Securing Smart City Platforms IoT, M2M, Cloud and Big Data



Similar documents
Chapter 1 The Principles of Auditing 1

Unified Threat Management, Managed Security, and the Cloud Services Model

Injazat s Managed Services Portfolio

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Ragy Magdy Regional Channel Manager MEA IBM Security Systems

PART D NETWORK SERVICES

CompTIA Security+ (Exam SY0-410)

White Paper How Noah Mobile uses Microsoft Azure Core Services

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Jort Kollerie SonicWALL

The Cyber Threat Profiler

Recommended IP Telephony Architecture

A HELPING HAND TO PROTECT YOUR REPUTATION

Lecture 02b Cloud Computing II

Security Services. 30 years of experience in IT business

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

External Supplier Control Requirements

PCI Requirements Coverage Summary Table

Certified Information Systems Auditor (CISA)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Critical Controls for Cyber Security.

Network Security Administrator

Security from a customer s perspective. Halogen s approach to security

Securing The Cloud. Foundational Best Practices For Securing Cloud Computing. Scott Clark. Insert presenter logo here on slide master

Cloud Computing Governance & Security. Security Risks in the Cloud

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Enterprise Computing Solutions

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

13 Ways Through A Firewall

Update On Smart Grid Cyber Security

Cisco Advanced Services for Network Security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

How Much Cyber Security is Enough?

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Introduction to Cyber Security / Information Security

ICANWK406A Install, configure and test network security

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

V1.4. Spambrella Continuity SaaS. August 2

A Decision Maker s Guide to Securing an IT Infrastructure

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

The Internet of ANYthing

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

Networking: EC Council Network Security Administrator NSA

Security Issues in Cloud Computing

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

Security Threat Risk Assessment: the final key piece of the PIA puzzle

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

GoodData Corporation Security White Paper

Caretower s SIEM Managed Security Services

How To Protect Your Cloud From Attack

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Tenzing Security Services and Best Practices

QuickBooks Online: Security & Infrastructure

TENDER NOTICE No. UGVCL/SP/III/608/GPRS Modem Page 1 of 6. TECHNICAL SPECIFICATION OF GPRS based MODEM PART 4

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

The Education Fellowship Finance Centralisation IT Security Strategy

Bellevue University Cybersecurity Programs & Courses

SANS Top 20 Critical Controls for Effective Cyber Defense

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

Continuous, proactive cybersecurity.

Developing the Corporate Security Architecture. Alex Woda July 22, 2009

Close the security gap with a unified approach. Detect, block and remediate risks faster with end-to-end visibility of the security cycle

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Achieving PCI-Compliance through Cyberoam

Secure networks are crucial for IT systems and their

Securing your IOT journey and beyond. Alvin Rodrigues Market Development Director South East Asia and Hong Kong. What is the internet of things?

e2e Secure Cloud Connect Service - Service Definition Document

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

STATE OF NEW JERSEY Security Controls Assessment Checklist

Internet of Things (IoT): Security Awareness. Sandra Liepkalns, CRISC

Firewall and UTM Solutions Guide

CONTENTS. PCI DSS Compliance Guide

Payment Card Industry Data Security Standard

McAfee Security Architectures for the Public Sector

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

City of Coral Gables

Security Management of Cloud-Native Applications. Presented By: Rohit Sharma MSc in Dependable Software Systems (DESEM)

How To Protect Your Cloud Computing Resources From Attack

IT Infrastructure Services. White Paper. Cyber Risk Mitigation for Smart Cities

13 Ways Through A Firewall What you don t know will hurt you

Addressing the SANS Top 20 Critical Security Controls for Effective Cyber Defense

Virtual Privacy vs. Real Security

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

IBX Business Network Platform Information Security Controls Document Classification [Public]

John Essner, CISO Office of Information Technology State of New Jersey

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

Transcription:

SESSION ID: SSC-W10 Securing Smart City Platforms IoT, M2M, Cloud and Big Data Ibrahim Al Mallouhi Vice President - Operations Emirates Integrated Telecommunication Company (du) Roshan Daluwakgoda Senior Director - Managed Services Design Emirates Integrated Telecommunication Company (du)

Agenda UAE Smart City ambitions and progress Understanding and addressing Smart City platform security The new threat landscape Secure IoT Secure Big Data Secure Cloud Bringing this together - security governance Conclusion and action 2

UAE Smart city ambitions Dubai Smart City strategy confirmed for 100 initiatives across 6 pillars Technology adoption rate in the UAE is one of the fastest if not the fastest in the world Transport Communications Infrastructure Electricity Economic Services Urban Planning 100 Initiatives 1000 smart services by 2017 3

