IoT IT Security and Secure Development Life Cycle



Similar documents
Cloud Security Fails & How the SDLC could (not?) have prevented them

Secure Code Development

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Security Issues with Integrated Smart Buildings

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Virtualization System Security

Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study

Juniper Networks Secure

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Mobile Application Threat Analysis

Threat Modeling. Categorizing the nature and severity of system vulnerabilities. John B. Dickson, CISSP

Web Application Security

David Rook. The Principles of Secure Development. OWASP Ireland Conference, Dublin

External Supplier Control Requirements

Reducing Application Vulnerabilities by Security Engineering

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Introduction to Penetration Testing Graham Weston

Hong Kong Information Security Outlook 2015 香 港 資 訊 保 安 展 望

Application Security Testing

Essential IT Security Testing

Hacking Medical Devices

Penetration Testing Service. By Comsec Information Security Consulting

Cloud and Security (Cloud hacked via Cloud) Lukas Grunwald

The Top Web Application Attacks: Are you vulnerable?

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Passing PCI Compliance How to Address the Application Security Mandates

What someone said about junk hacking

Research Report: Addressing Security Concerns for Connected Devices in the Internet of Things Era

Board Portal Security: How to keep one step ahead in an ever-evolving game

CMPT 471 Networking II

SiteLock. Internet Security: Big Threats for Small Business. Presented by: Neill Feather, President

Web application testing

National Endowment for the Arts Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement Exit Conference...

How to start a software security initiative within your organization: a maturity based and metrics driven approach OWASP

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

APIs The Next Hacker Target Or a Business and Security Opportunity?

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Web Application Report

WHITE PAPER Security in M2M Communication What is secure enough?

12 Security Camera System Best Practices - Cyber Safe

Understanding Security Testing

Enterprise Computing Solutions

Auditing the Security of an SAP HANA Implementation

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Securing ios Applications. Dr. Bruce Sams, OPTIMAbit GmbH

Oracle Security Auditing

Oracle Security Auditing

PCI Compliance Updates

New IBM Security Scanning Software Protects Businesses From Hackers

How users bypass your security!

Strategic Information Security. Attacking and Defending Web Services

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

WEB APPLICATION SECURITY

SECURITY B-SIDES: ATLANTA STRATEGIC PENETRATION TESTING. Presented by: Dave Kennedy Eric Smith

Jort Kollerie SonicWALL

Network Security: Introduction

White Paper. Guide to PCI Application Security Compliance for Merchants and Service Providers

Evolution of Penetration Testing

G- Cloud Specialist Cloud Services. Security and Penetration Testing. Overview

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

FORBIDDEN - Ethical Hacking Workshop Duration

ensuring security the way how we do it

Hands on, field experiences with BYOD. BYOD Seminar

WISE-4000 Series. WISE IoT Wireless I/O Modules

What is Really Needed to Secure the Internet of Things?

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Web App Security Audit Services

Chapter 4 Application, Data and Host Security

Security Goals Services

What is Web Security? Motivation

ADC Survey GLOBAL FINDINGS

Entire contents 2011 Praetorian. All rights reserved. Information Security Provider and Research Center

Ethical Hacking Penetrating Web 2.0 Security

Hack Proof Your Webapps

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Table of Contents. Application Vulnerability Trends Report Introduction. 99% of Tested Applications Have Vulnerabilities

Protecting Your Organisation from Targeted Cyber Intrusion

Application Security Best Practices. Wally LEE Principal Consultant

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

ISSECO Syllabus Public Version v1.0

CARRIOTS TECHNICAL PRESENTATION

Transcription:

IoT IT Security and Secure Development Life Cycle Security BSides Ljubljana, 2015 By Christopher Scheuring, ERNW Germany

#2 /whoami Christopher Scheuring Security Analyst @ ERNW Since 2010 IT Security Architect and Analyst Before: 8 years software development Email: cscheuring@ernw.de

#3 ERNW GmbH ERNW provides vendor independent security services to support our customers business. Established 2001 35 employees Vendor Independent We understand corporate Deep technical knowledge Structured (assessment) approach Business reasonable recommendations Customers predominantly large/very large enterprises

#4 Agenda The Big Question: IoT how secure we are? IT-Security in IoT we need it! The SDLC and IoT - and why it becomes difficult. The challenges and problems with IoT.

#5 What IoT means what do we talk about?

