ensuring a trusted internet of things · trusted endpoints and interactions ecosystem enablement...

21
© 2017 Entrust Datacard Corporation. All rights reserved. ENSURING A TRUSTED INTERNET OF THINGS IoT Tech Expo | November 2017 1

Upload: others

Post on 16-Oct-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

ENSURING A TRUSTED

INTERNET OF THINGS• IoT Tech Expo | November 2017

1

Page 2: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

DIGITAL REVOLUTION

H E R E .From autonomous connected devices to digital supply chain collaboration, from smart cars to smart healthcare — new technologies and new models of business are changing the worlds of industry, governance and commerce.

E V O L V I N G .Digital transformation is estimated to create upwards of $100 trillion in value over the next decade.

T H E D I G I T A L R E V O L U T I O N I S …

D I S R U P T I V E .Our world is being transformed by new connected technologies that are redefining business models and changing the way people, systems, and things interact.

2

Page 3: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

NEW CONCEPTS, SOLUTIONS AND SERVICES

AGENCYAbility to assign

authority & responsibility

SCOPEBeyond human

centric to include all entities – people, devices, systems

SPONTANEITYAbility to act

instantly— by choice, policy or AI-driven

automation

CONTEXTSupport for dynamic &

adaptive security decisions

3

Page 4: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

B y 2 0 2 0 , 6 0 % o f d i g i t a l b u s i n e s s e s w i l l s u f f e r m a j o r s e r v i c e f a i l u r e s d u e t o t h e i n a b i l i t y o f I T s e c u r i t y t e a m s t o m a n a g e d i g i t a l r i s k

4

Page 5: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.5

T R U S T M A K E S I T P O S S I B L EOur world runs on trusted interactions between people, systems and things.

Page 6: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

Establishing and managing security in the myriad of digital interactions and relationships

between businesses, individuals and things.

Redefining Trust for the Digital Era: A Gartner Trend Insight Report, Gartner (13 May 2017)

DIGITAL TRUST IN CONNECTED ECOSYSTEM

Through 2020, organizations that actively promote

digital trust

will be able to participate in 20% more digital

ecosystems

and will be able to attract and retain 40% more

customers than those that don't.

Predicts 2017: Identity and Access Management, Gartner (16 Nov 2016)

6

Page 7: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

WHAT DOES IT LOOKS LIKE

7

Page 8: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

Security Model and Policy

Data Protection

TRUST MODEL IN DIGITAL ECOSYSTEM

Enterprise InfoSec

Confidentiality

Integrity

Availability

IOT Cybersecurity

Reliability

Safety

Privacy

Enterprise

Applications

Platform Hub

Edge

Endpoints

Configuration Management

Monitoring and Analytics

Connectivity and Communication

Endpoint Protection

IIC, Industrial Internet Security Framework (IISF)

PREVENT DETECT RESPOND PREDICT

8

Page 9: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

CONCEPTS IN PRACTICE

9

Page 10: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

KEY CONSIDERATIONS

10

CREATE A TRUSTED ECOSYSTEM SECURE OUTCOMES FROM CONNECTED

ECOSYSTEMS

LEVERAGE ENTERPRISE ARCHITECTURE ENHANCE USER

EXPERIENCE

Page 11: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

TRUST ENABLERS

11

IDENTITY AUTHENTICATION & AUTHORIZATION

CREDENTIAL LIFECYCLE MANAGEMENT

EQUIPMENT DATA MODEL

MANAGEMENT

DATA SECURITY SUPPLY CHAIN INTEGRITY

Page 12: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

EXAMPLE: SUPPLY CHAIN INTEGRITY

12

4 – Establish User and Device Identity Relationship

5 – Secured Service Delivery

1 – Establish Initial Identifier

2 – Create Managed Identity and Device Role

3 – Device Enrollment and Registration

2

3

45

1

Page 13: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.13

USE CASE: TRUST, IDENTITY AND DATA SECURITY IN AUTO

Managed Identity – Trust Anchor

Secured Data Path

End Point

Change in Ownership

Car to Car

Car to Infrastructure

Diagnostics

PersonalizedMedia

Ride Sharing

Car as a PaymentPlatform

Service DeliveryPlatform

DriverPersonas

Head Unit

Root of Trust

OEM, Tier 1, Third Party Services

Analytics

SECURITY ENFORCEMENTSECURITY MANAGEMENTSECURITY ORCHESTRATION

Page 14: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.14

USE CASE: TRUST, IDENTITY AND DATA SECURITY IN INDUSTRIAL SECTORS

Managed Identity –Trust Anchor

Secured Data Path

End Point

MINING

Root of Trust

AnalyticsProgrammable LogicController (PLC)

Sensor UTILITIES MANUFACTURINGENERGY

Analytics

Analytics

Government Regulator

SECURITY MANAGEMENT

Page 15: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

Concept for Building Trust & a Competitive Digital Business

THE “HOW-TO”

15

Page 16: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

DIGITAL TRUST AN EVOLVING MODEL

Not a Moment in Time — Ongoing Optimization & Growth

DIGITAL TRUST MATURITY MODELS

LEGACY

EMERGING

EVOLVED

User centric

Binary vs. Probabilistic

Point in time vs Session

Security viewed as required, Risk Prevention

Broad view - People, Systems & Things

Adaptive, Session & Risk Based

Risk acceptance based on context

Trust is viewed as an essential enabler

16

Page 17: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

GETTING STARTED

17

GET ALIGNED Assess where your organization is on the digital journey before jumping in

SELECT A FRAMEWORK Leverage industry and consortium investments to create a baseline

PERSONALIZE Characterize architecture with key attributes and inventory devices, networks, and data

DEFINE THE SECURITY

APPROACHMap security controls against the reference design and identify gaps

CONDUCT RISK

ASSESSMENTIdentify potential threats within the initiative, the risk they pose, and determine if controls are adequate

REVIEW Conduct period reviews based on design and environmental changes

TIPS

• Engage with partners for learnings and best practices

• Consider a prototype depending on maturity of the use case

• Watch for spiraling integration requirements

• Starting with a strong Trust foundation can accelerate deployment

Page 18: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

Innovator in trusted identities and secure payment technologies

$600M+ in annual revenue

2,000+ employees in 34 worldwide locations

Sales, service and support covering 150+ countries

Headquartered in Minneapolis, Minnesota USA

Privately held, founded in 1969

CLOUD SERVICES AND ENABLEMENT

TRUSTED ENDPOINTS AND INTERACTIONS

ECOSYSTEM ENABLEMENT

EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS)

Authentication Access &

ID SolutionsInternet of Things Certificates

Solutions, PKI

Financial

Instant Issuance

Bureau

Services

18

Page 19: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.

WHO TRUSTS ENTRUST DATACARD

Page 20: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.20

T R U S T F O R Y O U R C O N N E C T E D E C O S Y S T E MR o o t e d t o a u t h o r i t a t i v e l y i s s u e d I d e n t i t i e s a n d m a n a g e d t h r o u g h o u t

t h e l i f e - c y c l e

Page 21: ENSURING A TRUSTED INTERNET OF THINGS · TRUSTED ENDPOINTS AND INTERACTIONS ECOSYSTEM ENABLEMENT EMERGING TECH (BLOCKCHAIN, QUANTUM, THINGS) Authentication Access & ID Solutions Internet

© 2017 Entrust Datacard Corporation. All rights reserved.© 2017 Entrust Datacard Corporation. All rights reserved.

T H A N K Y O U

21