IoT Auditing ISACA Version 1
IoT Auditing ISACA Version 1
IoT Auditing ISACA Version 1
Auditing the
IoT Security
BY ARIFFUDDIN AIZUDDIN
2
Disclaimer
This presentation was prepared for ISACA Malaysia CYBERSECURITY, IT ASSURANCE &
GOVERNANCE CONFERENCE 2017
The contents of this presentation were taken from public available references. Some of the
sources of the contents are being adopted and adapted to suit to the presentation.
Certain commercial entities, equipment, or materials may be identified in this presentation in
order to describe the IOT Security Audit adequately. Such identification is not intended to imply
the recommendation or endorsement nor it is intended to imply that these entities, materials, or
equipment are necessarily the best available for the purpose.
All registered trademarks belong to their respective organizations.
3
CONTENTS
These guidelines and best practices are the core references. It is recommended for these
guidelines to be referred in details.
GSMA IoT Security Guidelines - http://www.gsma.com/connectedliving/gsma-iot-security-
guidelines-complete-document-set/. It provides guidelines for IoT Service Providers, IoT Device
Manufacturers, IoT Developers and Network Operators.
IoT Security Guidance – OWASP - https://www.owasp.org/index.php/IoT_Security_Guidance.
Assessment and Testing Framework.
https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project
Security Guidance for Early Adopters of the Internet of Things (IoT) by CSA -
https://downloads.cloudsecurityalliance.org/whitepapers/Security_Guidance_for_Early_Adopt
ers_of_the_Internet_of_Things.pdf
IoT Security Foundation - https://iotsecurityfoundation.org/wp-content/uploads/2015/09/IoTSF-
Establishing-Principles-for-IoT-Security-Download.pdf
9
IoT Security Interest Group, Communities
and Collaboration Network
IoT Security Foundation: https://iotsecurityfoundation.org/
IoT Security Wiki: https://iotsecuritywiki.com/
These are some of the prominent vendors/developers of IoT that we shall closely follows:
https://azure.microsoft.com/en-us/documentation/articles/iot-security-architecture/ by
Microsoft Azure.
Securing the Internet of Things: A Proposed Framework:
http://www.cisco.com/c/en/us/about/security-center/secure-iot-proposed-framework.html
Trusted Computing Group. http://www.trustedcomputinggroup.org/wp-
content/uploads/IOT_Security_Architects_Guide_TCG.pdf
Symantec IoT reference architecture:
https://www.symantec.com/content/en/us/enterprise/white_papers/iot-security-reference-
architecture-wp-en.pdf
IoT Security Misconception - It’s all about 10
the device
It’s not just about the device or the network or the clients; there are MANY surface
areas involved in IoT eco-system. Each of these need to be evaluated and assessed
The network and the cloud must be secured to face the growing security
challenges.
We need to embrace the umbrella and collaborative approach to IoT security. We
need to build security into the IoT ecosystem and the ecosystem that supports the
foundation of the Internet of Things which requires teamwork from all stakeholders.
No single control is enough to stop an attack. A multi-layered approach has to be
taken, right from when the device is switched on.
Security must be addressed throughout the lifecycle of the device, from design to
operation as it is connected through the network and in the cloud.
11
Securing IoT eco-system
Interoperability
Reference Integration
APIs Frameworks
Implementations
Operating Systems
13
Device
Authentication –
Secure Code
machine
authentication
Secure Booting
Access Control –
Protected
Anti-Cloning
Firmware
CSA – Defense in Depth security protections 16
for IoT assets
The Internet of Things Device Security – Implements Device and Embedded Security Mechanism –
Device specific Security Profiles, Devices Authentication, Authorization, Confidentiality and
Device/Data Integrity Protection. Ensure that they are authorized, and secure and regularly updated
with the latest firmware, software and patches. Securely disposing of IoT assets at the end of the life-
cycle. Implement life-cycle management approach for IoT devices.
The Cloud – Implement the cloud security guidelines. Security Guidance for Critical Areas of Focus in
Cloud Computing V3.0 are available from CSA.
The Mobile Application Security - Mobile application should perform cryptographic verification and
validation of other components. Apply Mobile Security Guidelines (from OWASP Mobile Security
Project) and Application Security Guidelines.
