A Reactive Middleware Framework for Secure Data Stream Processing

Total Page:16

File Type:pdf, Size:1020Kb

A Reactive Middleware Framework for Secure Data Stream Processing SecureStreams: A Reactive Middleware Framework for Secure Data Stream Processing Aurelien´ Havet Rafael Pires Pascal Felber University of Neuchatelˆ University of Neuchatelˆ University of Neuchatelˆ Neuchatel,ˆ Switzerland Neuchatel,ˆ Switzerland Neuchatel,ˆ Switzerland [email protected] [email protected] [email protected] Marcelo Pasin Romain Rouvoy Valerio Schiavoni University of Neuchatelˆ Univ. Lille / Inria / IUF University of Neuchatelˆ Neuchatel,ˆ Switzerland Lille, France Neuchatel,ˆ Switzerland [email protected] [email protected] [email protected] ABSTRACT by millions of IoT devices, data streams have emerged as a suit- e growing adoption of distributed data processing frameworks in able paradigm to process ows of data at scale. However, as some a wide diversity of application domains challenges end-to-end inte- of these data streams may convey sensitive information, stream gration of properties like security, in particular when considering processing requires support for end-to-end security guarantees in deployments in the context of large-scale clusters or multi-tenant order to prevent third parties accessing restricted data. Cloud infrastructures. is paper therefore introduces SecureStreams, our initial work is paper therefore introduces SecureStreams, a reactive mid- on a middleware framework for developing and deploying secure dleware framework to deploy and process secure streams at scale. stream processing on untrusted distributed environments. Secure- Its design combines the high-level reactive dataow programming Streams supports the implementation, deployment, and execution paradigm with Intel®’s low-level soware guard extensions (SGX) of stream processing tasks in distributed seings, from large-scale in order to guarantee privacy and integrity of the processed data. clusters to multi-tenant Cloud infrastructures. More specically, e experimental results of SecureStreams are promising: while SecureStreams adopts a message-oriented [28] middleware, which oering a uent scripting language based on Lua, our middleware integrates with the SSL protocol [30] for data communication and delivers high processing throughput, thus enabling developers to the current version of Intel®’s soware guard extensions (SGX) [27] implement secure processing pipelines in just few lines of code. to deliver end-to-end security guarantees along data stream pro- cessing stages. SecureStreams can scale vertically and horizon- KEYWORDS tally by adding or removing processing nodes at any stage of the pipeline, for example to dynamically adjust according to the current Middleware, security, SGX, stream processing workload. e design of the SecureStreams system is inspired ACM Reference format: by the dataow programming paradigm [48]: the developer com- Aurelien´ Havet, Rafael Pires, Pascal Felber, Marcelo Pasin, Romain Rouvoy, bines together several independent processing components (e.g., and Valerio Schiavoni. 2017. SecureStreams: A Reactive Middleware mappers, reducers, sinks, shuers, joiners) to compose specic Framework for Secure Data Stream Processing. In Proceedings of DEBS ’17, processing pipes. Regarding packaging and deployment, Secure- Barcelona, Spain, June 19-23, 2017, 10 pages. Streams smoothly integrates with industrial-grade lightweight DOI: hp://dx.doi.org/10.1145/3093742.3093927 virtualization technologies like Docker [9]. In this paper, we propose the following contributions: (i) we 1 INTRODUCTION describe the design of SecureStreams, (ii) we provide details of our reference implementation, in particular on how to smoothly arXiv:1805.01752v1 [cs.DC] 4 May 2018 e data deluge imposed by a world of ever-connected devices, integrate our runtime inside an SGX enclave, and (iii) we perform whose most emblematic example is the Internet of ings (IoT), an extensive evaluation with micro-benchmarks, as well as with a has fostered the emergence of novel data analytics and process- real-world dataset. ing technologies to cope with the ever increasing volume, velocity, e remainder of the paper is organized as follows. To beer and variety of information that characterize the big data era. In understand the design of SecureStreams, Section 2 delivers a brief particular, to support the continuous ow of information gathered introduction to today’s SGX operating mechanisms. e archi- tecture of SecureStreams is then introduced in Section 3. Our Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed implementation choices and an example of a SecureStreams pro- for prot or commercial advantage and that copies bear this notice and the full citation gram are reported in Section 4. Section 5 discusses our extensive on the rst page. Copyrights for components of this work owned by others than ACM evaluation, presenting a detailed analysis of micro-benchmark per- must be honored. Abstracting with credit is permied. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specic permission and/or a formances, as well as more comprehensive macro-benchmarks with fee. Request permissions from [email protected]. real-world datasets. Some related works to this topic are gathered DEBS ’17, Barcelona, Spain in Section 6. Finally, Section 7 briey describes our future work © 2017 ACM. 978-1-4503-5065-5/17/06...$15.00 DOI: hp://dx.doi.org/10.1145/3093742.3093927 and concludes. DEBS ’17, June 19-23, 2017, Barcelona, Spain A. Havet, R. Pires, P. Felber, M. Pasin, R. Rouvoy, V. Schiavoni to bring the execution ow inside the enclave (Í). Once the trusted Untrusted Code Trusted Code function is executed by one of the enclave’s threads (Î), its result Call is encrypted and sent back (Ï) before giving back the control to gate ➊ Trusted function the main processing thread (Ð). ➌ ➍ Execute Create enclave 3 ARCHITECTURE ➋ ➎ ➏ e architecture of SecureStreams comprises a combination of Return Call trusted function two dierent types of base components: worker and router.A ➐ worker component continuously listens for incoming data by means of non-blocking I/O. As soon as data ows in, an application- … dependent business logic is applied. A typical use-case is the de- Enclave ployment of a classic lter/map/reduce paern from the functional programming paradigm [24]. In such a case, worker nodes execute only one function, namely map, filter, or reduce.A router com- Figure 1: SGX core operating principles. ponent acts as a message broker between workers in the pipeline and transfers data between them according to a given dispatching 2 SGX LIGHTNING TOUR policy. Figure 2 depicts a possible implementation of this dataow paern using the SecureStreams middleware. e design of SecureStreams revolves around the availability of SecureStreams is designed to support the processing of sensi- SGX features in the host machines. It consists in a trusted execu- tive data inside SGX enclaves. As explained in the previous section, tion environment (TEE) recently introduced into Intel® SkyLake, the enclave page cache (EPC) is currently limited to 128 MB. To over- similar in spirit to ARM TrustZone [2] but much more powerful. come this limitation, we seled on a lightweight yet ecient em- Applications create secure enclaves to protect the integrity and the beddable runtime, based on the Lua virtual machine (LuaVM)[32] condentiality of the data and the code being executed. and the corresponding multi-paradigm scripting language [15]. e e SGX mechanism, as depicted in Figure 1, allows applications Lua runtime requires only few kilobytes of memory, it is designed to access condential data from inside the enclave. e architec- to be embeddable, and as such it represents an ideal candidate to ture guarantees that an aacker with physical access to a machine execute in the limited space allowed by the EPC. Moreover, the will not be able to tamper with the application data without being application-specic functions can be quickly prototyped in Lua, noticed. e CPU package represents the security boundary. More- and even complex algorithms can be implemented with an almost over, data belonging to an enclave is automatically encrypted and 1:1 mapping from pseudo-code [35]. We provide further imple- authenticated when stored in main memory. A memory dump on a mentation details of the embedding of the LuaVM inside an SGX victim’s machine will produce encrypted data. A remote aestation enclave in Section 4. protocol allows one to verify that an enclave runs on a genuine Each component is wrapped inside a lightweight Linux container Intel® processor with SGX. An application using enclaves must (in our case, the de facto industrial standard Docker [9]). Each con- ship a signed (not encrypted) shared library (a shared object le in tainer embeds all the required dependencies, while guaranteeing Linux) that can possibly be inspected by malicious aackers. the correctness of their conguration, within an isolated and repro- In the current version of SGX, the enclave page cache (EPC) is ducible execution environment. By doing so, a SecureStreams pro- 1 a 128 MB area of memory predened at boot to store enclaved cessing pipeline can be easily deployed without changing the source code and data. At most around 90 MB can be used by application’s code on dierent public or private infrastructures. For instance, this memory pages, while the remaining area is used to maintain SGX will allow developers to deploy SecureStreams to Amazon EC2 metadata. Any access to an enclave page that does not reside in the container service [1], where SkyLake-enabled instances will soon EPC triggers a page fault. e SGX driver interacts with the CPU be made available [4], or similarly to Google compute engine [12]. to choose which pages to evict. e trac between the CPU and e deployment of the containers can be transparently executed the system memory is kept condential by the memory encryption on a single machine or a cluster, using a Docker network and the engine (MEE) [31], also in charge of tamper resistance and replay Docker Swarm scheduler [11].
