SlideShare une entreprise Scribd logo
1  sur  61
Télécharger pour lire hors ligne
#RSAC
#RSAC
ThingThing
ThingThing Edge
Gateway
Edge
Gateway
ThingThing
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Business IntelligenceRules / Analytics
Device Management
Cut costs
Create value
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Rules / AnalyticsRules / Analytics
Device Management
Find information
in data then act
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Device ManagementRules / Analytics
Device Management
Maintain Things
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Directory / RegistryRules / Analytics
Device Management
Enrol Authorized
Users & Things
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Authentication & AuthorizationRules / Analytics
Device Management
Set and Enforce
Policy
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Cloud GatewayRules / Analytics
Device Management
Ingest data
from known sources
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Edge GatewayRules / Analytics
Device Management
Connect
Local Things
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Thing IdentityRules / Analytics
Device Management
Secure
Thing to Cloud
Relationship
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Code ProtectionRules / Analytics
Device Management
Protect
Application
Secrets & Integrity
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Operating SystemRules / Analytics
Device Management
Privilege
Separation
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Comms ModuleRules / Analytics
Device Management
Secure
Communication
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Embedded FirmwareRules / Analytics
Device Management
Secure Boot
Runtime Integrity
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Silicon ChipRules / Analytics
Device Management
Resist Tampering
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Security BlocksRules / Analytics
Device Management
Embedded
Cryptography
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
Business Intelligence
Processor ArchitectureRules / Analytics
Device Management
Isolate
Sensitive Assets
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip
Security Blocks
Processor Architecture
#RSAC#RSAC
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Social
Traffic
Hack
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Thermostat
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Stranded
Driver
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Mirai botnet
Open ports
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
ZLL shared
signing key
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
KRACK
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Debug
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
ROCA
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture CLKSCREW, SPECTRE
Side channel analysis or fault injection
secure
“Things are only impossible
until they are not”
Safety = Safety(Security)
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Social
Traffic Hack
Thermostat
Stranded
Driver
Mirai botnet
ZLL shared
signing key
Open ports
KRACK
ROCA
CLKSCREW
Debug
#RSAC
Worried?
#RSAC#RSAC
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Strong ID
Secure
by
Design
Chipset
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Strong ID
Secure
by
Design
Chipset
Granular
Updates
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Strong ID
Secure
by
Design
Chipset
Hybrid
Identity
Access
Mgmt
Granular
Updates
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Assured
Intelligence
Strong ID
Secure
by
Design
Chipset
Hybrid
Identity
Access
Mgmt
Granular
Updates
Clean data will:
“restore […] a democratic system based on knowledge, based on facts and truth”
Business Intelligence
Rules / Analytics
Device Management
Directory / Registry
AuthN & AuthZ
Cloud Gateway
Edge Gateway
Thing Identity
Code Protection
Operating System
Comms Module
Embedded Firmware
Silicon Chip 
Security Blocks
Processor Architecture
Identity
Access
Management
Thing
Security
IoT
Platform
Device
Mgmt
ARM
mbed cloud
mbed uVisor
mbed OS
mbed cloud
provision
mbed cloud
Certificate
Authority
eSIM
&
Trusted
Platform
Modules
Thing
Platform
#RSAC
IoT Client Application(s)
Sensor
Digital
Conversion
Physical property Identity
Crypto &
Keys
Tamper-
proof store
Data
Microcontroller Bus
Microcontroller + ROM, RAM and FLASH
OS
Network
Interface
Antenna /
Cable
#RSAC
Secure Key Store
Secure JTAG
Secure Flash Storage
Thing Manufacturer Thing User
Hardware Architecture
Identity toolkits
Trusted Environments
Secure Boot Loaders
Software Development
Design RFIs
Vendor Selection
Plan / Prototype
#RSAC
Secure Key Store
Secure JTAG
Secure Flash Storage
Thing Manufacturer Thing User
Hardware Architecture
Identity toolkits
Trusted Environments
Secure Boot Loaders
Software Development
Encrypted software
HSM Certificate creation
Secure Manufacturing
Provenance checking
Applying Updates
Installation
Attestation
Registration
Authentication
Enrol
Design
Deploy
RFIs
Vendor Selection
Plan / Prototype
#RSAC
Secure Key Store
Secure JTAG
Secure Flash Storage
Thing Manufacturer Thing User
Hardware Architecture
Identity toolkits
Trusted Environments
Secure Boot Loaders
Software Development
Encrypted software
HSM Certificate creation
Secure Manufacturing
Vulnerability tracking
Firmware signing
Authorized updates
Secure Updates
Provenance checking
Applying Updates
Installation
Attestation
Registration
Authentication
Enrol
Authorization
Session Establishment
Token Binding
Operation
Availability assessment
Authorized patching
Secure Updates
Design
Deploy
Operate and Maintain
RFIs
Vendor Selection
Plan / Prototype
#RSAC
Secure Key Store
Secure JTAG
Secure Flash Storage
Thing Manufacturer Thing User
Hardware Architecture
Identity toolkits
Trusted Environments
Secure Boot Loaders
Software Development
Encrypted software
HSM Certificate creation
Secure Manufacturing
Vulnerability tracking
Firmware signing
Authorized updates
Secure Updates
Provenance checking
Applying Updates
Installation
Attestation
Registration
Authentication
Enrol
Authorization
Session Establishment
Token Binding
Operation
Availability assessment
Authorized patching
Secure Updates
Design
Deploy
Operate and Maintain
Retire Revoke Certificates
Notice to Users
End-of-Life / Recall
Deauthorize
Deactivate
Destroy Identities
Decommission
RFIs
Vendor Selection
Plan / Prototype
#RSAC
Device Shadows
IoT Platform
Gateway
Device Registry
User Directory
Data stream processing
IoT Application
Gateway
Edge
Gateway
Internet Thing
Networked
Thing
Device Management
Storage
Analytics
Machine Learning
IoT Application
IoT Client
IoT Client
API Token
Inspection
API Token
Inspection
Data Governance
Authentication
Authorization
Accounting
Connectivity Management Application
Identity
Federation
#RSAC
#RSAC
Internet of Things wants
YOU
#RSAC
#RSAC
#RSAC#RSAC

