Contents

Foreword

Introduction

Part IIntroduction to the Internet of Things (IoT) and IoT Security

Chapter 1      Evolution of the Internet of Things (IoT)

Defining the Internet of Things

Making Technology and Architectural Decisions

Is the Internet of Things Really So Vulnerable?

Summary

References

Chapter 2     Planning for IoT Security

The Attack Continuum

The IoT System and Security Development Lifecycle

Phase 1: Initiation

Phase 2: Acquisition and Development

Phase 3: Implementation

Phase 4: Operations and Maintenance

Phase 5: Disposition

The End-to-End Considerations

Segmentation, Risk, and How to Use Both in Planning the Consumer/Provider Communications Matrix

Segmentation

New Approach

Summary

References

Chapter 3     IoT Security Fundamentals

The Building Blocks of IoT

The IoT Hierarchy

Primary Attack Targets

Layered Security Tiers

Summary

References

Chapter 4     IoT and Security Standards and Best Practices

Today’s Standard Is No Standard

Defining Standards

The Challenge with Standardization

IoT “Standards” and “Guidance” Landscape

Architectural or Reference Standards

Industrial/Market Focused

Standards for NFV, SDN, and Data Modeling for Services

Data Modeling and Services

Communication Protocols for IoT

Physical and MAC Layers

Network Layer

Transport Layer

Application Layer

Specific Security Standards and Guidelines

Summary

References

Chapter 5     Current IoT Architecture Design and Challenges

What, Why, and Where? A Summary

Approaches to IoT Architecture Design

An X-Centric Approach

The People-/User-Centric IoT Approach (Internet of People and Social IoT)

The Information-Centric IoT Approach

The Data-Centric IoT Approach

System Viewpoint: A Cloudy Perspective

Cloud Computing

Fog/Edge Computing

Middleware

Lambda Architecture

Full IoT Stack/Universal

General Approaches

Internet of Things Architecture Reference Architecture (IoT-A RA)

ITU-T Y.2060

IoT World Forum (IoTWF) Reference Model

oneM2M Reference Architecture

IEEE P2413 IoT Architecture

The OpenFog Consortium Reference Architecture

Alliance for the Internet of Things Innovation (AIOTI)

Cloud Customer Architecture for IoT

Open Connectivity Foundation and IoTivity

Industrial/Market Focused

The Industrial Internet Consortium (IIC)

Industry 4.0

OPC Unified Architecture (OPC UA)

Cisco and Rockwell Automation Converged Plantwide Ethernet

Cisco Smart Grid Reference Model: GridBlocks

NFV- and SDN-Based Architectures for IoT

Approaches to IoT Security Architecture

Purdue Model of Control Hierarchy Reference Model

Industrial Internet Security Framework (IISF) IIC Reference Architecture

Cloud Security Alliance Security Guidance for IoT

Open Web Application Security Project (OWASP)

Cisco IoT Security Framework

The IoT Platform Design of Today

Security for IoT Platforms and Solutions

Challenges with Today’s Designs: The Future for IoT Platforms

Summary

References

Part IILeveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT

Chapter 6     Evolution and Benefits of SDX and NFV Technologies and Their Impact on IoT

A Bit of History on SDX and NFV and Their Interplay

Software-Defined Networking

OpenFlow

Open Virtual Switch

Vector Packet Processing

Programming Protocol-Independent Packet Processors (P4)

OpenDaylight

Extending the Concept of Software-Defined Networks

Network Functions Virtualization

Virtual Network Functions and Forwarding Graphs

ETSI NFV Management and Orchestration (MANO)

The Impact of SDX and NFV in IoT and Fog Computing

Summary

References

Chapter 7     Securing SDN and NFV Environments

Security Considerations for the SDN Landscape

1: Securing the Controller

Securing the Controller Application

Securing the Underlying Operating System

Securing the Controller East-West Communications

2: Securing Controller Southbound Communications

Authentication and Encryption

Leveraging Inherent Protocol Security Options

Revocation

Checks and Balances

3: Securing the Infrastructure Planes

Operations

Management Plane

Control Plane

Data Plane

4: Securing Controller Northbound Communications

API/REST Authentication

Authorization

Nonrepudiation

5: Securing Management and Orchestration

6: Securing Applications and Services

Security Considerations for the NFV Landscape

NFV Threat Landscape

Secure Boot

Secure Crash

Private Keys Within Cloned Images

Performance Isolation

Tenant/User Authentication, Authorization, and Accounting (AAA)