Recommended publications
  • A Theory on Information Security
    Australasian Conference on Information Systems Horne et al. 2016, Wollongong, Australia A Theory on Information Security A Theory on Information Security Craig A. Horne Department of Computing and Information Systems The University of Melbourne Victoria, Australia Email: [email protected] Atif Ahmad Department of Computing and Information Systems The University of Melbourne Victoria, Australia Email: [email protected] Sean B. Maynard Department of Computing and Information Systems The University of Melbourne Victoria, Australia Email: [email protected] Abstract This paper proposes a theory on information security. We argue that information security is imperfectly understood and aim to bring about an altered understanding of why efforts are made to engage in information security. The goal of information security is widely recognised as the confidentiality, integrity and availability of information however we argue that the goal is actually to simply create resources. This paper responds to calls for more theory in information systems, places the discussion in philosophical context and compares various definitions. It then identifies the key concepts of information security, describes the relationships between these concepts, as well as scope and causal explanations. The paper provides the theoretical base for understanding why information is protected, in addition to theoretical and practical implications and suggestions for future research. Keywords Information security, resources, controls, threats, theory development. 1 Australasian Conference on Information Systems Horne et al. 2016, Wollongong, Australia A Theory on Information Security 1 INTRODUCTION Despite the concept of information security being very well established, the reasons and motivations behind it are imperfectly understood. This paper seeks to explain how and why the phenomena that comprise the concepts of information security occur.
    [Show full text]
  • Data and Database Security and Controls
    1 Handbook of Information Security Management, Auerbach Publishers, 1993, pages 481-499. DATA AND DATABASE SECURITY AND CONTROLS Ravi S. Sandhu and Sushil Jajodia Center for Secure Information Systems & Department of Information and Software Systems Engineering George Mason University, Fairfax, VA 22030-4444 Telephone: 703-993-1659 1 Intro duction This chapter discusses the topic of data security and controls, primarily in the context of Database Management Systems DBMSs. The emphasis is on basic principles and mechanisms, which have b een successfully used by practitioners in actual pro ducts and systems. Where appropriate, the limitations of these techniques are also noted. Our discussion fo cuses on principles and general concepts. It is therefore indep endent of any particular pro duct except for section 7 which discusses some pro ducts. In the more detailed considerations we limit ourselves sp eci cally to relational DBMSs. The reader is assumed to be familiar with rudimentary concepts of relational databases and SQL. A brief review of essential concepts is given in the app endix. The chapter b egins with a review of basic security concepts in section 2. This is followed, in section 3, by a discussion of access controls in the current generation of commercially available DBMSs. Section 4 intro duces the problem of multilevel security. It is shown that the techniques of section 3 are inadequate to solve this problem. Additional techniques develop ed for multilevel security are reviewed. Sec- tion 5, discusses the various kinds of inference threats that arise in a database system, and discusses metho ds that have b een develop ed for dealing with them.
