• Internet of Things (IoT) security architecture


    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 1/17
    Internet of Things (IoT) security
    architecture
    10/09/2018 • 24 minutes to read •
    In this article
    Security starts with a threat model
    Security in IoT
    Performing threat modeling for the Azure IoT reference architecture
    Additional resources
    See also
    When designing a system, it is important to understand the potential threats to that
    system, and add appropriate defenses accordingly, as the system is designed and
    architected. It is important to design the product from the start with security in mind
    because understanding how an attacker might be able to compromise a system helps
    make sure appropriate mitigations are in place from the beginning.
    Security starts with a threat model
    Microsoft has long used threat models for its products and has made the company’s
    threat modeling process publicly available. The company experience demonstrates that
    the modeling has unexpected benefits beyond the immediate understanding of what
    threats are the most concerning. For example, it also creates an avenue for an open
    discussion with others outside the development team, which can lead to new ideas and
    improvements in the product.
    The objective of threat modeling is to understand how an attacker might be able to
    compromise a system and then make sure appropriate mitigations are in place. Threat
    modeling forces the design team to consider mitigations as the system is designed
    rather than after a system is deployed. This fact is critically important, because
    retrofitting security defenses to a myriad of devices in the field is infeasible, error prone
    and leaves customers at risk.
    Many development teams do an excellent job capturing the functional requirements for
    the system that benefit customers. However, identifying non-obvious ways that
    someone might misuse the system is more challenging. Threat modeling can help
    development teams understand what an attacker might do and why. Threat modeling is
    a structured process that creates a discussion about the security design decisions in the
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 2/17
    system, as well as changes to the design that are made along the way that impact
    security. While a threat model is simply a document, this documentation also represents
    an ideal way to ensure continuity of knowledge, retention of lessons learned, and help
    new team onboard rapidly. Finally, an outcome of threat modeling is to enable you to
    consider other aspects of security, such as what security commitments you wish to
    provide to your customers. These commitments in conjunction with threat modeling
    inform and drive testing of your Internet of Things (IoT) solution.
    When to do threat modeling
    Threat modeling offers the greatest value when you incorporate it into the design
    phase. When you are designing, you have the greatest flexibility to make changes to
    eliminate threats. Eliminating threats by design is the desired outcome. It is much easier
    than adding mitigations, testing them, and ensuring they remain current and moreover,
    such elimination is not always possible. It becomes harder to eliminate threats as a
    product becomes more mature, and in turn ultimately requires more work and a lot
    harder tradeoffs than threat modeling early on in the development.
    What to consider for threat modeling
    You should look at the solution as a whole and also focus on the following areas:
    The security and privacy features
    The features whose failures are security relevant
    The features that touch a trust boundary
    Who performs threat modeling
    Threat modeling is a process like any other. It is a good idea to treat the threat model
    document like any other component of the solution and validate it. Many development
    teams do an excellent job capturing the functional requirements for the system that
    benefit customers. However, identifying non-obvious ways that someone might misuse
    the system is more challenging. Threat modeling can help development teams
    understand what an attacker might do and why.
    How to perform threat modeling
    The threat modeling process is composed of four steps; the steps are:
    Model the application
    Enumerate Threats
    Mitigate threats
    Validate the mitigations
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 3/17
    The process steps
    Three rules of thumb to keep in mind when building a threat model:
    1. Create a diagram out of reference architecture.
    2. Start breadth-first. Get an overview, and understand the system as a whole, before
    deep-diving. This approach helps ensure that you deep-dive in the right places.
    3. Drive the process, don’t let the process drive you. If you find an issue in the
    modeling phase and want to explore it, go for it! Don’t feel you need to follow
    these steps slavishly.
    Threats
    The four core elements of a threat model are:
    Processes such as web services, Win32 services, and *nix daemons. Some complex
    entities (for example field gateways and sensors) can be abstracted as a process
    when a technical drill-down in these areas is not possible.
    Data stores (anywhere data is stored, such as a configuration file or database)
    Data flow (where data moves between other elements in the application)
    External Entities (anything that interacts with the system, but is not under the
    control of the application, examples include users and satellite feeds)
    All elements in the architectural diagram are subject to various threats; this article the
    STRIDE mnemonic. Read Threat Modeling Again, STRIDE to know more about the
    STRIDE elements.