#6 IoT Internet of Things Sounds cool ;-) Other Buzz Words Industry 4.0 Connected Cars Smart Home Cloud Apps Yadda-yadda-yadda

#7 IoT The Idea Everything becomes accessible from every where. Your fridge generates the shopping list. Systems detect wear and tear to order new parts. Robots order 3 rd party parts for the next product they will build. Your smartphone switch of the lights or open your home door. Cars tell other cars the current traffic situation and control the traffic flow.

#8 IoT The Problems Everything becomes accessible from everywhere which means: Everything needs to be connected to the Internet at any time: Your smart TV (with smart cam) Your home automation with door-openingcapability Your car with GPS so you could find it easier or open doors remote The industrial system to interact with 3 rd party partners perhaps in booth direction -Yadda-yadda-yadda ;-)

#9 IoT The Real Live Did you ever pentest or perform a security analysis for IoT devices? Smart home components Industrial components (robots, switches, welding machines, sensors and actors ) Cars (inside buses or the GSM connectivity think about WiFi) The network infrastructure Your smartphone If yes you know how secure they are!

#10 IoT What we re Talking We are talking about systems designed to work in an autonomous and secure environment. The communication infrastructure origin was designed for safety and availability (like RS486, Fieldbus, CAN ) No needs to secure theme in an IT- Security point of view. They are secure by dedicated connection matrixes.

#11 IoT Becomes Real Live Those systems now are connected to the Internet or company WANs. By just applying TCP/IP interfaces. Following the rapid development needed for IoT. And forgot the IT Security needs Systems designed for an autonomous and secure environment become reachable all over the world.

#12 Why SDLC becomes important for IoT

#13 SDLC Secure Development Life Cycle Is the inclusion of IT security belongings into the (software) Development Live Cycle. Focus is checking: Company policies Legal requirements Technical IT-Security requirements Efficacy of security measures

#14 IoT and SDLC Let s talk about IoT and SDLC. E.g. a small and cute home automation system. Something really everyone needs because we can do it: Check our temperature and window stats by our smart phone.

#15 Our Design Cool and smart mobile app very important! Using whatever cloud service for data exchange because it s easy to develop. Cheap and easy programmable hardware (like an Arduino its cool for developing smart projects).

#16 Our Infrastructure Seems to be isolated everything is inside our home. The only connection to the world is by a dedicated one way communication to the cloud service. Our smart phone only talks to the cloud service end displays the temperature and state of the windows. Everything is fine implement it :-)

#17 Our Project Goes Live Cool Arduino with a real cheap WiFi module, temperature and window sensors (costs some less EURs). Easy software development because there are a lot of cool stuff available from the internet (GPL or free). Finding a usable cloud service is also an easy step. Rapid development in real live: Everything works after 1,2-3 days.

#18 Our Project Grows We feel like the king of the hill. Eyes glow and new ideas are sparkling: Open the front door. Change the temperature. Switch the lights. Yadda-yadda-yadda And control all cool features by smartphone. OK you turn back to a child ;-)

#19 Small IoT RL Excursion The guys selling the IoT / smart home application feel like king of the hill. Eyes glow and new ideas are sparkling: Open the front door. Change the temperature. Switch the lights. Yadda-yadda-yadda And control all cool features by smartphone. OK they got Dollar signs in the eyes ;-)

#20 Keep in mind the real live of software development ;-)

#21 What Now Happens Your isolated environment gets connected to the world in both ways! The origin design was only specified for a one-way connection initiated from inside your isolated environment into the Internet. Your concept becomes broken in a view of security point Your now need a back connection

Unfortunately Point of view sales man: What s the problem? You could open your front door even if you forgot your key at home! You remember the BMW hack? Maybe some one could get access to your home unauthorized caused by a bug? 03/12/2015 #22

#23 Here we go and deal with the new challenge.

#24 IoT & The Challenge Changing our way of life using IoT also means knowing the threats. And (possible) vulnerabilities caused by new connectivity and being connected every time. And therefore it s very important using SDLC measures in the early project phase. Think about what would be the unbelievable feature and include it into your SDLC process :-)

#25 The Threats Surprise the already known ;-) E.g. STRIDE Spoofing user identity Tampering Data Repudiation Information disclosure (privacy breach or data leak) Denial of service (DoS) Elevation of privilege

#26 Our IoT Project It was designed to use in ideal world. After enhancing we need to check for possible/new threats. And if there are any vulnerabilities concerning to the threats. This will be a security analysis process inside the DLC => Secure DLC.

