  Tampering	
  &	
  Replay	
  
•  Unauthorized	
  access	
  by	
  
infrastructure	
  services	
  
Alice	
  
Bob	
  
Eve	
  
Trudy	
  
Trent	
  
Mallory	
  
Local	
  machine	
  is	
  assumed	
  to	
  be	
  trusted	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Connext	
  DDS	
  Secure	
  
•  Based	
  on	
  DDS	
  Security	
  specifica<on	
  
•  Access	
  control	
  without	
  a	
  broker	
  or	
  server	
  
–  Fine-­‐grain,	
  integrated	
  and	
  peer-­‐to-­‐peer	
  
•  Far	
  more	
  scalable	
  and	
  efficient	
  than	
  TLS	
  
–  Fine	
  grain	
  control	
  over	
  over	
  topics	
  and	
  message	
  segments	
  
–  Mul<cast	
  support	
  for	
  efficient	
  1:many	
  and	
  many:many	
  
–  TLS/DTLS	
  support	
  available	
  for	
  simple	
  use	
  cases	
  
•  Preserves	
  Real-­‐Time	
  QoS	
  
–  Not	
  dependent	
  on	
  TCP	
  
•  Transport	
  flexibility	
  
–  Does	
  not	
  require	
  IP	
  
–  Secures	
  data	
  over	
  any	
  transport,	
  including	
  shared	
  memory	
  
•  Add	
  security	
  with	
  lile	
  or	
  no	
  change	
  to	
  exis<ng	
  DDS	
  apps	
  
•  Plugin	
  SDK	
  allows	
  for	
  custom	
  solu<on	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
Connext	
  DDS	
  	
  
Library	
  
Authen<ca<on	
  
Access	
  Control	
  
Encryp<on	
  
Logging	
  
Applica<on	
  
Any	
  Transport	
  
(e.g.,	
  TCP,	
  UDP,	
  mul<cast,	
  
shared	
  memory…)	
  
Data	
  Tagging	
  
#RSAC
Create	
  
Domain	
  
Par<cipant	
  	
  
Create	
  
Endpoints	
  
Discover	
  
remote	
  
Endpoints	
  
Send/Receive	
  
data	
  
Discover	
  
remote	
  DP	
  
Authen<cate	
  
DP?	
  Yes	
  
Domain	
  
Par<cipant	
  
Create	
  Fails	
  
No	
  
Plugins	
  In	
  Ac<on	
  –	
  What	
  is	
  really	
  happening?	
  
Access	
  OK?	
  
Endpoint	
  
Create	
  Fails	
  
No	
  
Authen<cate	
  
Remote	
  DP?	
  
Ignore	
  
Remote	
  DP	
  
No	
  
Yes	
  
Message	
  
security	
  
Access	
  OK?	
  
Ignore	
  
remote	
  
endpoint	
  
No	
  
DP	
  =	
  Domain	
  Par<cipant	
  
Endpoint	
  =	
  Reader	
  /	
  Writer	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Domain	
  
Governance	
  
Document	
  
Shared	
  CA	
  
Cer<ficate	
  
Permissions	
  
CA	
  
Cer<ficate	
  
P2	
  Iden<ty	
  
Cer<ficate	
  
P2	
  Private	
  
Key	
  
P2	
  
P2	
  Permissions	
  
File	
  
P1	
  Iden<ty	
  
Cer<ficate	
  
P1	
  Private	
  
Key	
  
P1	
  
P1	
  Permissions	
  
File	
  
•  Keys.	
  Each	
  par<cipant	
  has	
  a	
  pair	
  of	
  public	
  &	
  private	
  keys	
  used	
  in	
  authen<ca<on	
  process.	
  Public	
  keys	
  are	
  
embedded	
  in	
  the	
  iden<ty	
  cer<ficate	
  of	
  each	
  par<cipant.	
  
•  Shared	
  CA	
  that	
  has	
  signed	
  par<cipant	
  public	
  keys.	
  Par<cipants	
  need	
  to	
  have	
  a	
  copy	
  of	
  the	
  CA	
  cer<ficate	
  as	
  
well.	
  