    Different elements of the application diagram are subject to certain STRIDE threats:
    Processes are subject to STRIDE
    Data flows are subject to TID
    Data stores are subject to TID, and sometimes R, when the data stores are log files.
    External entities are subject to SRD
    Security in IoT
    Connected special-purpose devices have a significant number of potential interaction
    surface areas and interaction patterns, all of which must be considered to provide a
    framework for securing digital access to those devices. The term “digital access” is used
    here to distinguish from any operations that are carried out through direct device
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 4/17
    interaction where access security is provided through physical access control. For
    example, putting the device into a room with a lock on the door. While physical access
    cannot be denied using software and hardware, measures can be taken to prevent
    physical access from leading to system interference.
    As you explore the interaction patterns, look at “device control” and “device data” with
    the same level of attention. “Device control” can be classified as any information that is
    provided to a device by any party with the goal of changing or influencing its behavior
    towards its state or the state of its environment. “Device data” can be classified as any
    information that a device emits to any other party about its state and the observed
    state of its environment.
    In order to optimize security best practices, it is recommended that a typical IoT
    architecture is divided into several component/zones as part of the threat modeling
    exercise. These zones are described fully throughout this section and include:
    Device,
    Field Gateway,
    Cloud gateways, and
    Services.
    Zones are broad way to segment a solution; each zone often has its own data and
    authentication and authorization requirements. Zones can also be used to isolation
    damage and restrict the impact of low trust zones on higher trust zones.
    Each zone is separated by a Trust Boundary, which is noted as the dotted red line in the
    following diagram. It represents a transition of data/information from one source to
    another. During this transition, the data/information could be subject to Spoofing,
    Tampering, Repudiation, Information Disclosure, Denial of Service and Elevation of
    Privilege (STRIDE).
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 5/17
    The components depicted within each boundary are also subjected to STRIDE, enabling
    a full 360 threat modeling view of the solution. The following sections elaborate on
    each of the components and specific security concerns and solutions that should be put
    into place.
    The following sections discuss standard components typically found in these zones.
    The device zone
    The device environment is the immediate physical space around the device where
    physical access and/or “local network” peer-to-peer digital access to the device is
    feasible. A “local network” is assumed to be a network that is distinct and insulated from
    – but potentially bridged to – the public Internet, and includes any short-range wireless
    radio technology that permits peer-to-peer communication of devices. It does not
    include any network virtualization technology creating the illusion of such a local
    network and it does also not include public operator networks that require any two
    devices to communicate across public network space if they were to enter a peer-topeer communication relationship.
    The field gateway zone
    Field gateway is a device/appliance or some general-purpose server computer software
    that acts as communication enabler and, potentially, as a device control system and
    device data processing hub. The field gateway zone includes the field gateway itself and
    all devices that are attached to it. As the name implies, field gateways act outside
    dedicated data processing facilities, are usually location bound, are potentially subject
    to physical intrusion, and has limited operational redundancy. All to say that a field
    gateway is commonly a thing one can touch and sabotage while knowing what its
    function is.
    A field gateway is different from a mere traffic router in that it has had an active role in
    managing access and information flow, meaning it is an application addressed entity
    and network connection or session terminal. An NAT device or firewall, in contrast, does
    not qualify as field gateways since they are not explicit connection or session terminals,
    but rather a route (or block) connections or sessions made through them. The field
    gateway has two distinct surface areas. One faces the devices that are attached to it and
    represents the inside of the zone, and the other faces all external parties and is the edge
    of the zone.
    The cloud gateway zone
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 6/17
    A cloud gateway is a system that enables remote communication from and to devices
    or field gateways from several different sites across public network space, typically
    towards a cloud-based control and data analysis system, a federation of such systems.
    In some cases, a cloud gateway may immediately facilitate access to special-purpose
    devices from terminals such as tablets or phones. In the context discussed here, “cloud”
    is meant to refer to a dedicated data processing system that is not bound to the same
    site as the attached devices or field gateways. Also in a Cloud Zone, operational
    measures prevent targeted physical access and are not necessarily exposed to a “public
    cloud” infrastructure.
    A cloud gateway may potentially be mapped into a network virtualization overlay to
    insulate the cloud gateway and all of its attached devices or field gateways from any
    other network traffic. The cloud gateway itself is not a device control system or a
    processing or storage facility for device data; those facilities interface with the cloud
    gateway. The cloud gateway zone includes the cloud gateway itself along with all field
    gateways and devices directly or indirectly attached to it. The edge of the zone is a
    distinct surface area where all external parties communicate through.
