IoT security from edge to cloud

IOT SECURITY FROM EDGE TO CLOUD

Best practices to enable ioT applications that are trusted and secured from end to end

IoT security from edge to cloud

The IoT ecosystem is composed of many standards, vendors using different hardware, software and third-party services and APIs. This huge fragmentation makes the ecosystem very vulnerable to all sorts of attacks, both at the edge and in the cloud. This is why it is important to consider edge to cloud security. 

To achieve IoT security, we need to establish solid solutions for device discovery with secure identity, authentication and encrypted communications or the underline protocols are subject to abuse.

What are the challenges of IoT security?

The IoT ecosystem is composed of many standards, vendors using different hardware, software and third-party services and APIs. This huge fragmentation makes the ecosystem very vulnerable to all sorts of attacks, both at the Edge and in the Cloud.

Often companies make important mistakes when planning IoT solutions, for example:

  • Use of hardware and software without built-in security features to prevent root access
  • Transmission of not encrypted data
  • Lack of tools to perform devices updates (also from remote)
  • Hard-coded credentials
  • No integrity check of the software and OS installed on edge devices
  • API tokens not encrypted
  • Not proper authentication and authorization systems
IoT security issues at the edge
IoT security issues on the cloud

To achieve IoT security, we need to establish solid solutions for device discovery with secure identity, authentication and encrypted communications or the underline protocols are subject to abuse.

How to secure IoT devices: edge to cloud security best practices

Best practices need to consider the specific aspects of distributed mobile systems and devices. We need a secure execution environment for all devices and the IoT integration platform, as well as secure software management distribution. Above all, connected devices and the IoT platform must have a validated identity. To achieve this, we must:

  • Build solution based on open and industry standard
  • Leverage proven security technology and partnership
  • Include security, scalability and resilience in the design from day one
  • Identify each connected node and unique ID and credentials
  • Mutually authenticate nodes in the IoT infrastructure
  • Encrypt all communication to protect data
  • Implement controls for automatic revocation of certificates
  • Digitally sign all communications over an encrypted channel
  • Digitally sign software and configuration to ensure integrity and authenticity of the systems
  • Role-Based Access Control (RBAC)

IoT security by design

As described before, IoT security must be designed from day one. The illustration below shows how the architecture of an IoT Solution can be divided into three layers:

Eurotech's edge-to-cloud IoT security

Device level security

Security mechanisms are an integral component of the Everyware Software Framework (ESF), which in turn is embedded in the IoT Gateway.

The ESF architecture is based on different software layers. The OSGi (Open Services Gateway Initiative) layer provides a good foundation for securely managing software components (signed bundles). ESF ensures that strict Java and OSGi security policies are enforced at runtime and verifies that only software signed by the approved authorities is installed and enabled.

The ESF Security layer encapsulates all the security features and it is supplemented by other measures like secure boot, appropriate hardware design and other measures, thereby ensuring proper protection of the solution on the Edge.

An operation overview of the ESF security can be found here.

Moreover, maintains a list of security guidelines to be followed when hardening an IoT device for a production deployment. The guidelines are compiled following the recommendation of Industry Standards such the Center of Internet Security (CIS) and the IEC 62443. The Eurotech hardening guidelines are available here.

Edge security

IoT security at the communication level

Eurotech supports different protocols, but we advocate the use of MQTT (Message Queue Telemetry Transport), which is a lightweight protocol optimized for IoT device communications:

  • All MQTT traffic is originated from the gateway and encrypted over an SSL connection
  • All console accesses are exclusively available over an encrypted HTTPS connection
  • All REST API accesses are exclusively available over an encrypted HTTPS connection
  • Robust authentication is enabled by strong, well-understood technologies like X.509 Certificates and encrypted credentials
  • Device management messages published by the IoT Platform are signed to guarantee authenticity and message integrity
IoT communication security

IoT cloud security

Everyware Cloud unites the operational technology (OT) domain and the information technology (IT) domain, which means that it is the single, most important interface. A success attack would enable access to the enterprise environment. Everyware Cloud also functions as an M2M / IoT integration platform that acts like an operating system for the infrastructure.

On the operational technology side it provides all the data, device and embedded application management required to deploy and maintain distributed intelligent systems in the field. This schematic indicates how security is embedded in Everyware Cloud.

Cloud security
  • Security mechanisms in the cloud ensure that authorized traffic is secure and authenticated
  • It employs firewalls, so all in-bound ports other than broker ports are closed and secure (encrypted and authenticated)
  • Device authentication uses strong username/password credentials or a per device certificate
  • Security mechanisms in the cloud ensure that authorized traffic is secure and authenticated
  • It employs firewalls, so all in-bound ports other than broker ports are closed and secure (encrypted and authenticated)
  • Device authentication uses strong username/password credentials or a per-device certificate
  • Each device can be automatically provisioned during first activation with a secure, randomized, device-specific password. In addition, the device credentials can be strongly tied to a specific device so the IoT Integration Platform will refuse authentication requests with the same credentials from a different device
  • The device authorization policy can further restrict the device data communication limiting the MQTT topics that the device can publish to and blocking device to device communication
  • Access control is centralized and authenticated via HTTPS / SSL
  • Role-based access control is employed as well as user management and roles and permissions. A strict segregation of tenants down to a data level is another important element ensuring that other parties cannot access data and infrastructure
  • Logins to Everyware Console can be further protected using a Two Factor Authentication (2FA)

White Paper: Secure IoT begins with Zero-Touch Provisioning at scale

What's the largest roadblock to realizing the promise of the Internet of Things? For many organizations, the obstacle delaying widespread deployments is the strategy for onboarding the necessary edge resources for a lifetime of secure operation. This paper presents the solution offered by Infineon Technologies, GlobalSign, Eurotech and Microsoft to address the complex task of the onboarding of edge devices to the cloud application infrastructure. 

DOWNLOAD THE WHITE PAPER

IoT Edge security
This website or third-party tools used in it uses cookies useful for the proper functioning of the site and for the purposes described in the cookie policy. If you want to learn more or opt out of all or some cookies, see the
cookie policy
By closing this banner, scrolling this page, clicking on a link or continuing navigation in any other way, you allow the use of cookies.
agree