UAE progress - Internet of Things Middle East s first successful Internet of Things network already deployed 8 Dubai locations with 5km radius each Supports any kind of sensor with minimal power consumption and can be installed for a variety of systems Several smart initiatives in Dubai Silicon Oasis have completed Proof of Concepts testing ahead of large scale implementation E.g. Smart waste management By 2020, hundreds of thousands of IoT sensors will be deployed 4

UAE progress - Wi-Fi UAE Free high bandwidth for accessing government websites Dubai coverage completed, now extending across the country By 2020, smartphones will be able to support up to 10Gbps 5G 5

UAE progress - Big Data Dubai data regulation recently approved will open a host of opportunities for private and public companies Dubai in 2020 Significant government commitment to be the world s smartest city Analytics afforded by IoT offers wide data benefit for consumers, businesses and government entities 6

visibility today Annually we process 1.4Tb mobile & Voice services security events 6.6Tb broadband services security events 5.7Tb IP TV & streaming services events Across 10,000+ network switches & routers 3000+ server environment 20+ data centres 2 billion events analysed daily 300 million security relevant events correlated per day 25 unique security incidents investigated and mitigated daily Supported by 540 intelligence use cases Malicious code infection responsible for 49% of investigated incidence 38% of which were not detected by standard anti-malware

Smart City context Significant change in landscape Presents an x multiple in terms of data volume, devices and technologies Traditional security approaches are no longer applicable and must evolve However, we must embrace the opportunities in open standards in enabling diverse interfaces to work seamlessly in an integrated architecture 8

Understanding and addressing Smart City platform security

Smart City technology stack Technology exposure Devices and Sensors IoT devices, sensor network, RFID, cameras Connectivity - M2M / IoT, WiFi, Fixed and Mobile Data Orchestration Structured/unstructured data, city semantics, Big Data Infrastructure Cloud IaaS, PaaS & SaaS 10

Attack layer and defense layer DEFENSE LAYER OF THE SCP SMART CITY PLATFORM ATTACK LAYER OF THE SCP Multifactor Federated Authentication Web Application Firewalls & Load Balancing Next Generation Perimeter Firewall Distributed Denial of Service Protection Web Application Scanning Event Monitoring Information Governance APPLICATION LAYER Present Interact Communicate SQL injection, CSS, SPAM, phising, account takeover Identity Management & SSO Storage Encryption Vulnerability Management Policy Compliance Next Generation Firewalls (Virtual) Endpoint Event Monitoring Information Governance MPLS VPN (isolation) IPSec VPN (encryption) SSL (end to end encryption) Event Monitoring Information Governance Secure Device Enrollment & Management SERVICES ENABLEMENT & DATA ORCHESTRATION LAYER IOT LAYER INFRASTRUCTURE LAYER User experience Friendliness Interoperability Process Analyze Store Report Connect Translate Convert Transmit buffer overflows, email relays, scanning, password attacks, DDoS Interception, routing attacks Jamming Eaves dropping DDoS Tampering ID theft, impersonation Social Eng. Fraud SNOC City Data Sources 11 Human layer

IoT low power devices Low power consumption (to the range of nano amp) that enable devices to last for 10 years on a single charge Optimized data transfer (supports small, intermittent blocks of data) Low device unit cost (sub-$5 per module) Simplified network topology and deployment for example, via software upgrade Optimized for low throughput 12

IoT - market classifications Two types of LPWAN network technologies to be considered Unlicensed Networks: such as LoRa, Sigfox, OnRamp wireless, Weightless, etc. Licensed Networks (3GPP/GSMA for Cellular IoT) 13

IoT - LoRa network security capabilities of LoRa network: Two levels of security deployed Promoted by the LoRa Alliance An open standard for Low Power Wide Area Networks (LPWAN) to enable Internet of Things (IoT), machine-to-machine (M2M), smart city and industrial applications by utilizing the LoRa protocol (LoRaWAN). 14

IoT - connected devices 26 billion connected devices in 2020 value $14.6 trillion 15

IoT - vulnerabilities Attack vectors Impact IoT (sensors, devices, wifi, etc.) Disable sensors and repeaters by changing configuration Fake data generated by manipulation the packets Make sensors and repeaters unusable by changing firmware Ability to flood access points with fake packets Unauthorised connectivity, packet sniffing, DDoS attack Compromise single sensor or repeater with malicious firmware, replicate to other sensors 16

IoT - security Device Management Authentication and authorization logging sub-system Encrypted storage of all sensitive data Protection against common breach protocols Connectivity 17