Communication Networks (Wired and Wireless), Network Interfaces, ports and Gateways Security -
From the sensor to the collector, connectivity authentication between the device, and on the IoT
infrastructure cannot be compromised. At multi-service network layer, security services must be there
to protect these inherently insecure endpoints. Security services at the core network must be
hardened to protect against IoT threats.
A holistic approach - Security controls at 18
each elements/components : 2/2
The Software – Implement code review and repeat testing. Ensure software assurance and management
responsible for software risk. Established structural quality analysis, software quality and security education.
Physical Security - Security elements such as access badges, cameras, phones, and gates, will be digital
nodes on the IoT. Integrating physical security on the network, by detect, deter, and analyse security events.
Use tempered proof devices as security mechanism.
OS & Protocols – For the OS & protocol selection process, all aspects of deployment, operation,
management, and security must be considered including the IoT implementation environment. Use of
protocols that offer security as core security mechanisms.
Big Data Analytic - Securing the big data life cycle requires (1) authentication and authorization of users,
applications, and databases (2) Privileged user access and administration (3) Encryption of data at rest and
in motion (3) Data redaction and masking for both production and nonproduction environments (4)
Separation of responsibilities and roles (5) Implementing least privilege (6) Transport security (7) API security
(8) Monitoring, auditing, alerting, and reporting.
IoT System Secured by Design 19
•Symmetric •Secure Hashing
encryption with
•Non-Repudiation –
secure key
Digital Signature
management
•Asymmetric
Encryption with
secure key
exchange
Confidentiality Integrity
Openness Availability
•Alternative Sources:
•Power sources
•Open Standard •Network sources,
•Verifiable/Assessment •Storage sources,
•Fail Secure •Compute sources.
20
End to End Security Solutions at Each Layer
CLOUD + Application(App); Private Cloud + App; Embedded Cloud; Data Analysis
Internet (Data Centre, Big Data, Data Service Centre) (Descriptive,
Diagnostic,
Predictive &
Wired/Wireless Network – Transmission and Connectivity (One to One; Prescriptive)
One to Many; Many to Many) – Gateway to Cloud
TECHNICAL IMPACT
BUSINESS/OPERATIONAL IMPACT
24
Risk Assessment - Process
25
First and Foremost it is important for us to recognize all types of threats in IoT eco-system.
Examples of key threats.
Phishing - The fraudulent practice of sending emails pretending to be from a
reputable company in order to entice individuals to reveal sensitive information.
IoT Application hacking
DOS attacks - Temporarily or indefinitely crash a network.
DDoS attacks - Designed to make an online service unavailable by flooding it with
traffic from multiple sources.
Physical intrusion - Physical intrusion is when a device and its components are
actually tempered with.
31
Cyber Threats for Embedded Devices
Internet-based attacks are on the rise and an increasing number of these attacks
target embedded devices. Cyber-criminals, hacking bots, industrial or international
espionage agents, and even terrorist groups are now targeting industrial, military,
automotive, and medical devices as well as utility systems.
Reported attacks against industrial devices include:
Automotive manufacturing plant shutdown resulting from a cyber-attack
Pipeline monitoring system that failed due to a DoS attack
Train system delays caused by hackers
Sewage spill caused by a control system hacked by an insider
Proliferation of malware targeting industrial automation systems including Stuxnet,
Flame, Havex and BlackEnergy
Source: http://www.iconlabs.com/prod/product-family/floodgate-security-framework
32
More Examples of Real IoT Threats
Secure
Authorisation
Communication
Secure Session
Management
SECURITY LIFE CYCLE
40
MANAGEMENT
SECURITY
EVALUATION &
ASSESSMENT
SECURITY
CONTROL
&
MEASURES
Security Features for Embedded Device
41
Secure Boot
Secure ID)
Source:
http://www.automation. Secure Communication
com/pdf_articles/Intern
et_of_Secure_Things.pdf Protection Against Cyber Attack
CSA
Recommended
Security Controls
43
CSA Recommended Security Controls (1/3)
PHYSICAL
LOGICAL
Framework AUTHENTICATION
(MULTIFACTOR)
Identity of Destination
AUTHORISATION
NEED TO LEAST
UNIQUE ID
KNOW PRIVILEGE
ACCOUNTING
(TRACK & MONITOR)
NON-REPUDIATION
DATE TIME GEO-
TIME ZONE
STAMP LOCATION
48
Data Identification, Classification, Security
by CSA
A comprehensive security assessment, a testing methodology must be adopted. Current initiatives by OWAPS