    The services zone
    A “service” is defined for this context as any software component or module that is
    interfacing with devices through a field- or cloud gateway for data collection and
    analysis, as well as for command and control. Services are mediators. They act under
    their identity towards gateways and other subsystems, store and analyze data,
    autonomously issue commands to devices based on data insights or schedules and
    expose information and control capabilities to authorized end users.
    Information-devices versus special-purpose devices
    PCs, phones, and tablets are primarily interactive information devices. Phones and
    tablets are explicitly optimized around maximizing battery lifetime. They preferably turn
    off partially when not immediately interacting with a person, or when not providing
    services like playing music or guiding their owner to a particular location. From a
    systems perspective, these information technology devices are mainly acting as proxies
    towards people. They are “people actuators” suggesting actions and “people sensors”
    collecting input.
    Special-purpose devices, from simple temperature sensors to complex factory
    production lines with thousands of components inside them, are different. These
    devices are much more scoped in purpose and even if they provide some user interface,
    they are largely scoped to interfacing with or be integrated into assets in the physical
    world. They measure and report environmental circumstances, turn valves, control
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 7/17
    servos, sound alarms, switch lights, and do many other tasks. They help to do work for
    which an information device is either too generic, too expensive, too large, or too
    brittle. The concrete purpose immediately dictates their technical design as well the
    available monetary budget for their production and scheduled lifetime operation. The
    combination of these two key factors constrains the available operational energy
    budget, physical footprint, and thus available storage, compute, and security
    capabilities.
    If something “goes wrong” with automated or remote controllable devices, for example,
    physical defects or control logic defects to willful unauthorized intrusion and
    manipulation. The production lots may be destroyed, buildings may be looted or
    burned down, and people may be injured or even die. This is a whole different class of
    damage than someone maxing out a stolen credit card's limit. The security bar for
    devices that make things move, and also for sensor data that eventually results in
    commands that cause things to move, must be higher than in any e-commerce or
    banking scenario.
    Device control and device data interactions
    Connected special-purpose devices have a significant number of potential interaction
    surface areas and interaction patterns, all of which must be considered to provide a
    framework for securing digital access to those devices. The term “digital access” is used
    here to distinguish from any operations that are carried out through direct device
    interaction where access security is provided through physical access control. For
    example, putting the device into a room with a lock on the door. While physical access
    cannot be denied using software and hardware, measures can be taken to prevent
    physical access from leading to system interference.
    As you explore the interaction patterns, look at “device control” and “device data” with
    the same level of attention while threat modeling. “Device control” can be classified as
    any information that is provided to a device by any party with the goal of changing or
    influencing its behavior towards its state or the state of its environment. “Device data”
    can be classified as any information that a device emits to any other party about its
    state and the observed state of its environment.
    Performing threat modeling for the Azure IoT
    reference architecture
    Microsoft uses the framework outlined previously to do threat modeling for Azure IoT.
    The following section uses the concrete example of Azure IoT Reference Architecture to
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 8/17
    demonstrate how to think about threat modeling for IoT and how to address the
    threats identified. This example identifies four main areas of focus:
    Devices and Data Sources,
    Data Transport,
    Device and Event Processing, and
    Presentation
    The following diagram provides a simplified view of Microsoft’s IoT Architecture using a
    Data Flow Diagram model that is used by the Microsoft Threat Modeling Tool:
    It is important to note that the architecture separates the device and gateway
    capabilities. This approach enables the user to leverage gateway devices that are more
    secure: they are capable of communicating with the cloud gateway using secure
    protocols, which typically requires greater processing overhead that a native device -
    such as a thermostat - could provide on its own. In the Azure services zone, assume that
    the Cloud Gateway is represented by the Azure IoT Hub service.
    Device and data sources/data transport
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 9/17
    This section explores the architecture outlined previously through the lens of threat
    modeling and gives an overview of how to address some of the inherent concerns. This
    example focuses on the core elements of a threat model:
    Processes (both under your control and external items)
    Communication (also called data flows)
    Storage (also called data stores)
    Processes
    In each of the categories outlined in the Azure IoT architecture, this example tries to
    mitigate a number of different threats across the different stages data/information
    exists in: process, communication, and storage. Following is an overview of the most
    common ones for the “process” category, followed by an overview of how these threats
    could be best mitigated:
    Spoofing (S): An attacker may extract cryptographic key material from a device, either
    at the software or hardware level, and subsequently access the system with a different
    physical or virtual device under the identity of the device the key material has been
    taken from. A good illustration is remote controls that can turn any TV and that are
    popular prankster tools.