•  Permissions	
  File	
  specifies	
  what	
  domains/par<<ons	
  the	
  DP	
  can	
  join,	
  what	
  topics	
  it	
  can	
  read/write,	
  what	
  tags	
  
are	
  associate	
  with	
  the	
  readers/writers	
  	
  
•  Domain	
  Governance	
  specifies	
  which	
  domains	
  should	
  be	
  secured	
  and	
  how	
  
•  Permissions	
  CA	
  that	
  has	
  signed	
  par<cipant	
  permission	
  file	
  as	
  well	
  as	
  the	
  domain	
  governance	
  document.	
  
Par<cipants	
  need	
  to	
  have	
  a	
  copy	
  of	
  the	
  permissions	
  CA	
  cer<ficate.	
  
Configuring	
  &	
  Deploying	
  DDS	
  Security	
  
Signed	
  by	
  Permissions	
  
CA	
  
Signed	
  by	
  Shared	
  CA	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
QoS	
  Configura<on:	
  “SecureAllowAll”	
  	
  
/Applica<ons/r<_connext_dds-­‐5.2.6/resource/xml/RTI_SHAPES_DEMO_QOS_PROFILES.xml	
  
	
  
•  QoS	
  Elements	
  
encapsulated	
  
within	
  the	
  
<property>	
  tag.	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Permissions	
  File	
  
/Applica<ons/r<_connext_dds-­‐5.2.6/resource/xml/RTI_SHAPES_DEMO_PERMISSIONS.xml	
  
	
  
•  Define	
  individual	
  par<cipant	
  
permissions	
  rules	
  
•  “AllowAll”	
  PERMISSIONS:	
  
•  No	
  restric<ons	
  on	
  what	
  
can	
  be	
  published	
  or	
  
subscribed	
  
•  “SecureDenyPubCircles”	
  
•  No	
  restric<ons	
  except	
  
that	
  Circle	
  topics	
  
cannot	
  be	
  published.	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Governance	
  File	
  
/Applica<ons/r<_connext_dds-­‐5.2.6/resource/xml/RTI_SHAPES_DEMO_GOVERNANCE_MAX.xml	
  
	
  
•  Iden<fy	
  ac<ons	
  for	
  
discovery,	
  liveliness,	
  RTPS	
  
protec<on,	
  etc.	
  
•  Define	
  access	
  control	
  rules	
  
for	
  topics	
  using	
  regular	
  
expressions	
  
•  GOVERNANCE_MAX.xml	
  
•  All	
  topics	
  encrypted	
  
•  Except	
  Circles	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
#RSAC
Upgrading	
  Systems	
  under	
  Development	
  
Upgrade	
  Steps	
   Impact/Behavior	
  
Rebuild	
  applica/ons	
  that	
  require	
  DDS	
  APIs	
  
with	
  Connext	
  DDS	
  Security	
  Plugins.	
  
No	
  performance	
  impact	
  as	
  security	
  features	
  
are	
  not	
  yet	
  enabled.	
  
Enable	
  authen/ca/on	
  but	
  configure	
  domain	
  
to	
  allow	
  unauthen/cated	
  par/cipants	
  
Some	
  impact	
  to	
  discovery	
  behavior;	
  
Introduc/on	
  signed	
  governance	
  files	
  requires	
  
PKI	
  &	
  CA	
  to	
  be	
  in	
  place.	
  
Enable	
  protec/on	
  (confiden/ality,	
  
authen/city,	
  and	
  integrity)	
  of	
  individual	
  
topics.	
  
Performance	
  impact	
  during	
  run/me	
  due	
  to	
  
introduc/on	
  of	
  encryp/on.	
  Fine	
  grained	
  
security	
  now	
  in	
  place.	
  	
  
Enable	
  protec/on	
  of	
  RTPS-­‐level	
  and	
  Liveliness	
  
fields	
  
Very	
  liUle	
  impact	
  to	
  system	
  performance.	
  	
  
#RSAC
Upgrading	
  Deployed	
  Systems	
  –	
  Rou<ng	
  Service	
  
©2017	
  Real-­‐Time	
  Innova<ons,	
  Inc.	
  	