Authenticated Time Service

Back Doors with Test and Monitor Functions

Multi-administrator Isolation

Single Root I/O Virtualization (SRIOV)

SRIOV Security Concerns

Summary

References

Chapter 8     The Advanced IoT Platform and MANO

Next-Generation IoT Platforms: What the Research Says

Next-Generation IoT Platform Overview

Platform Architecture

Platform Building Blocks

Platform Intended Outcomes: Delivering Capabilities as an Autonomous End-to-End Service

Model-Driven and Service-Centric

Service Chaining

Contextual Automation

Example Use Case Walkthrough

Event-Based Video and Security Use Case

Preparatory Work

Deploying the Use Case

The Use Case in Action

Summary

References

Part IIISecurity Services: For the Platform, by the Platform

Chapter 9     Identity, Authentication, Authorization, and Accounting

Introduction to Identity and Access Management for the IoT

Device Provisioning and Access Control Building Blocks

Naming Conventions to Establish “Uniqueness”

Secure Bootstrap

Immutable Identity

Bootstrapping Remote Secure Key Infrastructures

Device Registration and Profile Provisioning

Provisioning Example Using AWS IoT

Provisioning Example Using Cisco Systems Identity Services Engine

Access Control

Identifying Devices

Endpoint Profiling

Profiling Using ISE

Device Sensor

Methods to Gain Identity from Constrained Devices

Energy Limitations

Strategy for Using Power for Communication

Leveraging Standard IoT Protocols to Identify Constrained Devices

CoAP

MQTT

Authentication Methods

Certificates

X.509

IEEE 1609.2

Private Key Infrastructure

Trust Stores

Revocation Support

CRL

OCSP

SSL Pinning

Passwords

Limitations for Constrained Devices

Biometrics

TouchID

Face ID

Risk Factor

AAA and RADIUS

A/V Pairs

802.1X

MAC Address Bypass

Flexible Authentication

Dynamic Authorization Privileges

Cisco Identity Services Engine and TrustSec

RADIUS Change of Authorization

CoA Requests

CoA Request/Response Code

Session Identification

CoA Request Commands

VLAN

Access Control Lists

TrustSec and Security Group Tags

The Security Group Tag

Software Defined

Dynamic Segmentation Based on RBAC

TrustSec Enablement

Classification

Propagation

Inline Tagging Mediums (Ethernet and L3 Crypto)

Enforcement

SGACL

Consumer/Provider Matrix

SGACL for North–South and East–West

Automation of SGACLs and Dynamic Segmentation

Manufacturer Usage Description

Finding a Policy

Policy Types

The MUD Model

AWS Policy-based Authorization with IAM

Amazon Cognito

AWS Use of IAM

Policy-based Authorization

Accounting

How Does Accounting Relate to Security?