    Denial of Service (D): A device can be rendered incapable of functioning or
    communicating by interfering with radio frequencies or cutting wires. For example, a
    surveillance camera that had its power or network connection intentionally knocked out
    cannot report data, at all.
    Tampering (T): An attacker may partially or wholly replace the software running on the
    device, potentially allowing the replaced software to leverage the genuine identity of
    the device if the key material or the cryptographic facilities holding key materials were
    available to the illicit program. For example, an attacker may leverage extracted key
    material to intercept and suppress data from the device on the communication path
    and replace it with false data that is authenticated with the stolen key material.
    Information Disclosure (I): If the device is running manipulated software, such
    manipulated software could potentially leak data to unauthorized parties. For example,
    an attacker may leverage extracted key material to inject itself into the communication
    path between the device and a controller or field gateway or cloud gateway to siphon
    off information.
    Elevation of Privilege (E): A device that does specific function can be forced to do
    something else. For example, a valve that is programmed to open half way can be
    tricked to open all the way.
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 10/17
    Component Threat Mitigation Risk Implementation
    Device S Assigning
    identity to the
    device and
    authenticating
    the device
    Replacing
    device or
    part of the
    device with
    some other
    device. How
    do you know
    you are
    talking to the
    right device?
    Authenticating the
    device, using Transport
    Layer Security (TLS) or
    IPSec. Infrastructure
    should support using
    pre-shared key (PSK) on
    those devices that cannot
    handle full asymmetric
    cryptography. Leverage
    Azure AD, OAuth
    TRID Apply
    tamperproof
    mechanisms
    to the device,
    for example,
    by making it
    hard to
    impossible to
    extract keys
    and other
    cryptographic
    material from
    the device.
    The risk is if
    someone is
    tampering
    the device
    (physical
    interference).
    How are you
    sure, that
    device has
    not been
    tampered
    with.
    The most effective
    mitigation is a trusted
    platform module (TPM)
    capability that allows
    storing keys in special
    on-chip circuitry from
    which the keys cannot be
    read, but can only be
    used for cryptographic
    operations that use the
    key but never disclose
    the key. Memory
    encryption of the device.
    Key management for the
    device. Signing the code.
    E Having access
    control of the
    device.
    Authorization
    scheme.
    If the device
    allows for
    individual
    actions to be
    performed
    based on
    commands
    from an
    outside
    source, or
    even
    compromised
    sensors, it
    allows the
    attack to
    perform
    operations
    not otherwise
    accessible.
    Having authorization
    scheme for the device
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 11/17
    Component Threat Mitigation Risk Implementation
    Field
    Gateway
    S Authenticating
    the Field
    gateway to
    Cloud
    Gateway (such
    as cert based,
    PSK, or Claim
    based.)
    If someone
    can spoof
    Field
    Gateway,
    then it can
    present itself
    as any
    device.
    TLS RSA/PSK, IPSec, RFC
    4279. All the same key
    storage and attestation
    concerns of devices in
    general – best case is use
    TPM. 6LowPAN extension
    for IPSec to support
    Wireless Sensor
    Networks (WSN).
    TRID Protect the
    Field Gateway
    against
    tampering
    (TPM?)
    Spoofing
    attacks that
    trick the
    cloud
    gateway
    thinking it is
    talking to
    field gateway
    could result
    in
    information
    disclosure
    and data
    tampering
    Memory encryption,
    TPM’s, authentication.
    E Access control
    mechanism
    for Field
    Gateway
    Here are some examples of threats in this category:
    Spoofing: An attacker may extract cryptographic key material from a device, either at
    the software or hardware level, and subsequently access the system with a different
    physical or virtual device under the identity of the device the key material has been
    taken from.
    Denial of Service: A device can be rendered incapable of functioning or
    communicating by interfering with radio frequencies or cutting wires. For example, a
    surveillance camera that had its power or network connection intentionally knocked out
    cannot report data, at all.