    [Show full text]
  • Information Security Essentials Definition of Information Security
    Computing Services Information Security Office Information Security Essentials Definition of Information Security Information security is the protection of information and systems from unauthorized access, disclosure, modification, destruction or disruption. The three objectives of information security are: • Confidentiality • Integrity • Availability Confidentiality Confidentiality refers to the protection of information from unauthorized access or disclosure. Ensuring confidentiality is ensuring that those who are authorized to access information are able to do so and those who are not authorized are prevented from doing so. Integrity Integrity refers to the protection of information from unauthorized modification or destruction. Ensuring integrity is ensuring that information and information systems are accurate, complete and uncorrupted. Availability Availability refers to the protection of information and information systems from unauthorized disruption. Ensuring availability is ensuring timely and reliable access to and use of information and information systems. Information Security Policy Carnegie Mellon has adopted an Information Security Policy as a measure to protect the confidentiality, integrity and availability of institutional data as well as any information systems that store, process or transmit institutional data. Institutional data is defined as any data that is owned or licensed by the university. Information system is defined as any electronic system that stores, processes or transmits information. Policies • Throughout its lifecycle, all Institutional Data shall be protected in a manner that is considered reasonable and appropriate given the level of sensitivity, value and criticality that the Institutional Data has to the University. • Any Information System that stores, processes or transmits Institutional Data shall be secured in a manner that is considered reasonable and appropriate given the level of sensitivity, value and criticality that the Institutional Data has to the University.
    [Show full text]
  • Application of Bioinformatics Methods to Recognition of Network Threats
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE Paper Application of bioinformatics methods to recognition of network threats Adam Kozakiewicz, Anna Felkner, Piotr Kijewski, and Tomasz Jordan Kruk Abstract— Bioinformatics is a large group of methods used in of strings cacdbd and cawxb, character c is mismatched biology, mostly for analysis of gene sequences. The algorithms with w, both d’s and the x are opposite spaces, and all developed for this task have recently found a new application other characters are in matches. in network threat detection. This paper is an introduction to this area of research, presenting a survey of bioinformatics Definition 2 (from [2]) : A global multiple alignment of methods applied to this task, outlining the individual tasks k > 2 strings S = S1,S2,...,Sk is a natural generalization and methods used to solve them. It is argued that the early of alignment for two strings. Chosen spaces are inserted conclusion that such methods are ineffective against polymor- into (or at either end of) each of the k strings so that the re- phic attacks is in fact too pessimistic. sulting strings have the same length, defined to be l. Then Keywords— network threat analysis, sequence alignment, edit the strings are arrayed in k rows of l columns each, so distance, bioinformatics. that each character and space of each string is in a unique column. Alignment is necessary, since evolutionary processes intro- 1. Introduction duce mutations in the DNA and biologists do not know, whether nth symbol in one sequence indeed corresponds to When biologists discover a new gene, its function is not al- the nth symbol of the other sequence – a shift is probable.