Contenu connexe

Tendances

Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directoryPriyanka Aash
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesPriyanka Aash
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponsePriyanka Aash
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesPriyanka Aash
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster CompanyPriyanka Aash
 
Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloudPriyanka Aash
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinPriyanka Aash
 
Cloud security : Automate or die
Cloud security : Automate or dieCloud security : Automate or die
Cloud security : Automate or diePriyanka Aash
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldCisco Canada
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalPriyanka Aash
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and ResponseAlert Logic
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainPriyanka Aash
 
Within 10-years-autonomous-vehicles-will-change-every-ciso s-job
Within 10-years-autonomous-vehicles-will-change-every-ciso s-jobWithin 10-years-autonomous-vehicles-will-change-every-ciso s-job
Within 10-years-autonomous-vehicles-will-change-every-ciso s-jobDESMOND YUEN
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
Soc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- themSoc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- themPriyanka Aash
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updatedInfosecTrain
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 

Tendances (20)

Beyond the mcse red teaming active directory
Beyond the mcse  red teaming active directoryBeyond the mcse  red teaming active directory
Beyond the mcse red teaming active directory
 
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security HeadachesAspirin as a Service: Using the Cloud to Cure Security Headaches
Aspirin as a Service: Using the Cloud to Cure Security Headaches
 
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and ResponseCloud Breach – Preparation and Response
Cloud Breach – Preparation and Response
 
Designing Virtual Network Security Architectures
Designing Virtual Network Security ArchitecturesDesigning Virtual Network Security Architectures
Designing Virtual Network Security Architectures
 
Security Program Development for the Hipster Company
Security Program Development for the Hipster CompanySecurity Program Development for the Hipster Company
Security Program Development for the Hipster Company
 
Incident response-in-the-cloud
Incident response-in-the-cloudIncident response-in-the-cloud
Incident response-in-the-cloud
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and BitcoinCrypto 101: Encryption, Codebreaking, SSL and Bitcoin
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
 
Azure for Auditors
Azure for AuditorsAzure for Auditors
Azure for Auditors
 
Cloud security : Automate or die
Cloud security : Automate or dieCloud security : Automate or die
Cloud security : Automate or die
 
Advanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real WorldAdvanced threat security - Cyber Security For The Real World
Advanced threat security - Cyber Security For The Real World
 
Making Threat Intelligence Actionable Final
Making Threat Intelligence Actionable FinalMaking Threat Intelligence Actionable Final
Making Threat Intelligence Actionable Final
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill ChainOrchestrating Software Defined Networks To Disrupt The Apt Kill Chain
Orchestrating Software Defined Networks To Disrupt The Apt Kill Chain
 