Using a Guideline to Create an Accounting Framework

Meeting User Accounting Requirements

Scaling IoT Identity and Access Management with Federation Approaches

IoT IAM Requirements

OAuth 2.0 and OpenID Connect 1.0

OAuth 2.0

OpenID Connect 1.0

OAuth2.0 and OpenID Connect Example for IoT

Cloud to Cloud

Native Applications to the Cloud

Device to Device

Evolving Concepts: Need for Identity Relationship Management

Summary

References

Chapter 10   Threat Defense

Centralized and Distributed Deployment Options for Security Services

Centralized

Components

Distributed

Hybrid

Fundamental Network Firewall Technologies

ASAv

NGFWv

Network Address Translation

Dynamic NAT

Static NAT

Overlapping

Overloading or Port Address Translation

Packet Filtering

Industrial Protocols and the Need for Deeper Packet Inspection

Common Industrial Protocol

Lack of Security

Potential Solutions: Not Good Enough

Alternative Solution: Deep Packet Inspection

Sanity Check

User Definable

Applying the Filter

Application Visibility and Control

Industrial Communication Protocol Example

MODBUS Application Filter Example

Intrusion Detection System and Intrusion Prevention System

IPS

Pattern Matching

Protocol Analysis

IDS/IPS Weakness

Advanced Persistent Threats and Behavioral Analysis

Behavior Analysis Solutions

Protocols Used to Gain Additional Visibility

NetFlow

Flexible NetFlow

Network-Based Application Recognition

Network Security Event Logging

Network as a Sensor

Algorithms for Security Events

Pairing with Contextual Information and Adaptive Network Control

Cisco TrustSec Fields in Flexible NetFlow

Anomaly Detection Example

Encrypted Traffic Analytics

Detecting Threats Using Encrypted Traffic Analytics

Crypto Compliance

WannaCry Example

Malware Protection and Global Threat Intelligence

Cisco Advanced Malware Protection and TALOS

Point-in-Time Detection, Retrospective Security, and Sandboxing

Example of How the Firewall Uses the Malware Feature

File Policy

DNS-Based Security

Umbrella (DNS Security + Intelligent Proxy)

Intelligent Proxy

Umbrella + AMP Threat Grid

Using Umbrella to Help Protect Healthcare

Centralized Security Services Deployment Example Using NSO, ESC, and OpenStack

ETSI MANO Components in the Use Case

VMs (Services) Being Instantiated in the Use Case

Use Case Explanation

Activation Sequence Basics and NSO Service Creation (VNFD, NSD, and NSR)

Activation Sequence Example

Fulfillment and Assurance Sequences Basics

Monitoring and KPI

Prerequisites for Monitoring

Metrics and Actions and Dynamic Mapping

Dynamic Mapping in the Data Model

Monitoring Methods

Fulfillment and Assurance Sequence Examples

KPI

Rules

Distributed Security Services Deployment Example Using Cisco Network Function Virtualization Infrastructure Software (NFVIS)

Solution Components

NFVIS

Hardware

Supported VMs

Orchestration

vBranch Function Pack

Service Chaining and Traffic Flow

Summary

References

Chapter 11   Data Protection in IoT

Data Lifecycle in IoT

Data at Rest

Data Warehouses

Data Lakes

Data in Use

Data on the Move

Protecting Data in IoT

Data Plane Protection in IoT

Message Queuing Telemetry Transport Protocol

Authentication in MQTT

Authorization in MQTT

Confidentiality in MQTT

Integrity in MQTT

Availability in MQTT

Nonrepudiation in MQTT

RabbitMQ

Authentication in RabbitMQ

Authorization in RabbitMQ

Confidentiality in RabbitMQ

Integrity in RabbitMQ

Availability in RabbitMQ

Other Considerations Related to Data Availability in RabbitMQ

Nonrepudiation in RabbitMQ

Example: Orchestrated Security on RabbitMQ at the Fog Node Level

Cisco Edge and Fog Processing Module (EFM)

Data Virtualization: Enabling Single Query Models in IoT

Protecting Management Plane Data in IoT

Protecting Control Plane Data

Considerations When Planning for Data Protection

Summary

References

Chapter 12   Remote Access and Virtual Private Networks (VPN)

Virtual Private Network Primer

Focus for This Chapter

Site-to-Site IPsec VPN

IPsec Overview

Authentication Header (AH)

Encapsulating Security Payload (ESP)

Internet Key Exchange (IKE) Overview

IKEv1 Phase 1

Authentication Method

Diffie-Hellman (D-H) Groups

Encryption Algorithms

Hashing Algorithms

IKE Modes (Main and Aggressive)

Aggressive Mode

IKEv1 Phase 2

NAT-Traversal (NAT-T)

Perfect Forward Secrecy (PFS)

Internet Key Exchange Protocol Version 2

IKEv2 Exchange

Benefits of IKEv2 over IKEv1

Software-Defined Networking-Based IPsec Flow Protection IETF Draft

IPsec Databases

Use Case: IKE/IPsec Within the NSF

Interface Requirements

Multiple Security Controllers

Applying SDN-Based IPsec to IoT

Leveraging SDN for Dynamic Decryption (Using IKE for Control Channels and IPsec for Data Channels)

Software-Based Extranet Using Orchestration and NFV

Traditional Approach

Automating Extranet Using Orchestration Techniques and NFV

Software-Based Extranet Use Case

Remote Access VPN

SSL-Based Remote Access VPN

SSL VPN for Multiple Solutions

Reverse Proxy

Clientless and Thin Client VPN

Tunnel Groups and Group Policies

Clientless Components

Clientless Portal

Application Access (Bookmarks, Port Forwarding, Smart Tunnels)