  	
  
Secure	
  
DDS	
  Domain	
  
Non-­‐secure	
  
DDS	
  Domain	
  
Par<cipant	
   Par<cipant	
  
Par<cipant	
  
Par<cipant	
  
Par<cipant	
  
Par<cipant	
  
Par<cipant	
  
Par<cipant	
  
Security	
  Demo	
  
#RSAC
References	
  
•  Industrial	
  Internet	
  Reference	
  Architecture	
  
–  hp://www.iiconsor<um.org/IIRA.htm	
  
•  Industrial	
  Internet	
  Connec<vity	
  Framework	
  
–  hp://www.iiconsor<um.org/IICF.htm	
  
•  Industrial	
  Internet	
  Security	
  Framework	
  
–  hp://www.iiconsor<um.org/IISF.htm	
  
•  OMG	
  DDS	
  specifica<on	
  
–  hp://www.omg.org/spec/DDS/1.4/PDF	
  
•  OMG	
  DDS	
  Security	
  specifica<on	
  
–  hp://www.omg.org/spec/DDS-­‐SECURITY/1.0/PDF	
  
•  RTI	
  Technology	
  Whitepapers	
  
–  hps://www.r<.com/resources/whitepapers	
  
#RSAC
Resources	
  
	
  
hps://www.r<.com/gexngstarted	
  
	
  
	
  
	
  
hp://community.r<.com	
  
	
  
	
  
hps://www.r<.com/connext-­‐dds-­‐
seminar-­‐sd-­‐2017	
  
	
  
Q&A	
  
Thank	
  you!	
  

Contenu connexe

Tendances

Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Real-Time Innovations (RTI)
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Real-Time Innovations (RTI)
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSReal-Time Innovations (RTI)
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsReal-Time Innovations (RTI)
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsReal-Time Innovations (RTI)
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)Abdullah Ozturk
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsReal-Time Innovations (RTI)
 
System Architecture for C4I Coalition Operations
System Architecture for C4I Coalition OperationsSystem Architecture for C4I Coalition Operations
System Architecture for C4I Coalition OperationsReal-Time Innovations (RTI)
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkReal-Time Innovations (RTI)
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Real-Time Innovations (RTI)
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...Real-Time Innovations (RTI)
 
System integration in offshore supply vessels – how we applied DDS and redefi...
System integration in offshore supply vessels – how we applied DDS and redefi...System integration in offshore supply vessels – how we applied DDS and redefi...
System integration in offshore supply vessels – how we applied DDS and redefi...Real-Time Innovations (RTI)
 
Integrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachIntegrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachRemedy IT
 

Tendances (20)

Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
Precise, Predictive, and Connected: DDS and OPC UA – Real-Time Connectivity A...
 
Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)Four keys to securing distributed control systems and the industrial (IoT)
Four keys to securing distributed control systems and the industrial (IoT)
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDSDeveloping Mission-Critical Avionics and Defense Systems with Ada and DDS
Developing Mission-Critical Avionics and Defense Systems with Ada and DDS
 
Best Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDSBest Practices Using RTI Connext DDS
Best Practices Using RTI Connext DDS
 
How to Cut $2 Million of Your Safety Cert Costs
How to Cut $2 Million of Your Safety Cert CostsHow to Cut $2 Million of Your Safety Cert Costs
How to Cut $2 Million of Your Safety Cert Costs
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
IoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and SensorsIoT Panel, Part II: Security for Silicon, Software, and Sensors
IoT Panel, Part II: Security for Silicon, Software, and Sensors
 
DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)DDS for Internet of Things (IoT)
DDS for Internet of Things (IoT)
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
IoT and M2M Safety and Security
IoT and M2M Safety and Security 	IoT and M2M Safety and Security
IoT and M2M Safety and Security
 
System Architecture for C4I Coalition Operations
System Architecture for C4I Coalition OperationsSystem Architecture for C4I Coalition Operations
System Architecture for C4I Coalition Operations
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
A Tour of RTI Applications
A Tour of RTI ApplicationsA Tour of RTI Applications
A Tour of RTI Applications
 
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
The Inside Story: How the IIC’s Connectivity Framework Guides IIoT Connectivi...
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 
System integration in offshore supply vessels – how we applied DDS and redefi...
System integration in offshore supply vessels – how we applied DDS and redefi...System integration in offshore supply vessels – how we applied DDS and redefi...
System integration in offshore supply vessels – how we applied DDS and redefi...
 
Integrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approachIntegrating DDS into AXCIOMA, the component approach
Integrating DDS into AXCIOMA, the component approach
 

Similaire à Upgrade Your System’s Security - Making the Jump from Connext DDS Professional to Connext DDS Secure

Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Cisco DevNet
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayDataWorks Summit
 
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsWebinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsAPPSeCONNECT
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshopkanimozhin
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...kanimozhin
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsThousandEyes
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Judy Breedlove
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02Shawn Wells
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Cloudera, Inc.
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoQuek Lilian
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure codeFlaskdata.io
 
Challenges In Modern Application
Challenges In Modern ApplicationChallenges In Modern Application
Challenges In Modern ApplicationRahul Kumar Gupta
 
Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...James DeLuccia IV
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubDataWorks Summit
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014Cloudera, Inc.
 
Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjurconjur_inc
 
Docker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker, Inc.
 
Oracle Blockchain Cloud Service
Oracle Blockchain Cloud ServiceOracle Blockchain Cloud Service
Oracle Blockchain Cloud ServiceMonte Kluemper
 

Similaire à Upgrade Your System’s Security - Making the Jump from Connext DDS Professional to Connext DDS Secure (20)

Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation Implementing Fast IT Deploying Applications at the Pace of Innovation
Implementing Fast IT Deploying Applications at the Pace of Innovation
 
Implementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right WayImplementing Security on a Large Multi-Tenant Cluster the Right Way
Implementing Security on a Large Multi-Tenant Cluster the Right Way
 
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major HighlightsWebinar: APPSeCONNECT Product Updates 2019 - Major Highlights
Webinar: APPSeCONNECT Product Updates 2019 - Major Highlights
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
Getting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of ConceptsGetting Started with ThousandEyes Proof of Concepts
Getting Started with ThousandEyes Proof of Concepts
 
OCS LIA
OCS LIAOCS LIA
OCS LIA
 
Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...Implementing Enterprise Identity and Access Management in a microservices wor...
Implementing Enterprise Identity and Access Management in a microservices wor...
 
2017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f022017 02-17 rsac 2017 tech-f02
2017 02-17 rsac 2017 tech-f02
 
Matrix
MatrixMatrix
Matrix
 
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
Comprehensive Security for the Enterprise III: Protecting Data at Rest and In...
 
Microsoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John DelizoMicrosoft Direct Access (Part II)_John Delizo
Microsoft Direct Access (Part II)_John Delizo
 
How to write secure code
How to write secure codeHow to write secure code
How to write secure code
 
Challenges In Modern Application
Challenges In Modern ApplicationChallenges In Modern Application
Challenges In Modern Application
 
Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...Cybersecurity model and top cloud security controls for product development e...
Cybersecurity model and top cloud security controls for product development e...
 
The Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data HubThe Future of Data Management - the Enterprise Data Hub
The Future of Data Management - the Enterprise Data Hub
 
The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014The Future of Hadoop Security - Hadoop Summit 2014
The Future of Hadoop Security - Hadoop Summit 2014
 
Q Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - ConjurQ Con New York 2015 Presentation - Conjur
Q Con New York 2015 Presentation - Conjur
 
Docker Federal Summit 2017 General Session
Docker Federal Summit 2017 General SessionDocker Federal Summit 2017 General Session
Docker Federal Summit 2017 General Session
 
Oracle Blockchain Cloud Service
Oracle Blockchain Cloud ServiceOracle Blockchain Cloud Service
Oracle Blockchain Cloud Service
 

Plus de Real-Time Innovations (RTI)

ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsReal-Time Innovations (RTI)
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesReal-Time Innovations (RTI)
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsReal-Time Innovations (RTI)
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Real-Time Innovations (RTI)
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...Real-Time Innovations (RTI)
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareReal-Time Innovations (RTI)
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Real-Time Innovations (RTI)
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Real-Time Innovations (RTI)
 
Integrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component ApproachIntegrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component ApproachReal-Time Innovations (RTI)
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Real-Time Innovations (RTI)
 
MiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryMiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryReal-Time Innovations (RTI)
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftReal-Time Innovations (RTI)
 

Plus de Real-Time Innovations (RTI) (15)

ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
The Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car ArchitecturesThe Low-Risk Path to Building Autonomous Car Architectures
The Low-Risk Path to Building Autonomous Car Architectures
 
How to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control SystemsHow to Design Distributed Robotic Control Systems
How to Design Distributed Robotic Control Systems
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
Learn About FACE Aligned Reference Platform: Built on COTS and DO-178C Certif...
 