is highly recommended for each and every IoT stakeholders to implement. OWASP has published their IoT
Security Testing: ttps://www.owasp.org/index.php/IoT_Testing_Guides based on 10 categories; It is to help
testers to assess IoT devices and applications in the IoT ecosystems
IoT Security Testing should be comprehensive end-to-end. Minimum example of testing that should be
included are:
Embedded Device Security Testing
Wireless Protocol Assessments
Cloud / Web Services Testing
Firmware Security Assessments
Application Security Testing
Infrastructure Security Testing
51
1. Communications Planning
2. Physical Security Planning
3. Logical Security Planning
4. Establish baseline for Audit able behavior
5. Establish an Authentication/Authorization Plan
6. Determine critically of device(s) and/or information supported by device(s)
7. Develop deployment and bootstrap validation tests
8. Update Enterprise Architecture documentation
9. Information Sharing Plan
10. Establish privacy requirements and controls
11. Establish a safety requirements and mitigations
53
development of products, systems or services. May declare in its marketing for professional
integrity and a “duty of care” to customers. IoTSF provides a user mark for organisations which
follow its guidelines which can be used without cost at their discretion.
❖ As part of the product/technology/service development process - to assess the
security posture of its own suppliers.
❖ For procuring products, systems and services from a supplier which declares it has used
the Framework may audit the evidence assembled, using either internal resources or a Trusted
Third Party (“T3P”). A T3P - where the documented evidence would expose sensitive
information such as intellectual property or commercial aspects.
❖ In future, for audit process - lead to the Framework-user being permitted to use a “Trust
Class 0: where compromise to the data generated or level of control provided is likely to result in
little discernible impact on an individual or organisation.
Class 1: where compromise to the data generated or level of control provided is likely to result in
no more than limited impact on an individual or organisation.
Class 2: in addition to class 1, the device is designed to resist attacks on availability that would
have significant impact an individual or organisation, or impact many individuals, for example by
limiting operations of an infrastructure to which it is connected.
Class 3: in addition to class 2, the device is designed to protect sensitive data including sensitive
personal data.
Class 4: in addition to class 3, where the data generated or level of control provided or in the
event of a security breach have the potential to affect critical infrastructure or cause personal
injury.
56
IOTSF Compliance Class Levels of
integrity, availability and confidentiality
Integrity
o Basic - resist low level threat sources (TS) - little capability and priority
o Medium - resist medium level TS - very little, focused capability, researchers with significant capability
o High - resist substantial level threat sources
Availability
o Basic - lack of availability - cause minor disruption
o Medium –lack of availability - limited impact
o High – lack of availability - significant impact
Confidentiality
o Basic – processing public information
o Medium – sensitive information - Personally Identifiable Information - compromise limited impact
o High - very sensitive information - sensitive personal data - compromise - significant impact
58
IOT Security Audit – Using IOTSF
Compliance Framework – 13 Major Clauses
Business Security Processes and Responsibility
Device Hardware & Physical Security
Device Application
Device Operating System
Device Wired and Wireless Interfaces
Authentication and Authorisation
Encryption and Key Management for Hardware
Web User Interface
Mobile Application
Privacy
Cloud and Network Elements
Secure Supply Chain and Production
Configuration
IOTSF – Example - 2.3.3 Compliance 59
Applicability - Device Application
1.
Compliance
Req. No Requirement Class Category Applicability
A-Consumer B-Enterprise Response Evidence
2.3.3.1 The product has measures to prevent 1 and Mandatory TBD in Compliance/Partial Link to
unauthenticated software and files being above future Compliance/Non- Evidence
loaded onto it. In the event that the product is release Compliance
intended to allow un-authenticated software,
such software should only be run with limited
permissions and/or sandbox.
2.3.3.2 Where remote software upgrade can be 2 and Advisory
supported by the device, when vulnerabilities above
are discovered, the software fix for the device
is promptly made available.
60
Summary
Ariffuddin Aizuddin
ariffuddin.aizuddin@gmail.com
+60133862831