Attacks 03/12/2015 #27 Big Picture Smart Home System Temp Sensor Window Sens. Door Opening Change Temp WiFi Home Router IoT/Smart Cloud Service User credential Mobile Device Exploits against the system Local attacks Attacks against WiFi Default credentials Exploits against the router Web- App Hacking Brutforcing Malware MitM Eavesdropping Theft Unkown access

#28 Are you vulnerable? Yes, You Are Vulnerable!

#29 Our Smart IoT App Vulns Weak encryption for storage of the user credentials inside the smartphone app. Easy to brutforce user credentials of the used cloud server because of missing measures. Hard coded cloud credentials inside the Arduino app code. Becomes a serious problem we want to open the front door... Hard coded encryption key for WiFi Could leak your WiFi key by the source-code and you need a way to handle changing the key

#30 Like The Reality? Are their any existing vulnerabilities? Yes of course :-) It s like at any known application. Plus extra spread over different communication partners and systems.

#31 Some known Vulns (2) CVE-2014-3344: Cisco Transport Gateway for Smart Call Home framework multiple cross-site scripting (XSS) vulnerabilities. Allows remote attackers inject arbitrary web script or HTML. CVE-2014-9557: Smartwebsites SmartCMS Multiple XSS (Cross-Site Scripting) Security Vulnerabilities.

#32 Some known Vulns (1) CVE-2014-4892: ucontrol Mobile App no X.509 SSL certificate verification. Allows Man-in-the-Middle attacks like accessing sensible data or trigger action. CVE-2014-3346: Cisco Transport Gateway for Smart Call Home DOS vulnerability in framework. Allows breaking the availability.

Some known Vulns (3) Loxone Smart Home 2015.02.28: Multiple vulnerabilities found by SEC Consult Vulnerability Lab like: Cross-site request-forgery (XSRF) Multiple reflected cross-site scripting (XSS) vulnerabilities plus stored. Denial of service (DoS) by simple synflood. Credential Leakage because of storing in cleartext. 03/12/2015 #33

#34 Automation could harder Want to have more fun? Go performing penetration tests on automation components. Yes for sure only in a test lab environment ;-) And you will get ICSA-Numbers from the ICS-Cert

#35 War Story Scalance Switch ICSA-12-102-04: Siemens Scalance X Buffer Overflow Vulnerability Found by performing a brutforce stability test. Missing password length check in web GUI causes a reboot of the switch. What leads to a safety stop!

#36 War Story Siemens CP 1604/1616 ICSA-13-084-01: Siemens CP 1604/1616 Improper Access Control Found by performing a security test of a robot. Accessible remote debugging port. While playing with the debugging port the card crashes What leads to not any more controllable robot (needed to restart)!

#37 War Story BTW Robots Sorry not public So only in the talk ;-)

#38 SDLC for IoT is necessary!

#39 IoT & Threats & SDLC (1) Start thinking like a hacker to understand threats and why possible vulnerabilities could become a serious problem. Understand possible IT security problems at the IoT environment and all involved 3 rd party systems. Identify weakness inside your concept in every phase of you development live cycle. React as soon as possible this makes live a lot easier and more secure :-)

#40 IoT & Threats & SDLC (2) And the biggest challenge: The Life Time! IoT, Automation Components, Smart Home Device etc. will run longer than your smartphone. Where talking about 10 up to 30 years! Remind it for your IoT SDLC.

#41 SDLC & IoT (1) A complete/holistic SDLC for IoT is necessary. Security should be taken into consideration in each phase of application/system development. Existing SSDLC methodologies focus on Governance, Construction, Verification and Deployment business functions and their relevant security activities. And for Operation!

#42 SDLC & IoT (2) Use Software Assurance Maturity Models e.g. OpenSAMM [http://www.opensamm.org] BSIMM (Building Security In Maturity Model) [www.bsimm.com] These methodologies can help to improve security of IoT systems and applications. Don t forgot to include all involved partners and used communication links into your analysis.

#43 Conclusion Smart and IoT systems will be widely spread in the future. They will cover a lot of our daily work and live. So they need to be designed to protect our privacy and our safety. And they will run longer as expected. Smart and IoT should not become an acronym for unsecure

#44 Thanks a lot for you attention :-)

#45 Questions

#46 www.troopers.de