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
The Inside Story: GE Healthcare's Industrial Internet of Things (IoT) Archite...
 
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity SoftwareSlash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
Slash Avionics Integration Costs with DO-178C Certifiable Connectivity Software
 
Tech Mahindra - Connected Engineering
Tech Mahindra - Connected EngineeringTech Mahindra - Connected Engineering
Tech Mahindra - Connected Engineering
 
Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.Generic Vehicle Architecture – DDS at the Core.
Generic Vehicle Architecture – DDS at the Core.
 
Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)Weather Information System Airport and Decision Support (WISADS)
Weather Information System Airport and Decision Support (WISADS)
 
Integrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component ApproachIntegrating DDS into AXCIOMA - The Component Approach
Integrating DDS into AXCIOMA - The Component Approach
 
Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...Distributed Communication and Control for a Network of Melting Probes in Extr...
Distributed Communication and Control for a Network of Melting Probes in Extr...
 
MiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic SurgeryMiroSurge: Research Platform for Robotic Surgery
MiroSurge: Research Platform for Robotic Surgery
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned Aircraft
 

Dernier

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaHanief Utama
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfDrew Moseley
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesŁukasz Chruściel
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfkalichargn70th171
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureDinusha Kumarasiri
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprisepreethippts
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Andreas Granig
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024StefanoLambiase
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfFerryKemperman
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...OnePlan Solutions
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineeringssuserb3a23b
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Cizo Technology Services
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 

Dernier (20)

React Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief UtamaReact Server Component in Next.js by Hanief Utama
React Server Component in Next.js by Hanief Utama
 
Comparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdfComparing Linux OS Image Update Models - EOSS 2024.pdf
Comparing Linux OS Image Update Models - EOSS 2024.pdf
 
Unveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New FeaturesUnveiling the Future: Sylius 2.0 New Features
Unveiling the Future: Sylius 2.0 New Features
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdfExploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
Exploring Selenium_Appium Frameworks for Seamless Integration with HeadSpin.pdf
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Implementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with AzureImplementing Zero Trust strategy with Azure
Implementing Zero Trust strategy with Azure
 
Odoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 EnterpriseOdoo 14 - eLearning Module In Odoo 14 Enterprise
Odoo 14 - eLearning Module In Odoo 14 Enterprise
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024Automate your Kamailio Test Calls - Kamailio World 2024
Automate your Kamailio Test Calls - Kamailio World 2024
 
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
Dealing with Cultural Dispersion — Stefano Lambiase — ICSE-SEIS 2024
 
Introduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdfIntroduction Computer Science - Software Design.pdf
Introduction Computer Science - Software Design.pdf
 
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
Maximizing Efficiency and Profitability with OnePlan’s Professional Service A...
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Software Coding for software engineering
Software Coding for software engineeringSoftware Coding for software engineering
Software Coding for software engineering
 
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
Global Identity Enrolment and Verification Pro Solution - Cizo Technology Ser...
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Advantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your BusinessAdvantages of Odoo ERP 17 for Your Business
Advantages of Odoo ERP 17 for Your Business
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 

Upgrade Your System’s Security - Making the Jump from Connext DDS Professional to Connext DDS Secure

