WIBU-SYSTEMS

Perfection in Protection, Licensing, and Security

Protecting Industrial Internet of Things Endpoints

MarketingWIBU-SYSTEMS AG el 22 de diciembre de 2016 11:26 horas

An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints. In many cases, an attacker will try to access the execution code and attack the weakest point in the devices’ security implementation, then modify or replace the execution code with malicious intent.

To better understand the method of attacks, and develop security mechanisms to protect against them, it is important to understand the nature of the endpoint itself. In most simple terms defined by the Industrial Internet Consortium (IIC), an endpoint is a component that has an interface for network communication. Endpoints are everywhere in the IIoT landscape and not restricted to a single location. Endpoints are the only place in an IIoT system where execution code is stored, started and updated and data is stored, modified or applied. A single device can have several endpoints because it can have several communication points. A router, for example, typically has a LAN endpoint and WAN endpoint and code data is frequently shared between multiple endpoints.

There are many security threats and vulnerabilities that can be exploited in an IIoT endpoint and developers must be aware of the possibilities. In hardware components, the processor could be replaced with a fake, memory corrupted and peripheral devices falsified. The boot process is a critical vulnerability point since if tampered with, all processes executed after the boot are in jeopardy. The operating system itself can come under attack and programmed to run improperly. Applications and their APIs are vulnerable and can be programmed to accept illegal parameters. Even code from applications that run outside the OS, like a virus checker, can be tampered with and serve as the entry point for malicious code. Other vulnerabilities can be exploited in the runtime environment, hidden in code used from third parties, and exploited during configuration, deployment and management.

There are several important elements to consider in securing IIoT endpoints.

First, developers must start with a clear design of the security model and policies. They must define endpoint identity, authorization and authentication. A proper data protection model must address integrity and confidentiality for shared data-in-rest as well as data-in-use. Secure hardware, BIOS and roots of trust should include the consideration of the hardware lifecycle, BIOS updates and consistent root of trust. Select a secure OS, hypervisor and programming language and consider Isolation principles that are easy to implement and guarantee security in the most critical areas. Developers should also plan for secure remote code updates and ensure code integrity to prevent malicious remote code hijacking.

Beyond the basic security definitions and considerations, developers should build-in security configuration and management to ensure the appropriate replacement of updating of encryption keys and certificates and assignment of future access rights and authorizations.

Finally, it is imperative that the development team is experienced in security implementations and has the latest version of development tools, OS, Hypervisors, and libraries at their disposal.

The IIC has recently presented an endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document. The technical report is an in-depth cross-industry-focused security framework reflecting thousands of hours of knowledge and experiences from security experts, collected, researched and evaluated for the benefit of all IIoT system deployments. The key areas of focus include endpoint data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection. You can download the complete document for free.

Inicie sesión o regístrese ahora y disfrute de todas las ventajas de una comunidad.

Para obtener toda la funcionalidad del Foro de IndustryArena es necesario iniciar sesión o registrarse. Este proceso es absolutamente gratuito.

Password forgotten?
Solicitud de contacto
Guest Photo
Your message
The controller within the meaning of Art. 4(7) GDPR is: IndustryArena GmbH, Schneiderstr. 6, 40764 Langenfeld, Germany.
You may reach our data protection officer under dataprotection@industryarena.com.

Purpose of processing
We process your personal data concerning the use of the contact form and the communication with the company of the newsroom as well as the transmission of your data to this company in accordance to Art. 6 (1a) GDPR. This constitutes a legitimate interest for us in accordance to Art. 6 (1f) GDPR.

Recipient of the data
Within our organization, those units gain access to your data, which are necessary to fulfil the above purposes.
Personal data will only be transmitted to third parties if this is necessary for the aforementioned purposes or if another legal basis exists. If necessary, we conclude the corresponding data protection agreements with third parties, in particular pursuant to Art. 28 GDPR.

Data storing
Your data will be transmitted to the company of the newsroom for further processing. The period of storing is the duration of the processing of your request by the respective company.

Seleccionar persona de contacto

Newsroom Logo

Opciones de diseño

  • Título Color de fuente:
  • Contenido Color de fondo:
  • Contenido Color de fuente:
  • Navegación Fondo:
  • Ficha Color de fuente:
  • Pestaña activa Color de fuente:
  • Enlace Color de fuente:
  • Enlace activo Color de fuente:
  • Imagen de fondo Color de fondo

    ¿Cómo quieres colocar la imagen de fondo?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Establecer el enlace para la imagen de fondo

  • Gráfico de cabecera

    ¿Cómo desea alinear el banner?

    Tenga en cuenta: Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.

    Introduzca el destino del enlace para el banner

  • Skyscraper

    Introduzca el destino del enlace para el Skyscraper

Tenga en cuenta:

Los banners y los rascacielos sólo se guardan para el idioma actual. Para otros idiomas, cambia el idioma con el botón de la parte superior derecha.