Dynamic Access Policy

Clientless Example for IoT: Oil and Gas

Client Based: Cisco AnyConnect Secure Mobility Client

Cisco AnyConnect

Deployment

Configuration Choices

Modules

VPN Module

Network Access Manager Module

Endpoint Compliance Module

Roaming Protection Module

Network Visibility Module

Threat Protection Module

Using AnyConnect in Manufacturing: Use Case Example

Use Case

Working Components

Summary

References

Chapter 13   Securing the Platform Itself

(A) Visualization Dashboards and Multitenancy

(B) Back-End Platform

Scenario 1: A New Endpoint Needs to Be Connected to the Network

Scenario 2: A User Wants to Deploy a New Service Across the Fog, Network, and Data Center Infrastructure

Scenario 3: Creating New Data Topics and Enabling Data Sharing Across Tenants

Docker Security

Kubernetes Security and Best Practices

(C) Communications and Networking

(D) Fog Nodes

(E) End Devices or “Things”

Summary

References

Part IVUse Cases and Emerging Standards and Technologies

Chapter 14   Smart Cities

Use Cases Introduction

The Evolving Technology Landscape for IoT

The Next-Generation IoT Platform for Delivering Use Cases Across Verticals: A Summary

Smart Cities

Smart Cities Overview

The IoT and Secure Orchestration Opportunity in Cities

Security in Smart Cities

Smart Cities Example Use Cases

Use Case Automation Overview and High-Level Architecture

Power Monitoring and Control Use Case: Secure Lifecycle Management of Applications in the Fog Nodes

Access Control and Sensor Telemetry of City Cabinets: Simple and Complex Sensor Onboarding

Sensor Access Control

Event-Based Video: Secure Data Pipeline and Information Exchange

Public Service Connectivity on Demand: Secure User Access and Behavioral Analysis

Emergency Fleet Integration

Automated Deployment of the Use Cases

Summary

References

Chapter 15   Industrial Environments: Oil and Gas

Industry Overview

The IoT and Secure Automation Opportunity in Oil and Gas

The Upstream Environment

Overview, Technologies, and Architectures

Digitization and New Business Needs

Challenges

The Midstream Environment

Overview, Technologies, and Architectures

Digitization and New Business Needs

Challenges

The Downstream and Processing Environments

Overview, Technologies, and Architectures

Digitization and New Business Needs

Challenges

Security in Oil and Gas

Oil and Gas Security and Automation Use Cases: Equipment Health Monitoring and Engineering Access

Use Case Overview

Use Case Description

Deploying the Use Case

Preconfiguration Checklist

Automated Deployment of the Use Cases

Securing the Use Case

Security Use Case #1: Identifying, Authenticating, and Authorizing the Sensor for Network Use

Security Use Case #2: Detecting Anomalous Traffic with Actionable Response

Power of SGT as a CoA

Auto-Quarantine Versus Manual Quarantine

Security Use Case #3: Ensuring That Contractors and Employees Adhere to Company Policy (Command Validation)

Leveraging Orchestrated Service Assurance to Monitor KPIs

Security Use Case #4: Securing the Data Pipeline

Evolving Architectures to Meet New Use Case Requirements

Summary

References

Chapter 16   The Connected Car

Connected Car Overview

The IoT and Secure Automation Opportunity for Connected Cars

The Evolving Car Architecture

Security for Connected Cars

Connected Car Vulnerabilities and Security Considerations

Connected Car Security and Automation Use Case

Use Case Overview

Use Case Automation Overview

Secure Access/Secure Platform: Boundary Firewall for OTA Secure Updates

Secure Network: Segmentation, Zones, and Interzone Communication

Secure Content: Intrusion Detection and Prevention

Secure Intelligence: Secure Internet Access from the Vehicle

The Future: Personalized Experience Based on Identity

Federal Sigma VAMA: Emergency Fleet Solution

Automated Deployment of the Use Case

Summary

References

Chapter 17   Evolving Concepts That Will Shape the Security Service Future

A Smarter, Coordinated Approach to IoT Security

Blockchain Overview

Blockchain for IoT Security

Machine Learning and Artificial Intelligence Overview

Machine Learning

Deep Learning

Natural Language Processing and Understanding

Neural Networks

Computer Vision

Affective Computing

Cognitive Computing

Contextual Awareness

Machine Learning and Artificial Intelligence for IoT Security

Summary

References

Index

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.144.243.184