    [Show full text]
  • New-Age Supercomputers: Hi-Speed Networks and Information Security
    Journal of Electrical and Electronic Engineering 2019; 7(3): 82-86 http://www.sciencepublishinggroup.com/j/jeee doi: 10.11648/j.jeee.20190703.12 ISSN: 2329-1613 (Print); ISSN: 2329-1605 (Online) New-age Supercomputers: Hi-Speed Networks and Information Security Andrey Molyakov Institute of Information Technologies and Cybersecurity, Russian State University for the Humanities, Moscow, Russia Email address: To cite this article: Andrey Molyakov. New-age Supercomputers: Hi-Speed Networks and Information Security. Journal of Electrical and Electronic Engineering. Special Issue: Science Innovation . Vol. 7, No. 3, 2019, pp. 82-86. doi: 10.11648/j.jeee.20190703.12 Received : August 18, 2019; Accepted : September 21, 2019; Published : October 9, 2019 Abstract: The author describes computing strategic tasks that are used for ensuring defense and national security, the most important scientific, technical, biomedical and sociology tasks. Most typically, these are capability-based tasks. Supercomputers for their solution are respectively called Technical Capability, i.e. machines of extreme technical capabilities. Machines of this segment are also called High End Computers (HEC), and in our terminology - strategic supercomputers (SCs). Moving to the engineering level, author says that for tasks with good spatio-temporal work with memory, cache memory and schemes for automatically pre-loading data into the cache memory can be effectively used. This can significantly reduce the average memory access time of several hundred processor cycles to fractions of a processor cycle. Such tasks are usually called computational or cache-friendly (cach-friendly) - CF tasks. On tasks with poor spatio-temporal work with memory, the cache memory is useless, so each memory access is hundreds of processor cycles, the processor is idle because of this, and therefore the real performance is in units or even a fraction of a percent of the peak.
    [Show full text]
  • Application of Bioinformatics Methods to Recognition of Network Threats
    Paper Application of bioinformatics methods to recognition of network threats Adam Kozakiewicz, Anna Felkner, Piotr Kijewski, and Tomasz Jordan Kruk Abstract— Bioinformatics is a large group of methods used in of strings cacdbd and cawxb, character c is mismatched biology, mostly for analysis of gene sequences. The algorithms with w, both d’s and the x are opposite spaces, and all developed for this task have recently found a new application other characters are in matches. in network threat detection. This paper is an introduction to this area of research, presenting a survey of bioinformatics Definition 2 (from [2]) : A global multiple alignment of methods applied to this task, outlining the individual tasks k > 2 strings S = S1,S2,...,Sk is a natural generalization and methods used to solve them. It is argued that the early of alignment for two strings. Chosen spaces are inserted conclusion that such methods are ineffective against polymor- into (or at either end of) each of the k strings so that the re- phic attacks is in fact too pessimistic. sulting strings have the same length, defined to be l. Then Keywords— network threat analysis, sequence alignment, edit the strings are arrayed in k rows of l columns each, so distance, bioinformatics. that each character and space of each string is in a unique column. Alignment is necessary, since evolutionary processes intro- 1. Introduction duce mutations in the DNA and biologists do not know, whether nth symbol in one sequence indeed corresponds to When biologists discover a new gene, its function is not al- the nth symbol of the other sequence – a shift is probable.
    [Show full text]
  • Small Business Information Security: the Fundamentals
    NISTIR 7621 Small Business Information Security: The Fundamentals Richard Kissel NISTIR 7621 Small Business Information Security: The Fundamentals Richard Kissel Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899 October 2009 U.S. Department of Commerce Gary Locke, Secretary National Institute of Standards and Technology Patrick D. Gallagher, Deputy Director Acknowledgements The author, Richard Kissel, wishes to thank his colleagues and reviewers who contributed greatly to the document’s development. Special thanks goes to Mark Wilson, Shirley Radack, and Carolyn Schmidt for their insightful comments and suggestions. Kudos to Kevin Stine for his awesome Word editing skills. Certain commercial entities, equipment, or materials may be identified in this document in order to describe and experimental procedure or concept adequately. Such identification is not intended to imply recommendation or endorsement by the National Institute of Standards and Technology, nor is it intended to imply that the entities, materials, or equipment are necessarily the best available for the purpose. i Table of Contents Overview...................................................................................................................................................... 1 1. Introduction.......................................................................................................................................... 1 2. The “absolutely necessary” actions that a small
    [Show full text]
  • Introduction to Database Security
    © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Digital_Art/Shutterstock CHAPTER © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC 8NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT IntroductionFOR SALE OR DISTRIBUTION toNOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE ORDatabase DISTRIBUTION SecurityNOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION TABLE OF CONTENTS CHAPTER OBJECTIVES © Jones8.1 & IssuesBartlett in Database Learning, Security LLC © Jones In & this Bartlett chapter you Learning, will learn the LLC NOT 8.2FOR SALE Fundamentals OR DISTRIBUTION of Access Control NOT FORfollowing: SALE OR DISTRIBUTION U 8.3 Database Access Control The meaning of database 8.4 Using Views for Access Control security U 8.5 Security Logs and Audit Trails How security protects privacy and confidentiality © Jones & Bartlett8.6 Learning, Encryption LLC © Jones & Bartlett Learning, LLC U Examples of accidental or NOT FOR SALE OR8.7 DISTRIBUTION SQL Data Control Language NOT FOR SALE OR DISTRIBUTION deliberate threats to security 8.8 Security in Oracle U Some database security 8.9 Statistical Database Security measures 8.10 SQL Injection U The meaning of user 8.11 Database© Jones Security & and Bartlett the Internet Learning, LLC © Jones & Bartlett Learning, LLC authentication 8.12 ChapterNOT Summary FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION U The meaning of authorization Exercises U How access control can be represented © Jones & Bartlett Learning, LLC © JonesU & How Bartlett the view Learning, functions as a LLC NOT FOR SALE OR DISTRIBUTION NOT FOR securitySALE device OR DISTRIBUTION © Jones & Bartlett Learning, LLC© Jones & Bartlett Learning, LLC.© NOTJones FOR SALE& Bartlett OR DISTRIBUTION.
    [Show full text]
  • Analysis of Computer Network Information Security and Protection Strategy
    MATEC Web of Conferences 267, 02013 (2019) https://doi.org/10.1051/matecconf/201926702013 ISC 2018 Analysis of Computer Network Information Security and Protection Strategy Xiaobo Minga, Ying Chen, Jinhua Guo Shangrao Vocational and Technical College, Jiangxi, Shangrao, 334001 Abstract. Computers are closely related to our life and work. We have entered an era in which computers are not available in all walks of life. Among them, many important documents and materials will be stored in the form of electronic files in the computer. However, computers are not absolutely safe, and cases of information theft occur from time to time. Most people usually keep information confidential in the form of encryption. How to avoid the problem of computer information security. Computer network security involves all aspects. To solve these problems, there are many levels of technology, such as cryptography technology, network security technology and so on. Our country has also done a lot of research on the security protection of computer network technology, and these research results have also achieved certain results in the actual construction of computer network. In order to ensure the normal operation of computer networks, ensure information security and prevent information leakage and theft, a special protection system has been established to ensure the security of computer network information by setting up computer detection, security assessment and other links. However, with the rapid development of science and technology, the updating of electronic products is faster and faster, and the challenge of Wechat for network security information is more severe. How to protect computer network information security needs to be solved urgently, this paper discusses this.
    [Show full text]
  • Cybersec and Human Performance in Degraded Modes
    Violations and Human Performance in Cybersecurity Prof. Chris Johnson, School of Computing Science, University of Glasgow, Scotland. http://www.dcs.gla.ac.uk/~johnson Aim is to Provoke Discussion... • Common software components into ATM: – networks, Linux, VOIP, SBAS... • Human performance concerns everywhere: – Huge problems of competence – incl regulators; – Many conflicts between safety and security; – Inconsistent, inapplicable rules (lack of HF input); – Consistent, known violation of policies. • Recommendations: – Act now these are violations NOT errors. Copyright C.W. Johnson, 2012 Aim is to Provoke Discussion... •Recommendations: – Act now these are violations NOT errors. •From a human factors perspective… •Why are ANSPs waiting for the attack? Copyright C.W. Johnson, 2012 Paranoia? • Many policies only exist on paper. • Huge problem with complacency. • “FAA ineffective in all critical areas including operational systems information security, future systems modernization security, management structure, policy implementation”. • US Government Auditors Office Copyright C.W. Johnson, 2012 DoT Review of FAA CyberSecurity DoT "unless effective action is taken quickly, it is likely to be a matter of when, not if, ATC systems encounter attacks that do serious harm to ATC operations." “Attackers can take advantage of software vulnerabilities in commercial IP products to exploit ATC systems, which is especially worrisome at a time when the Nation is facing increased threats from sophisticated nation- state-sponsored cyber attacks" Copyright C.W. Johnson, 2012 Conflict Between Security and Safety • Existing safety standards eg ED153 – Focus on verification and validation; – In proportion to SWAL/criticality. • Anti-viral systems violate ED-153: – Updated every 24-48 hours; – could themselves bring down ACC; – Cannot test anti-virus definiitons; – Without increasing security exposure.