Cloud - SCP architecture SMART CITY PLATFORM The architecture includes primarily the following functional layers: Cloud automation and assurance Software defined network (SDN) fabric Multi-layer security Integrated compute platform Multi-tier storage layer APPLICATION LAYER SERVICES ENABLEMENT & DATA ORCHESTRATION LAYER IOT LAYER INFRASTRUCTURE LAYER User experience Friendliness Interoperability 18 Human layer

Cloud - platform defence in depth security Physical security access control, CCTV, security guard) Perimeter DDoS protection, Firewall, L7 Content security, etc. Network Virtual network security, tenet isolation, Network treat analysis etc. 6 OAM 1 Physical 2 Perimeter Server hypervisor & operating system security, server load balancing, etc. 5 Application 3 Network Application web app firewall, RBAC, etc. Operations, administration and management security monitoring, remote secure access, vulnerability scanning, policy compliance, etc. 4 Server 19

Cloud - automated security policy compliance continuously monitor security policy compliance in multiple layers Network Virtualization layer Hypervisor layer Operating system layer Application layer Database layer layer Orchestration layer 20

Cloud security Trust and Assurance CSA STAR continuous monitoring Providers publish their security practices according to CSA formatting and specifications. CSA STAR (security Trust and Assurance Registry) Continuous will be based on a continuous auditing/assessment of relevant security properties Cloud Controls Matrix (CCM) Cloud Trust Protocol (CTP) CloudAudit (A6) Source : Cloud Alliance 21

Governance

Smart City - information security functional framework Domains Applicable Compliances Audit Risk Assessment & Audit NSA IAM/IEM, NIST, ISO27001 People Process Penetration Testing & Assurance Awareness Strategy Outsource Governance Policy & Compliance Business Continuity Infrastructure Demand & Delivery Architecture Network & System Monitoring Centre SIRT Disaster Recovery and BCP Architecture ISO27001, ISO20000, ITIL v3 ISO27001, FIRST BS25999, ISO24762 ISO18028, ITU.TX805, ISO27011 Technology Identity & Access Application Data Operations Threat Intelligence Incident Response Monitoring & Reporting Vulnerability Management Attack Path Simulation Telecom Fraud Monitoring Service Strategy Service Design Service Transition

The SCP s cornerstone architecture framework Business view Contextual architecture architecture, in terms of information technology, is best defined as the conceptualization, design and implementation of secure business information systems Risk Analysis Policies & Procedures Controls WHAT? Assets WHY? Motivation HOW? Process WHO? People WHERE? Location Architect s view Designer s view Builder s view Trademan s view Service manager s view Conceptual architecture Logical architecture Physical architecture Component architecture Operational architecture WHEN? Time

Smart City platform governance security maturity NG ISMS The Information Organization The Information Principles The Information Policy The Information Procedures DSA Next Generation Firewall architecture Systems architecture Applications architecture Management architecture Web Application architecture Database architecture Cloud architecture Big Data architecture Intrusion Detection & Prevention architecture Analytics architecture VPN Gateways architecture RA Risk Identification Threat Analysis Vulnerability Analysis Risk Estimation Risk Evaluation Risk Monitoring & Review Risk Treatment Control Implementation Residual Risk Calculation Ongoing security risk management Maintenance and monitoring 25 Policy Maintenance & Improvement Internal NG ISMS Audit Third Party Connectivity Information Asset Classification & Data Protection Equipment Disposal & Re use System/Application Acquisition, Development and Operation Protection from malicious code Internet & E mail security Remote Access User Access Communications and Network Cloud Computing Mobile Computing Encryption Incident Handling Acceptable use Personnel Physical and Environmental Monitoring Testing Backup & Restoration Controls Management Controls Certified Operations Incident Response Monitoring Disaster Recovery Planning Information Asset Classification Information Awareness Technical Controls Web Application Firewall & Load Balancing Unified Threat Management Protection from DDoS Attacks Web Application Scanning Identity Management & Trust Authentication Storage Encryption Vulnerability Management Policy Compliance Next Generation Firewall Endpoint Event Monitoring Information Governance Physical Controls

Governance, risk and compliance Centralized SCP risk dashboard Continuous risk assessment and mitigation program 26

Advanced cyber security monitoring for smart city Use case scenario Monitoring and Management - The cornerstone of the security monitoring of the SC²P is the security incident and event management (SIEM) 27

Next steps Smart city platforms are nations critical infrastructure, its country s pride, it need to be protected The impact of cyber attack cripple the nations ability to provide public services, it threatens citizens safety and security. Sheer number of IoT devices and volume of data exploded, security implications are multitude, we got to evolve If you embark on digital and IoT journey, understand your cyber threat exposure and build security by design. Establish security governance framework and continuous monitoring capabilities. Prepare for nation wide cyber attack and build your response capabilities 28

Thank you