Within 10-years-autonomous-vehicles-will-change-every-ciso s-job
Within 10-years-autonomous-vehicles-will-change-every-ciso s-jobWithin 10-years-autonomous-vehicles-will-change-every-ciso s-job
Within 10-years-autonomous-vehicles-will-change-every-ciso s-job
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Soc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- themSoc 2030-socs-are-broken-lets-fix- them
Soc 2030-socs-are-broken-lets-fix- them
 
Offensive cyber security engineer updated
Offensive cyber security engineer updatedOffensive cyber security engineer updated
Offensive cyber security engineer updated
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 

Similaire à Identity-Based Security and Privacy for the Internet of Things

AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)Amazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Designjonmccoy
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformAshnikbiz
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudAmazon Web Services
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelAtlassian
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud SecurityMongoDB
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
Architecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft AzureArchitecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft AzureAlon Fliess
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Eurotech
 
AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423Jamie (Taka) Wang
 
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysqqlan
 
Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...
Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...
Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...Windows Developer
 
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...Edge AI and Vision Alliance
 
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V International
 

Similaire à Identity-Based Security and Privacy for the Internet of Things (20)

AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
AWS re:Invent 2016: IoT Security: The New Frontiers (IOT302)
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by DesignJon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
Jon McCoy - AppSec-USA-2014 Hacking C#(.NET) Applications:Defend by Design
 
The Sysdig Secure DevOps Platform
The Sysdig Secure DevOps PlatformThe Sysdig Secure DevOps Platform
The Sysdig Secure DevOps Platform
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Trusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy ModelTrusted by Default: The Forge Security & Privacy Model
Trusted by Default: The Forge Security & Privacy Model
 
Enterprise Cloud Security
Enterprise Cloud SecurityEnterprise Cloud Security
Enterprise Cloud Security
 
AWS 資料數據與 IoT
AWS 資料數據與 IoTAWS 資料數據與 IoT
AWS 資料數據與 IoT
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
Architecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft AzureArchitecting IoT solutions with Microsoft Azure
Architecting IoT solutions with Microsoft Azure
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423AWS IoT & ML Recap - 20180423
AWS IoT & ML Recap - 20180423
 
Positive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-raysPositive Technologies - S4 - Scada under x-rays
Positive Technologies - S4 - Scada under x-rays
 
Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...
Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...
Build 2017 - B8024 - Connected intelligent things with Windows IoT Core and A...
 
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
“Deploying Edge AI Solutions at Scale for the Internet of Things,” a Presenta...
 
RISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notesRISC-V 30946 manuel_offenberg_v3_notes
RISC-V 30946 manuel_offenberg_v3_notes
 
Data trustworthiness at the edge
Data trustworthiness at the edgeData trustworthiness at the edge
Data trustworthiness at the edge
 
IoT on azure
IoT on azureIoT on azure
IoT on azure
 

Plus de Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing Priyanka Aash
 

Plus de Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 
Web Application Penetration Testing
Web Application Penetration Testing Web Application Penetration Testing
Web Application Penetration Testing
 

Dernier

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesZilliz
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Vector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector DatabasesVector Databases 101 - An introduction to the world of Vector Databases
Vector Databases 101 - An introduction to the world of Vector Databases
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Identity-Based Security and Privacy for the Internet of Things