  • 1. Making  the  Jump  to  Connext  DDS  Secure   The  Industrial  Internet  of  Things  Connec<vity  Company™  
  • 2. #RSAC Niheer  Patel   Niheer  Patel,  Product  Manager,   RTI,  has  over  11  years  of   experience  in  embedded   soFware  and  distributed   systems.  Niheer  has  a  Computer   Science  and  Engineering  degree   from  the  University  of  California,   San  Diego  and  a  Master  of   Business  Administra<on  degree   from  University  of  California,   Berkeley.      
  • 3. #RSAC Agenda   •  Speaker  Introduc<on   •  Industrial  Internet  and  Security  Frameworks   •  DDS  Security  Highlights   •  Connext  DDS  Secure  Pre-­‐Requisites  &  Configura<on   •  Connext  DDS  Secure  Shapes  Demo   –  Integrity   –  Confiden<ality   •  Addi<onal  Resources   •  Q&A   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 4. #RSAC Industrial  Internet  Consor<um:  250+  Companies,  25+  Countries   IIC  Founding  and  Contribu/ng  Members  
  • 5. #RSAC Industrial  Internet  Reference  Architecture   •  IIRA,  recently  released  v1.8   •  Comprehensive,  high  level   architecture  guidance   •  Standards  based  approach  to   Industrial  IoT  Systems.   hp://www.iiconsor<um.org/IIRA.htm  
  • 6. #RSAC Industrial  Internet  Connec<vity  Framework   •  IIRA  defines  the  “layered  databus   architecture”   •  IICF  defines  proper<es  for  core   connec<vity  pla`orms   hp://www.iiconsor<um.org/IICF.htm  
  • 7. #RSAC Industrial  Internet  Security  Framework   •  Extends  from  IIRA   •  Guidance  for  security  in  the   context  of  an  IIoT  system   architecture   •  Reference  for  testbeds  that   provide  con<nual  feedback  on   security  frameworks   hp://www.iiconsor<um.org/IISF.htm  
  • 10. #RSAC Securing  System  Boundaries   •  System  Boundary   •  Network  Transport   –  Media  access  (layer  2)   –  Network  (layer  3)  security   –  Session/Endpoint  (layer  4/5)  security   •  Host   –  Machine/OS/Applica<ons/Files   •  Data  &  Informa<on  flows   DDS  Security   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 11. #RSAC Threats  in  a  Pub/Sub  System   •  Unauthorized  Subscrip<on   •  Unauthorized  Publica<on   •  Tampering  &  Replay   •  Unauthorized  access  by   infrastructure  services   Alice   Bob   Eve   Trudy   Trent   Mallory   Local  machine  is  assumed  to  be  trusted   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 12. #RSAC Connext  DDS  Secure   •  Based  on  DDS  Security  specifica<on   •  Access  control  without  a  broker  or  server   –  Fine-­‐grain,  integrated  and  peer-­‐to-­‐peer   •  Far  more  scalable  and  efficient  than  TLS   –  Fine  grain  control  over  over  topics  and  message  segments   –  Mul<cast  support  for  efficient  1:many  and  many:many   –  TLS/DTLS  support  available  for  simple  use  cases   •  Preserves  Real-­‐Time  QoS   –  Not  dependent  on  TCP   •  Transport  flexibility   –  Does  not  require  IP   –  Secures  data  over  any  transport,  including  shared  memory   •  Add  security  with  lile  or  no  change  to  exis<ng  DDS  apps   •  Plugin  SDK  allows  for  custom  solu<on   ©2017  Real-­‐Time  Innova<ons,  Inc.       Connext  DDS     Library   Authen<ca<on   Access  Control   Encryp<on   Logging   Applica<on   Any  Transport   (e.g.,  TCP,  UDP,  mul<cast,   shared  memory…)   Data  Tagging  
