Sensors Expo Workshop
Total Page:16
File Type:pdf, Size:1020Kb
Sensors Expo Workshop Securing the IoT and Embedded Systems with TCG and Embedded Computing Design ©2018 Trusted Computing Group Workshop Speakers • Brandon Lewis, Technology Editor, Embedded Computing Design, with a focus on IoT Design, Industrial AI & Machine Learning, and Automotive Embedded Systems and IoT Insider columnist • Josef Kohn, Regional Marketing Manager, Infineon • Dennis Mattoon, Principal Software Development Engineer, Microsoft • Lee Wilson, Product Development Engineer, Onboard Security ©2018 Trusted Computing Group Sensors Meeting Security How TCG and Trusted Computing Can Help Secure Sensor Innovations Josef Kohn, Infineon ©2018 Trusted Computing Group THE SENSOR WORLD IS PHENOMENALLY INNOVATIVE ..but: How do I secure my products? - How much security is needed? How to efficiently implement good security? - What to look out for? Security is complex, can be confusing and overwhelming; how to navigate and find guidance, best practices, proven solutions? The Trusted Computing Group is offering help to secure your innovations!! Let‘s learn more about it and have a closer look at - the core security elements of Trusted Computing: TPM, TSS, DICE - available resources and support for you ©2018 Trusted Computing Group 4 THE INTERSECTION OF SENSORS AND SECURITY • What are the most important security assets to be protected? • A quick look at the actual threatscape and how to prepare for the future • Properties of good product security design and how trusted computing can be designed into products ©2018 Trusted Computing Group The many daily news about IoT Hacks are a denial- of-service attack to our attention ©2018 Trusted Computing Group The Threatscape for Connected Devices A sobering reality: • Some spectres are no longer a ghost • Botnet infections of IoT devices: reality, too • Cryptomining on IoT devices: very lucrative • Poorly protected edge nodes are entry vectors to high- value targets and sophisticated attacks ©2018 Trusted Computing Group In Connected Systems, Each Layer is a Target for Attacks A Bad Server sending incorrect commands can be used to trigger unplanned events, to send some Bad Server physical resource (water, An Eavesdropper listening oil, electricity, etc.) to an in on data or commands unplanned destination, and can reveal confidential so forth. information about the operation of the A Bad Device injecting fake infrastructure. measurements can disrupt the control processes and cause them to react inappropriately or dangerously, or can be used Bad Device to mask physical attacks. ©2018 Trusted Computing Group Primary Classes of Security Assets Under Attack • Physical safety when connected to machines • Confidentiality and privacy of user data • Value of transactions • Trustworthiness and availability of services Risks, damages can be existential - directly and indirectly! ...not just to users and owners but also to the makers ©2018 Trusted Computing Group Trusted Computing: Important Properties of Good Product Security Design • Defense in Depth: Strong Isolation of Security Boundaries • Small Surface of Attack • HW-Based Root of Trust – Trusted Boot: Securely Measure, Store, Report Platform Integrity Metrics – Strong Attestation (local and remote) • Protected Capabilities: Secure KeyGen + Storage, Crypto-Primitives and –Services • Evaluated, Certified Security (CC, FIPS) • Secure Firmware Update Capability More: see Trusted Platform Module details ©2018 Trusted Computing Group For More Than 15 Years, the TCG Has Helped the Embedded World ecure Infrastructure, Platforms and Use Cases With global Standards and products for With Resources and Support for Trusted Computing: Developers • Trusted Platform Module (TPM2.0) • Developer Community ISO/IEC 11889-1:2015 • Guidances to secure different types of • TSS – Trusted Software Stack devices • DICE • Webcasts • Workshops • Publicly available specifications • Compliance Tests • Protection Profiles • Open Source Software • Tiered Memberships w. low entry fees ©2018 Trusted Computing Group In nearly 20 work groups, experts are developing standardized security solutions Cloud Security PC Client DICE Architectures Regional Forums Embedded Systems Server Industrial Software Stack Infrastructure Storage Internet of Things Trusted Network Communications Mobile Trusted Platforms Network Equipment Virtualized Platforms Certification ©2018 Trusted Computing Group The Trusted Platform Module 2.0: multiple valuable Security and Commercial Benefits Trusted Platform Module: A Common Criteria EAL4+ and Completely Standardized Securely implemented + certified Toolbox FIPS 140-2 certified security and preprogrammed Module Hash: SHA Endorsement Hierarchy functional module with many functions Benefits: SECURITY Asymmetric: RSA, ECC Platform Hierarchy (Trusted Computing Group, - Independently evaluated Symmetric: AES Storage Hierarchy TCG TPM v.20) and certified security - High Resistance against HMAC NULL Hierarchy Benefits: COMMERCIAL - Fault attacks - Compliance tested for - Side-Channel and semi- Opt.: SM1/2/3 + Agile Monotonic Counters functionality and invasive attacks KeyGen,Encr/Decr/Sign/Ver Tick Counters/Clock security - Invasive attacks (tamper - 15 years of proven and resistance) CRTM/R, PCRs Dict. Attack Lockout matured technology - Engineering risk mitigation - Vendor agnostic, - Leveraging TPM Sealing, Binding Enhanced Auth. Policies interoperability functions reduces the - COTS: high volumes, Protected NV Storage Encrypted Sessions need to implement cost efficient these on the main TPM Firmware Update Audit Sessions - High Reuse of TPM- application uC and the aware SW: engineering risk to inject security RNG/Entropy Self-Test efficiency flaws there ECert,Keys, Primary Seeds GPIO ©2018 Trusted Computing Group Comparing Hardware and Software Trust Anchors: same functionality – major differences in security Main App. Sec. Main App. HW Sec CPU SW SW CPU SW RoT SW Crypto functionality (✓) ✓ Tamper resistant ✓ Attack resistant ✓ Security certified ✓ Secure manufacturing ✓ Secured shipment ✓ ©2018 Trusted Computing Group For More Than 15 Years, the TCG Has Helped the Embedded World ecure Infrastructure, Platforms and Use Cases With global Standards and Products for With Resources and Support for Trusted Computing: Developers • Trusted Platform Module (TPM2.0) • Developer community, ✓ ISO/IEC 11889-1:2015 develop.trustedcomputinggroup.org • TSS – Trusted Software Stack • Guidance docs to secure different • DICE types of devices • Webcasts • Publicly available specifications • Workshops • Protection Profiles • Compliance tests & certification • Open source software support • Tiered Memberships w. low entry fees ©2018 Trusted Computing Group Trusted Computing Value, Use Cases and Software Putting the TPM to Work Lee Wilson, OnBoard Security ©2018 Trusted Computing Group How Has Cybersecurity developed, deployed and evolved over the last 50 years? Hardware Based Security for Hardware Based Security for All (Trusted Computing! High End Systems • No more critical keys stored • Financial Institutions, Critical in file systems All the Other (More Cost Sensitive) Industries, Large • Strong device identity for Platforms in the World DataCenters, etc. remote management, code • Store keys and certificates in file • Heavily regulated security update, etc. systems. • Very expensive HSMs • Much better attack • Hope firewalls, etc. (software only required – not optional detection – stop rootkits solutions) do the job. and bootkits. • Cross your fingers. • Add hardware protected software measurement and Per the DoD Orange Book - A TCB, system measurement, TCB creation for total etc. need to be added to the model solution Netting it out: Computers did not start out with good cybersecurity. It has evolved along the way and now the needed model is available to all. ©2018 Trusted Computing Group Firm Requirements Now… Focus on Bottom Up Platform Security Note: These charts were presented at the Winter 2012 TCG Members Meeting by the US Govt. The US Govt. is developing the SP800 standards to codify this and they will extend these efforts to server firmware and systems mgmt. ©2018 Trusted Computing Group Security Holes Missed by Software-Only Security – Problem Solved by Trusted Computing Antivirus programs, Firewalls, Compliance Management, etc. Provide “Top Down” Security. SQL injection, Database Applications attacks, PW attack, Applications A comprehensive The traditional Operating System Wndows folder/drive Operating System security approach top-down security sharing, Java attacks (top-down and Hypervisor Hypervisor approach leaves Rootkits bottom-up) provides lower layers of protection for all Firmware Bootkits, Rogue Firmware Defense the stack DownTop layers of the stack. Defense Firmware Updates DownTop vulnerable to (BIOS) Hardware Bottom Up DefenseBottom Attacks can occur at occur canAttacks Hardware attack. stack of the levels all Service Processor, Direct Physical Attacks Trusted Computing Hardware/Firmware/Software Required for Bottom Up Defense • TPM v2.0/TSS v2.0 provide support infrastructure for trusted computing • Trusted computing-enabled firmware building a “transitive trust chain” and establishing systems measurements off of a CRTM (Core Root of Trust for Measurement) launch bottom-up security. • OS’es, RTOS’es,firmware, trusted applications… seal secrets designed to protect overall platform security to the TPM PCRs (Programmable Configuration Registers) and use the TPM as an HSM where appropriate. ©2018 Trusted Computing Group Top Down Defense • Build