  • 2.
  • 3.
  • 4.
  • 6.
  • 7.
  • 9.
  • 11.
  • 12. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 13. Business Intelligence Business IntelligenceRules / Analytics Device Management Cut costs Create value Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 14. Business Intelligence Rules / AnalyticsRules / Analytics Device Management Find information in data then act Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 15. Business Intelligence Device ManagementRules / Analytics Device Management Maintain Things Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 16. Business Intelligence Directory / RegistryRules / Analytics Device Management Enrol Authorized Users & Things Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 17. Business Intelligence Authentication & AuthorizationRules / Analytics Device Management Set and Enforce Policy Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 18. Business Intelligence Cloud GatewayRules / Analytics Device Management Ingest data from known sources Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 19. Business Intelligence Edge GatewayRules / Analytics Device Management Connect Local Things Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 20. Business Intelligence Thing IdentityRules / Analytics Device Management Secure Thing to Cloud Relationship Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 21. Business Intelligence Code ProtectionRules / Analytics Device Management Protect Application Secrets & Integrity Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 22. Business Intelligence Operating SystemRules / Analytics Device Management Privilege Separation Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 23. Business Intelligence Comms ModuleRules / Analytics Device Management Secure Communication Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 24. Business Intelligence Embedded FirmwareRules / Analytics Device Management Secure Boot Runtime Integrity Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 25. Business Intelligence Silicon ChipRules / Analytics Device Management Resist Tampering Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 26. Business Intelligence Security BlocksRules / Analytics Device Management Embedded Cryptography Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 27. Business Intelligence Processor ArchitectureRules / Analytics Device Management Isolate Sensitive Assets Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture
  • 29. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Social Traffic Hack
  • 30. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Thermostat
  • 31. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Stranded Driver
  • 32. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Mirai botnet Open ports
  • 33. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture ZLL shared signing key
  • 34. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture KRACK
  • 35. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Debug
  • 36. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture ROCA
  • 37. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture CLKSCREW, SPECTRE Side channel analysis or fault injection
  • 38. secure “Things are only impossible until they are not”
  • 39.
  • 41.
  • 42. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Social Traffic Hack Thermostat Stranded Driver Mirai botnet ZLL shared signing key Open ports KRACK ROCA CLKSCREW Debug
  • 45. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Strong ID Secure by Design Chipset
  • 46. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Strong ID Secure by Design Chipset Granular Updates
  • 47. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Strong ID Secure by Design Chipset Hybrid Identity Access Mgmt Granular Updates
  • 48. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Assured Intelligence Strong ID Secure by Design Chipset Hybrid Identity Access Mgmt Granular Updates Clean data will: “restore […] a democratic system based on knowledge, based on facts and truth”
  • 49. Business Intelligence Rules / Analytics Device Management Directory / Registry AuthN & AuthZ Cloud Gateway Edge Gateway Thing Identity Code Protection Operating System Comms Module Embedded Firmware Silicon Chip Security Blocks Processor Architecture Identity Access Management Thing Security IoT Platform Device Mgmt ARM mbed cloud mbed uVisor mbed OS mbed cloud provision mbed cloud Certificate Authority eSIM & Trusted Platform Modules Thing Platform
  • 50. #RSAC IoT Client Application(s) Sensor Digital Conversion Physical property Identity Crypto & Keys Tamper- proof store Data Microcontroller Bus Microcontroller + ROM, RAM and FLASH OS Network Interface Antenna / Cable
  • 51. #RSAC Secure Key Store Secure JTAG Secure Flash Storage Thing Manufacturer Thing User Hardware Architecture Identity toolkits Trusted Environments Secure Boot Loaders Software Development Design RFIs Vendor Selection Plan / Prototype
  • 52. #RSAC Secure Key Store Secure JTAG Secure Flash Storage Thing Manufacturer Thing User Hardware Architecture Identity toolkits Trusted Environments Secure Boot Loaders Software Development Encrypted software HSM Certificate creation Secure Manufacturing Provenance checking Applying Updates Installation Attestation Registration Authentication Enrol Design Deploy RFIs Vendor Selection Plan / Prototype
  • 53. #RSAC Secure Key Store Secure JTAG Secure Flash Storage Thing Manufacturer Thing User Hardware Architecture Identity toolkits Trusted Environments Secure Boot Loaders Software Development Encrypted software HSM Certificate creation Secure Manufacturing Vulnerability tracking Firmware signing Authorized updates Secure Updates Provenance checking Applying Updates Installation Attestation Registration Authentication Enrol Authorization Session Establishment Token Binding Operation Availability assessment Authorized patching Secure Updates Design Deploy Operate and Maintain RFIs Vendor Selection Plan / Prototype
  • 54. #RSAC Secure Key Store Secure JTAG Secure Flash Storage Thing Manufacturer Thing User Hardware Architecture Identity toolkits Trusted Environments Secure Boot Loaders Software Development Encrypted software HSM Certificate creation Secure Manufacturing Vulnerability tracking Firmware signing Authorized updates Secure Updates Provenance checking Applying Updates Installation Attestation Registration Authentication Enrol Authorization Session Establishment Token Binding Operation Availability assessment Authorized patching Secure Updates Design Deploy Operate and Maintain Retire Revoke Certificates Notice to Users End-of-Life / Recall Deauthorize Deactivate Destroy Identities Decommission RFIs Vendor Selection Plan / Prototype
  • 55. #RSAC Device Shadows IoT Platform Gateway Device Registry User Directory Data stream processing IoT Application Gateway Edge Gateway Internet Thing Networked Thing Device Management Storage Analytics Machine Learning IoT Application IoT Client IoT Client API Token Inspection API Token Inspection Data Governance Authentication Authorization Accounting Connectivity Management Application Identity Federation
  • 56. #RSAC
  • 57. #RSAC
  • 58. Internet of Things wants YOU
  • 59. #RSAC
  • 60. #RSAC