Industrie 4.0; Sicherheitsmechanismen für die Produktion. 14. Deutscher IT-Sicherheitskongress; Andreas Philipp



Similar documents
Embedded Java & Secure Element for high security in IoT systems

Integration Guide. Zen Load Balancer Ubuntu/Microsoft Windows

What is Really Needed to Secure the Internet of Things?

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Smart Cloud Solutions

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Applying Common Criteria to a cloud type payment service

Smart Grid Security: Ground Zero for Cyber Security. June 2, 2010 at 12:51 PM by Larry Karisny

SECURITY IN THE INTERNET OF THINGS

Integration Guide. CyberArk Microsoft Windows

PrivateServer HSM Integration with Microsoft IIS

Industry 4.0: Cyber-Security Challenges on the Horizon

Innovation in Security. Secure Enterprise U n i f i e d C o m m u n i c a t i o n to protect business assets in the 21st Century

IDENTITY & ACCESS. BYOD and Mobile Security Seizing Opportunities, Eliminating Risks in a Dynamic Landscape

Defending the Internet of Things

WIND RIVER SECURE ANDROID CAPABILITY

Symantec Mobile Management 7.2

The Convergence of IT Security and Physical Access Control

Executive Summary P 1. ActivIdentity

The Challenges of Securing the Internet of Things (IoT) at Scale

Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing

TrustKey Tool User Manual

Brainloop Cloud Security

Symantec Mobile Management for Configuration Manager 7.2

Right-Sizing M2M Security: The Best Security is Security Tailored to Your Application

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

Symantec Mobile Management 7.2

future data and infrastructure

M2M & Internet of Things Opportunities

Trust. Every day. Anna Rewers, Regional Channel Sales Manager, Identity & Data Protection April 2015

We provide complete data protection

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

Windows Phone 8 Security Overview

Floodgate Security Framework

Applying Cryptography as a Service to Mobile Applications

IoT in Production. Dr. Verena Majuntke, Bosch Software Innovations. Bosch Software Innovations

Hardware Security Modules for Protecting Embedded Systems

Embedded Eletronics. Results of the study for the inclusion of electronics in existing industrial products

Enterprise Application Enablement for the Internet of Things

MOBILE SMARTPHONES AS SECURE SIGNATURE-CREATION DEVICES

Improving Quality and Yield Through Optimal+ Big Data Analytics

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

McAfee Enterprise Mobility Management Versus Microsoft Exchange ActiveSync

Flash Memory. For Automotive Applications. White Paper F-WP001

Confidentio. Integrated security processing unit. Including key management module, encryption engine and random number generator

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

The Dangers of Consumer Grade File Sharing in a Compliance Driven World

Smart Meter PKI - Make or Buy?

WHITEPAPER. Fraud Protection for Native Mobile Applications Benefits for Business Owners and End Users

EndPoint Device Secures Cloud Storage

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

BBM Protected Secure mobile

ARTIK TM. MyungKoo Kang (VP) The Ultimate Platform Solution for IoT. Samsung Electronics

Issue 09/2012. Big-LinX The Remote Service Cloud Remote maintenance and remote diagnostics for machines and plants

How to Drop your Anchor

Wie finde ich die beste The State of VPN-Lösung für mein Unternehmen? Remote Access Security in the U.S. Remote Access

Easily Connect, Control, Manage, and Monitor All of Your Devices with Nivis Cloud NOC

Interagency Advisory Board Meeting Agenda, Wednesday, February 22, 2012

Protect Identities for people, workstations, mobiles, networks

End-to-end Secure Cloud Services a Pertino whitepaper

How To Use Uniflow

Welcome to cryptovision. cv cryptovision GmbH T: +49 (0) F: +49 (0) info(at)cryptovision.com

Index. BIOS rootkit, 119 Broad network access, 107

BBM Protected: Secure enterprise- GrAde MoBIle MeSSAGING

Trusted Network Connect (TNC)

Running Head: AWARENESS OF BYOD SECURITY CONCERNS 1. Awareness of BYOD Security Concerns. Benjamin Tillett-Wakeley. East Carolina University

Application Mobility. Mweene Monze. Apollo Auditorium SITA Erasmuskloof 13 October IBM Corporation

Trust the Connectivity Experts

Using BitLocker As Part Of A Customer Data Protection Program: Part 1

QoS VPN Router.

Ensuring the Security of Your Company s Data & Identities. a best practices guide

PGP Desktop Version 10.2 for Windows Maintenance Pack Release Notes

Advantages of Intel SSDs for Data Centres

T-SYSTEMS Cloud STORY

QSC AG. Analyst Day. Hamburg, October 6, 2011

Cisco Smart Grid Powering End-to-End Communications. Rick Geiger Executive Director, Utilities & Smart Grid Business Transformation

Introduction to Dropbox. Jim Miller, LCITO Office Mobile

Bring Your Own Device (BYOD) and Mobile Device Management

ENCRYPTION KEY MANAGEMENT SIMPLIFIED A BEGINNER S GUIDE TO ENCRYPTION KEY MANAGEMENT

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

BRING YOUR OWN DEVICE (BYOD) AND MOBILE DEVICE MANAGEMENT

( Increased usage of IP addresses )

Embedding Trust into Cars Secure Software Delivery and Installation

Digitisation of Industry

Symantec Mobile Management 7.1

End-to-End Secure Cloud Services. Pertino Perspective

Strong data protection. Strategic business value.

