http://hpe-enterpriseforward.com/eiu-securing-iot/ |
Each one of these devices is a potential
Security or Privacy liability.
- only 33% of organizations believe their IoT products are “highly resilient” against any future cyber security threats,
- 48% of companies focus on securing their IoT products from the beginning of the product development phase.
http://hpe-enterpriseforward.com/eiu-securing-iot/ |
In the past year, we have seen:
- Baby Monitors that share their video publicly over the Internet
- Police Body Cameras that come preinstalled with Conficker malware
- Interactive Barbie Dolls that can be used to spy on children
- Smart Thermostat that can be hacked for surveillance in just 15 seconds
- IoT doorbell can reveal your Wi-Fi key
Cisco: IoT Security Timeline |
Who are these "Malicious People" and why do they want to wreak havoc with our Inventions?
IoT devices and systems are typically remote sensors or controls involved in managing a process of some sort. Whether it be collecting weather information for crop management, to sensor data for proper maintenance of an automobile, temperature and humidity information for building climate control, or bio sensors for monitoring a patients health, IoT devices manage a large amount of critical information. Critical information that could potentially be considered Private and/or Confidential in nature.
IoT PenguinBot |
By the remote nature of these devices, they are also typically designed to be "low cost" and "low energy" battery operated systems. Function and performance are the critical design success factors, while Security has not played a significant development role to date. MOST current IoT devices are readily exploitable through several means.
Oh, and did I mention that most IoT devices are connected (and trusted) in some way to logging, monitoring, and analysis tools deep within the corporate infrastructure? Find a kink in this light armour, and you can sail right past the corporate security systems in place.
What type of attacker is interested in exploiting IoT devices? We are finding that the IoT Threat Landscape is quite varied. Everyone from cybercriminals to government entities, hacktivists, and even insiders have shown up to the game. It's apparently hard to resist the low hanging fruit of an easily exploitable system, that could lead directly into the corporate infrastructure.
From stealing sensitive data by hacking IoT devices, to facilitating denial of service against a third-party entity, there are plenty of reasons and opportunities to exploit a connected Internet of Things device.
What type of attacker is interested in exploiting IoT devices? We are finding that the IoT Threat Landscape is quite varied. Everyone from cybercriminals to government entities, hacktivists, and even insiders have shown up to the game. It's apparently hard to resist the low hanging fruit of an easily exploitable system, that could lead directly into the corporate infrastructure.
From stealing sensitive data by hacking IoT devices, to facilitating denial of service against a third-party entity, there are plenty of reasons and opportunities to exploit a connected Internet of Things device.
So, as developers, what are we to do?
How can we ensure that our products are secure from the beginning? What aids do we have to guide us in creating a more secure, more private consumer product?
First, from Cyber Security company I am the Cavalry, here is a snippet of sage advice:
Security:
As well, I am the Cavalry has published the Five Star Automotive Cyber Safety Program, with the purpose of bringing the industry together to standardize on a security framework for connected devices.Security:
- Secure by Default
- No default passwords shared between devices, or weak out of the box passwords.
- All passwords should be randomly created using a high quality random password generator.
- Advanced features used by small percentage of users should be turned off by default(VPN,Remote Administration, etc...)
- Secure by Design
- Firmware should be locked down so serial access is not available.
- Secure Ethernet (SE) or Trusted Protection Modules (TPM) devices should be used to protect access to the firmware and hardware.
- All GPIO, UART, and JTAG interfaces on the hardware should be disabled for production versions.
- NAND or other memory/storage mediums should be protected with epoxy, ball sockets (so the memory cannot be removedand dumped), or other methods to prevent physical attack.
- Self Contained Security
- The devices should not rely on the network to provide security. Rather, the device's security model should assume the network is compromised, and still maintain protection methods. This can be done with prompts to the user to accept handshakes between devices trying to access other devices on their networks.
- Communication between devices should be encrypted to prevent MiTM attacks and sniffing/snooping.
Privacy:
- Consumer PII not shared with manufacturers or partners.
- Usage data on individual consumer is never shared with partners or advertisers.
