Defending the Internet of Things Identity at the Core of Security +1-888-690-2424 entrust.com Table 1 of contents 2 3 4 5 6 7 Introduction Page 3 Challenge: protecting & managing identity Page 4 Founders of identity security Page 5 Standardizing PKI Page 6 Secure mobile, leverage mobile Page 6 Identity management Page 7 Trusted advisor for critical architectures Page 7 Introduction “More system complexity means that there is more threat surface that needs to be defended. It also means that there is more potential to make mistakes and introduce vulnerabilities.” Attacks on traditional IT systems have resulted in massive loss of money, privacy and intellectual property. Even worse, attacks on the Internet of Things (IoT) potentially threaten our safety. This threat landscape exists alongside the ever-increasing demand for more technology to be embedded into coordinated devices used in healthcare, automobiles, aviation, critical infrastructure and smart city initiatives. More system complexity means that there is more threat surface that needs to be defended. It also means that there is more potential to make mistakes and introduce vulnerabilities. The opportunity to create a safe and secure system occurs when we realize that perimeter defenses are insufficient and that we must engineer comprehensive security throughout system processes. In highly automated systems, connected devices must assure trust by assuring authenticity. Too often, devices in automated and coordinated systems do not challenge the authenticity of the source of the commands that they act upon. In an ideal world, the identity of each system component would be authenticated, but system constraints demand that we optimize an architecture that achieves security and assures performance. 3 Challenge: protecting & managing identity What’s at Risk? || Critical infrastructure programmable logic units || Automobile electronic control units || Medical devices || Smart city, including intelligent transportation || Utilities and industrial control || Building automation Securing identity is a central concept in reducing attack surfaces. Every attack we have studied requires an attack against identity in order to accomplish its malicious goals. The chain of trust shows us how system parts sitting directly in the sequence of a process must question each other’s identity. Wherever an identity can be compromised, an attacker will find it and use it against the system. Authenticity of Parts This approach is suitable for parts that include firmware components. It also has the potential to allow secure in‑service upgrades because of the code-signing confirmation that authenticate the identity of the firmware source. Receiving Commands – Identity of Source All networks should be considered unsafe. Any device that receives a valid command on a network should not blindly trust the source’s identity. The authenticity of command is not enough, but the identity’s authenticity of the command source is the key to reducing threat surface. These concepts are at the heart of what public key infrastructure (PKI) can accomplish. Sending Commands – Identity of Destination Vulnerabilities and failures occur. Therefore, not all devices on a network should be trusted to hear commands sent on the network. An attacker who can read legitimate commands moving across a network can learn which commands to replay at a later time for malicious intent. The need for encrypted communications within an enclosed network of embedded devices is important to reduce attack surface. Authentication IoT is synonymous with remote connectivity, which is a fast-growing technology area. Without authentication, critical devices are at risk of attack. Too often, critical IoT devices and their networks are considered to be secure because of the perceived lack of physical access or the complexity of the communication protocol. Attacks have shown us that security by obscurity is insufficient. Secure elements and higher processing power in IoT devices have created opportunities to embed cryptographic capabilities enabling strong authentication. Security Culture As traditional vendors transition to solve IoT challenges, there will be struggles to manage, secure and authenticate devices. Security that stands the test of implementation requires expertise that is forged through experience. 4 Founders of identity security “Entrust has a long history of protecting identities and architecting systems that assure chains of trust.” Entrust’s core competencies — such as PKI — are highly applicable to security for the Internet of Things. This security expertise specifically protects identities. Entrust is a founder and editor of the underlying standards community, as well as the one of the primary architects for identity security within complex projects. Today, this leadership is further augmented by the strategic integration between Entrust and Datacard Group. As a single company, this partnership provides identity-based technologies that enable highly secure anywhere-anytime access for workforces of all sizes. Our solutions help consolidate identity information that is typically scattered through numerous databases. We create unified and trusted identities that provide enterprises with a single point of control and much greater security. Whether people are entering secure facilities, logging onto desktop computers or accessing networks remotely with mobile devices, Datacard Group and Entrust provide security and convenience for authorized users — and strong lines of defense against unauthorized access. These high-assurance credential solutions, strong authentication platforms, encryption technologies, mobile security, managed PKI services and SSL certificates meet the needs of organizations with advanced requirements and complex ecosystems, including IoT. Our wide range of credential issuance solutions also meets the needs of enterprises looking to protect smaller populations and control access to a limited number of facilities. 