    [Show full text]
  • Improving the Cyber Security of Consumer Internet of Things Report
    Secure by Design Report Secure by Design: Improving the cyber security of consumer Internet of Things Report Secure by Design Report Contents Foreword by the Minister for Digital and Creative Industries Executive Summary 1. The Internet of Things (IoT) - new opportunities and risks for consumers 2. Context of the Review 3. Promoting a Secure by Design Approach to Consumer IoT Security 4. Code of Practice for Industry on Consumer IoT 5. Supporting Actions by the Government and Industry 6. Building an International Consensus 7. Conclusion 8. Annex A: Glossary of Terms 9. Annex B: Options Analysis Summary 1 Secure by Design Report Foreword As we deliver our vision for the UK to be the safest place to live and do business online, it is critical that we make sure the internet works for everyone. That means, as Government and industry work together to ensure we protect the UK from cyber attacks, we must also reduce the burden on end users by embedding effective cyber security Margot James practices at every stage of a Minister for Digital and Creative Industries connected product’s life cycle. Increased connectivity via the internet of things (“IoT”) provides fantastic opportunities for the UK. A key part of this Government’s ambition is to expand on the aspirations set out in our Digital Strategy through enhancing our status as an international leader in the development and uptake of IoT. However, we must ensure that individuals are able to access and benefit from connected technologies safely, confident that adequate security and privacy measures are in place to protect their online activity.
    [Show full text]
  • The Basic Components of an Information Security Program MBA Residential Technology Forum (RESTECH) Information Security Workgroup
    ONE VOICE. ONE VISION. ONE RESOURCE. The Basic Components of an Information Security Program MBA Residential Technology Forum (RESTECH) Information Security Workgroup 20944 MBA.ORG Copyright © October 2019 by Mortgage Bankers Association. All Rights Reserved. Copying, selling or otherwise distributing copies and / or creating derivative works for commercial purposes is strictly prohibited. Although significant efforts have been used in preparing this guide, MBA makes no representations or warranties with respect to the accuracy and completeness of the contents. If legal advice or other expert assistance is needed, competent professionals should be consulted. Copying in whole or in part for internal business purposes and other non-commercial uses is permissible provided attribution to Mortgage Bankers Association is included, either through use of the previous paragraph (when copying / distributing the white paper in full) or the following (when distributing or including portions in a derivative work): “Source: Mortgage Bankers Association, The Basic Components of an Informa- tion Security Program, by the Information Security Work Group of the MBA Residential Technology Forum (RESTECH), 2019, [page(s)].” Table of Contents Preface . 1 1. Introduction . 2 2. Laws and Regulations for .Information . Security. 5 3. First Priority Cybersecurity Practices . .6 . 3.1 Manage Risk. .6 3.2 Protect your Endpoints . 6 3.3 Protect Your Internet . Connection. .7 3.4 Patch Your Operating Systems and Applications . 8 . 3.5 Make Backup Copies of Important Business. Data / Information. .8 3.6 Control Physical Access to Your Computers and Network Components . 9 . 3.7 Secure Your Wireless Access Points. .and . Networks. 10 3.8 Train Your Employees in Basic .
    [Show full text]