- Anonymous data for buckets of users on usage patterns is acceptable as long as it's proven to no be traceable back to an individual consumer.
- Data collection policy, type of data collected and usage of data is clearly documented on site.
At the same time, an organization called OWASP, or The Open Web Application Security Project, has created a project specifically around Security for the Internet of Things.
According to their website:
The OWASP Internet of Things Project provides information on:
- IoT Attack Surface Areas
- IoT Vulnerabilities
- Firmware Analysis
- ICS/SCADA Software Weaknesses
- Community Information
- IoT Testing Guides
- IoT Security Guidance
- Principles of IoT Security
- IoT Framework Assessment
- Developer, Consumer and Manufacturer Guidance
- Design Principles
Of interest in this discussion is the topic of "IoT Attack Surface Areas". Each one of these boxes identifies specific threat vectors to IoT product development, as well as guidance and recommendations on remediating these concerns early in the development cycle.
Ecosystem Access Control | Device Memory |
Device Physical Interfaces |
Device Web Interface |
Device Firmware |
Device Network Services |
Administrative Interface |
Local Data Store |
Cloud
Web Interface |
Ecosystem Communications |
Vendor Backend APIs |
Third Party Backend API's |
Update Mechanism |
Mobile Application |
Network Traffic |
IoT Security != Device Security
Attack Surface | Vulnerability |
---|---|
Ecosystem Access Control |
|
Device Memory |
|
Device Physical Interfaces |
|
Device Web Interface |
|
Device Firmware |
|
Device Network Services |
|
Administrative Interface |
|
Local Data Storage |
|
Cloud Web Interface |
|
Third-party Backend APIs |
|
Update Mechanism |
|
Mobile Application |
|
Vendor Backend APIs |
|
Ecosystem Communication |
|
Network Traffic |
|
As stated earlier, this is starting guidance on what to look for when building out your Internet of Things Security Framework. For further ideas and guidance, please read the references below.
Good luck, and happy coding.
Resources:
OWASP: Top 10 IoT Security IssuesOWASP Top Ten IoT Security - Infographic
OWASP: IoT Security Guidance
RSA Conf: Mapping the IoT Attach Surface Areas
ARSTechnica: “Internet of Things” security is hilariously broken and getting worse
ARSTechnica: Police body cams found pre-installed with notorious Conficker worm
ARM.COM: From Sensor to Server, ARM drives the Internet of Things
Texas Instruments: Internet of Things - Opportunities and Challenges
DEFCON 23: IoT Attack Surface Mapping
HPE: Securing the IoT
Capgemini: Securing the Internet of Things
Globe and Mail: Internet of Things a playground for hackers
Globe and Mail: The Future is Smart - Why privacy must be baked into the Internet of Things
https://www.iamthecavalry.org/
IamtheCavalry: Five Star Automotive Cyber Safety Program
https://www.theguardian.com/technology/2015/nov/26/hackers-can-hijack-wi-fi-hello-barbie-to-spy-on-your-children
http://www.computerworld.com/article/2476599/cybercrime-hacking/black-hat-nest-thermostat-turned-into-a-smart-spy-in-15-seconds.html
https://www.exploitee.rs/index.php/Exploiting_Nest_Thermostats
http://www.theregister.co.uk/2016/01/12/ring_doorbell_reveals_wifi_credentials/
Embedded: Security framework for IoT devices
NIST Releases Draft Framework on the Internet of Things
Online Trust Alliance: IoT Trust Framework
WolfSSL: Embedded SSL Library for Applications, Devices, IoT, and the Cloud
http://www.bankingexchange.com/news-feed/item/5770-5-hacks-into-your-internet-of-things-devices
https://www.helpnetsecurity.com/2016/05/09/internet-of-fail/
Cisco: IoT Threat Environment
https://blog.knowbe4.com/worlds-most-famous-hacker-kevin-mitnick-iot-is-exploitable
http://krebsonsecurity.com/2016/02/this-is-why-people-fear-the-internet-of-things/
No comments:
Post a Comment