5 Standardizing PKI From its early days (as a division of Northern Telecom) to the present, Entrust has played a strong leadership role in the standardization, implementation and deployment of PKI. In 1992, Entrust supplied one of the world’s first PKI implementations to the Canadian Department of National Defence. The system, Packet Data Security Overlay (PDSO), provided end-to-end security for X.25 data communication systems. Development of the base PKI standard, commonly referred to as X.509 began in 1985 and was completed in 1988. Entrust was one of the primary technical contributors to that first edition and also played a leadership role as ITU-T and ISO/ IEC editor for the project. Since that first edition, Entrust has continued participation in the development of new architectures and features to the present time and have, at various times, chaired the X.509 committee and provided project editorship. In addition to these primary PKI standards activities, Entrust has also participated — and in some cases played leadership roles — in numerous industry forums, regional standards initiatives and application-specific initiatives. Some of these include the CA/Browser Forum, Electronic Messaging Association, ICAO, ETSI, American Bar Association and others. Secure mobile, leverage mobile Entrust both secures and leverages mobile devices. Device certificates ensure that authorized devices securely connect to a network. Entrust Mobile Smart Credentials enable strong authentication and transaction-signing. The isolation of mobile operating system applications provides greater security than desktop environments. Future devices will even enable credentials to be stored in secure elements. Entrust’s mobile SDK provides authentication/ credential functionality that can work within a custom mobile application. Many of the advances in mobile security technologies such as Trusted Execution Environments and secure elements are models that should be leveraged by IoT technologies. Easy-to-use mobile user interfaces, along with the high levels of security functionality, are a combination in security rarely seen. If security requires the input and/or decision-making of a human, security is likely to fail. Mobile is an opportunity for success. 6 Identity management Entrust’s flagship authentication solution, Entrust IdentityGuard is one of the most robust authentication and identity-assurance platforms in the market. It delivers an unmatched breadth of capabilities and flexibility to meet the most demanding security environments. Identity management is a challenge for most organizations. Authentication vendors often do not have an identity management platform to match customer needs. Existing point authentication solutions are no longer up to the task of thwarting advances that exploit vulnerabilities in a variety of channels or mediums. Whether the root threats originate from internal or external sources, critical information, data and identities are at constant risk. Mobile Soft Token SOFTWARE AUTHENTICATION PLATFORM Transaction Verification Mobile Device Certificates Mobile Smart Credential SMS Device Authentication Digital Certificates IP-Geolocation Password Mutual Authentication Trusted advisor for critical architectures Grid / eGrid Smartcards and USB OTP Tokens Knowledge Based Transaction Signing Biometrics As a trusted PKI advisor, Entrust has served a key role assisting with the design of PKI architectures for specific projects. One of these, the U.S. Federal PKI (FPKI) working group, included design, development and deployment of the first “bridge CA.” This concept enabled different agencies to operate their own PKI infrastructures in a relatively autonomous environment, supporting common policies and enabling secure communications among a variety of agencies. Another example, the design of Extended Access Control (EAC) for the European Union ePassport application. This included the design of a Single Point of Contact (SPOC) supporting certificate management between EU member states and delegation of authorization and access control permissions from a passport issuer to foreign border control. EAC, and its associated PKI architecture, are becoming more widely adopted for other applications as well, including ISO/IEC standards for driver’s licenses and national ID cards (e.g., Germany). 7 Entrust and you “More than ever, Entrust understands your organization’s security pain points.” Twitter Facebook Youtube Entrust offers software authentication platforms that strengthen security in a wide range of identity and transaction ecosystems. Government agencies, financial institutions and other enterprises rely on Entrust solutions to strengthen trust and reduce complexity for consumers, citizens and employees. Now, as part of Datacard Group, Entrust offers an expanded portfolio of solutions across more than 150 countries. Together, Datacard Group and Entrust issue more than 10 million secure identities every day, manage billions of secure transactions annually and issue a majority of the world’s financial cards. For more information about Entrust solutions, call +1 888-690-2424, email [email protected] or visit www.entrust.com. Company Facts Website: entrust.com Employees: 359 Customers: 5,000 Offices: 10 globally LinkedIn Headquarters Three Lincoln Centre 5430 LBJ Freeway, Suite 1250 Dallas, TX 75240 USA Google+ Sales North America: +1-888-690-2424 EMEA: +44 (0) 118 953 3000 Email: [email protected] RSS Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. Entrust is a registered trademark of Entrust Limited in Canada. All other company and product names are trademarks or registered trademarks of their respective owners. The material provided in this document is for information purposes only. It is not intended to be advice. You should not act or abstain from acting based upon such information without first consulting a professional. ENTRUST DOES NOT WARRANT THE QUALITY, ACCURACY OR COMPLETENESS OF THE INFORMATION CONTAINED IN THIS ARTICLE. SUCH INFORMATION IS PROVIDED “AS IS” WITHOUT ANY REPRESENTATIONS AND/OR WARRANTIES OF ANY KIND, WHETHER EXPRESS, IMPLIED, STATUTORY, BY USAGE OF TRADE, OR OTHERWISE, AND ENTRUST SPECIFICALLY DISCLAIMS ANY AND ALL REPRESENTATIONS, AND/OR WARRANTIES OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, OR FITNESS FOR A SPECIFIC PURPOSE. 30091-1-0914
© Copyright 2025 Paperzz