Among the sponsors: Predictive Analytics in the Manufacturing Industry

Implementing Federal Personal Identity Verification for VMware View. By Bryan Salek, Federal Desktop Systems Engineer, VMware

Entrust Managed Services PKI. Getting an end-user Entrust certificate using Entrust Authority Administration Services. Document issue: 2.

Security in Vehicle Networks

Process Quality Manager Monitor and document process data. With ConnectedManufacturing Solutions by Bosch Software Innovations. Software Innovations

System Security Solutions for the connected world.

MOBILE MALWARE REPORT

Five Truths. About Enterprise Data Protection THE BEST WAY TO SECURE YOUR DATA AND YOUR BUSINESS DEFENDING THE DATA CMYK

Module 1: Facilitated e-learning

Directives and Instructions Regarding Wireless LAN in Department of Defense (DoD) and other Federal Facilities

Security and the Internet of Things (IoT)

SECURITY IN THE INTERNET OF THINGS

Transcription:

Industrie 4.0; Sicherheitsmechanismen für die Produktion 14. Deutscher IT-Sicherheitskongress; Andreas Philipp Utimaco HSM Aachen, Germany 2015 Page 1

At a glance 1... 2... 3... Headquarters in Aachen one of Germany s high-technology centers Employees: 110+ (70% in R&D, Support, Production and over 1000 combined man years of experience) more than 1.000 Installation in over 80 countries 4... 5... 6... In 2013 a management led buy out was backed by the investors Pinova and BIP Official Security clearance by the German government Revenue: (FY 12/13) 30.0 Million Utimaco HSM Aachen, Germany 2015 Page 2

The World is Changing.. 2005 Quelle: NBC News : Luca Bruno Aufbarung Paul II 2005 2013 Quelle: NBC News : Luca Bruno / AP and Michael Sohn / AP vatican election 2013 Utimaco HSM Aachen, Germany 2015 Page 3

Connected Devices 6.6 billion connected things in 2015 0.060 billion connected vehicles 0.019 billion connected telemedical devices 0.070 billions security system 0.120 billions meters 0.260 smart TV 0.625 tablets 3.000 smartphones 1.498 laptops 0.895 desktops 0.044 Servers Innovation Driver Proccing power Bandwith 1995 2005 2015 Source: Robert Bosch Engineering and Business Solutions Limited 2015 Utimaco HSM Aachen, Germany 2015 Page 4

Industrie 4.0 Smart Factory Secure Manufactoring M2M Source: Philips2015 Utimaco HSM Aachen, Germany 2015 Page 5

Transformation of industry Mechanization Electrifications Punch cards Energy: electrical Digitalization Field busses Flexible production Electronic data storage Connection/ Internet Usage of Internet standards IP connection Cyber physical systems Mobile operation Energy: Water/steam power Industrial (r)evolution Utimaco HSM Aachen, Germany 2015 Page 6

Next generation IT in Manufacturing refers to the technological evolution from embedded systems to cyber-physical systems. represents a paradigm shift from centralized to decentralized production - made possible by technological advances. connects embedded system production technologies and smart production processes. Utimaco HSM Aachen, Germany 2015 Page 7

Secure your Hardware! Utimaco HSM Aachen, Germany 2015 Page 8

Hardware security Risks: Rogue Firmware Invisible backdoor Malicious certificate Eavesdropping Mitigation Secure Storage Secure Boot Drawbacks: Vendor look Tivoization Utimaco HSM Aachen, Germany 2015 Page 9

You can t secure What you can t update Utimaco HSM Aachen, Germany 2015 Page 10

Upgrading is hard!! Must bee bulletproof NAND flash errors Unexpected power loss Network errors Unexpected incompatibilities Checksum, cryptographic signature failure (a 0,1% failure rate on 1 Mio. Device grid is 1000 broken device) Utimaco HSM Aachen, Germany 2015 Page 11

Solution A B C Utimaco HSM Aachen, Germany 2015 Page 12

Secure the supply chain Start at the SoC Secure the whole manufacturing chain Chip Manuf. Fab Device ODM Device Product distribution Device Store Application; Use case Chip Manuf. Fab OEM Service Provider Utimaco HSM Aachen, Germany 2015 Page 13

Key Distribution Utimaco HSM Aachen, Germany 2015 Page 14

Security Infrastructure Local Appliance Chip Manuf. Fab Local Appliance Device ODM Device Product distribution Centralize Service Device Store Application; Use case Local Appliance Chip Manuf. Fab OEM Service Provider Centralize Service Centralize Service Utimaco HSM Aachen, Germany 2015 Page 15

Solution feature Cluster support for high availability and scalability Meets manufacturing critical performance requirements Advanced key and data management Production service support (test/development, pre-production, and production) End-to-end encrypted communication channel Root Authority for system permissions and authorizations Advanced encrypted key and data storage Two-factor user authentication Compatible with FIPS-140-2 Level 3 Utimaco HSM Aachen, Germany 2015 Page 16

We deliver the root of trust No problem solver: Secure communication Utimaco HSM Aachen, Germany 2015 Page 17

Thanks for your attention! Andreas Philipp VP Business Development andreas.philipp@utimaco.com Utimaco IS GmbH Germanusstr. 4 52080 Aachen Germany Tel +49 241 1696 200 Fax +49 241 1696 199 Utimaco Inc. 475 Alberto Way, Suite 120 Los Gatos, CA, 95032 USA Tel.: +1 844 UTIMACO Utimaco HSM Aachen, Germany 2015 Page 18