  • 13. #RSAC Create   Domain   Par<cipant     Create   Endpoints   Discover   remote   Endpoints   Send/Receive   data   Discover   remote  DP   Authen<cate   DP?  Yes   Domain   Par<cipant   Create  Fails   No   Plugins  In  Ac<on  –  What  is  really  happening?   Access  OK?   Endpoint   Create  Fails   No   Authen<cate   Remote  DP?   Ignore   Remote  DP   No   Yes   Message   security   Access  OK?   Ignore   remote   endpoint   No   DP  =  Domain  Par<cipant   Endpoint  =  Reader  /  Writer   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 14. #RSAC Domain   Governance   Document   Shared  CA   Cer<ficate   Permissions   CA   Cer<ficate   P2  Iden<ty   Cer<ficate   P2  Private   Key   P2   P2  Permissions   File   P1  Iden<ty   Cer<ficate   P1  Private   Key   P1   P1  Permissions   File   •  Keys.  Each  par<cipant  has  a  pair  of  public  &  private  keys  used  in  authen<ca<on  process.  Public  keys  are   embedded  in  the  iden<ty  cer<ficate  of  each  par<cipant.   •  Shared  CA  that  has  signed  par<cipant  public  keys.  Par<cipants  need  to  have  a  copy  of  the  CA  cer<ficate  as   well.   •  Permissions  File  specifies  what  domains/par<<ons  the  DP  can  join,  what  topics  it  can  read/write,  what  tags   are  associate  with  the  readers/writers     •  Domain  Governance  specifies  which  domains  should  be  secured  and  how   •  Permissions  CA  that  has  signed  par<cipant  permission  file  as  well  as  the  domain  governance  document.   Par<cipants  need  to  have  a  copy  of  the  permissions  CA  cer<ficate.   Configuring  &  Deploying  DDS  Security   Signed  by  Permissions   CA   Signed  by  Shared  CA   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 15. #RSAC QoS  Configura<on:  “SecureAllowAll”     /Applica<ons/r<_connext_dds-­‐5.2.6/resource/xml/RTI_SHAPES_DEMO_QOS_PROFILES.xml     •  QoS  Elements   encapsulated   within  the   <property>  tag.   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 16. #RSAC Permissions  File   /Applica<ons/r<_connext_dds-­‐5.2.6/resource/xml/RTI_SHAPES_DEMO_PERMISSIONS.xml     •  Define  individual  par<cipant   permissions  rules   •  “AllowAll”  PERMISSIONS:   •  No  restric<ons  on  what   can  be  published  or   subscribed   •  “SecureDenyPubCircles”   •  No  restric<ons  except   that  Circle  topics   cannot  be  published.   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 17. #RSAC Governance  File   /Applica<ons/r<_connext_dds-­‐5.2.6/resource/xml/RTI_SHAPES_DEMO_GOVERNANCE_MAX.xml     •  Iden<fy  ac<ons  for   discovery,  liveliness,  RTPS   protec<on,  etc.   •  Define  access  control  rules   for  topics  using  regular   expressions   •  GOVERNANCE_MAX.xml   •  All  topics  encrypted   •  Except  Circles   ©2017  Real-­‐Time  Innova<ons,  Inc.      
  • 18. #RSAC Upgrading  Systems  under  Development   Upgrade  Steps   Impact/Behavior   Rebuild  applica/ons  that  require  DDS  APIs   with  Connext  DDS  Security  Plugins.   No  performance  impact  as  security  features   are  not  yet  enabled.   Enable  authen/ca/on  but  configure  domain   to  allow  unauthen/cated  par/cipants   Some  impact  to  discovery  behavior;   Introduc/on  signed  governance  files  requires   PKI  &  CA  to  be  in  place.   Enable  protec/on  (confiden/ality,   authen/city,  and  integrity)  of  individual   topics.   Performance  impact  during  run/me  due  to   introduc/on  of  encryp/on.  Fine  grained   security  now  in  place.     Enable  protec/on  of  RTPS-­‐level  and  Liveliness   fields   Very  liUle  impact  to  system  performance.    
  • 19. #RSAC Upgrading  Deployed  Systems  –  Rou<ng  Service   ©2017  Real-­‐Time  Innova<ons,  Inc.       Secure   DDS  Domain   Non-­‐secure   DDS  Domain   Par<cipant   Par<cipant   Par<cipant   Par<cipant   Par<cipant   Par<cipant   Par<cipant   Par<cipant  
  • 21. #RSAC References   •  Industrial  Internet  Reference  Architecture   –  hp://www.iiconsor<um.org/IIRA.htm   •  Industrial  Internet  Connec<vity  Framework   –  hp://www.iiconsor<um.org/IICF.htm   •  Industrial  Internet  Security  Framework   –  hp://www.iiconsor<um.org/IISF.htm   •  OMG  DDS  specifica<on   –  hp://www.omg.org/spec/DDS/1.4/PDF   •  OMG  DDS  Security  specifica<on   –  hp://www.omg.org/spec/DDS-­‐SECURITY/1.0/PDF   •  RTI  Technology  Whitepapers   –  hps://www.r<.com/resources/whitepapers  
  • 22. #RSAC Resources     hps://www.r<.com/gexngstarted         hp://community.r<.com       hps://www.r<.com/connext-­‐dds-­‐ seminar-­‐sd-­‐2017