    Tampering: An attacker may partially or wholly replace the software running on the
    device, potentially allowing the replaced software to leverage the genuine identity of
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 12/17
    the device if the key material or the cryptographic facilities holding key materials were
    available to the illicit program.
    Tampering: A surveillance camera that’s showing a visible-spectrum picture of an
    empty hallway could be aimed at a photograph of such a hallway. A smoke or fire
    sensor could be reporting someone holding a lighter under it. In either case, the device
    may be technically fully trustworthy towards the system, but it reports manipulated
    information.
    Tampering: An attacker may leverage extracted key material to intercept and suppress
    data from the device on the communication path and replace it with false data that is
    authenticated with the stolen key material.
    Tampering: An attacker may partially or completely replace the software running on
    the device, potentially allowing the replaced software to leverage the genuine identity
    of the device if the key material or the cryptographic facilities holding key materials
    were available to the illicit program.
    Information Disclosure: If the device is running manipulated software, such
    manipulated software could potentially leak data to unauthorized parties.
    Information Disclosure: An attacker may leverage extracted key material to inject itself
    into the communication path between the device and a controller or field gateway or
    cloud gateway to siphon off information.
    Denial of Service: The device can be turned off or turned into a mode where
    communication is not possible (which is intentional in many industrial machines).
    Tampering: The device can be reconfigured to operate in a state unknown to the
    control system (outside of known calibration parameters) and thus provide data that
    can be misinterpreted
    Elevation of Privilege: A device that does specific function can be forced to do
    something else. For example, a valve that is programmed to open half way can be
    tricked to open all the way.
    Denial of Service: The device can be turned into a state where communication is not
    possible.
    Tampering: The device can be reconfigured to operate in a state unknown to the
    control system (outside of known calibration parameters) and thus provide data that
    can be misinterpreted.
    Spoofing/Tampering/Repudiation: If not secured (which is rarely the case with
    consumer remote controls), an attacker can manipulate the state of a device
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 13/17
    anonymously. A good illustration is remote controls that can turn any TV and that are
    popular prankster tools.
    Communication
    Threats around communication path between devices, devices and field gateways, and
    device and cloud gateway. The following table has some guidance around open sockets
    on the device/VPN:
    Component Threat Mitigation Risk Implementation
    Device IoT
    Hub
    TID (D)TLS
    (PSK/RSA)
    to encrypt
    the traffic
    Eavesdropping
    or interfering
    the
    communication
    between the
    device and the
    gateway
    Security on the protocol
    level. With custom
    protocols, you need to
    figure out how to protect
    them. In most cases, the
    communication takes place
    from the device to the IoT
    Hub (device initiates the
    connection).
    Device to
    Device
    TID (D)TLS
    (PSK/RSA)
    to encrypt
    the traffic.
    Reading data
    in transit
    between
    devices.
    Tampering with
    the data.
    Overloading
    the device with
    new
    connections
    Security on the protocol
    level
    (MQTT/AMQP/HTTP/CoAP.
    With custom protocols, you
    need to figure out how to
    protect them. The
    mitigation for the DoS
    threat is to peer devices
    through a cloud or field
    gateway and have them
    only act as clients towards
    the network. The peering
    may result in a direct
    connection between the
    peers after having been
    brokered by the gateway
    External
    Entity Device
    TID Strong
    pairing of
    the external
    entity to
    Eavesdropping
    the connection
    to the device.
    Interfering the
    Securely pairing the
    external entity to the device
    NFC/Bluetooth LE.
    Controlling the operational
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 14/17
    Here are some examples of threats in this category:
    Denial of Service: Constrained devices are generally under DoS threat when they
    actively listen for inbound connections or unsolicited datagrams on a network, because
    an attacker can open many connections in parallel and not service them or service them
    slowly, or the device can be flooded with unsolicited traffic. In both cases, the device
    can effectively be rendered inoperable on the network.
    Spoofing, Information Disclosure: Constrained devices and special-purpose devices
    often have one-for-all security facilities like password or PIN protection, or they wholly
    rely on trusting the network, meaning they grant access to information when a device is
    on the same network, and that network is often only protected by a shared key. That
    means that when the shared secret to device or network is disclosed, it is possible to
    control the device or observe data emitted from the device.
    Spoofing: an attacker may intercept or partially override the broadcast and spoof the
    originator (man in the middle)
    Tampering: an attacker may intercept or partially override the broadcast and send false
    information
    Information Disclosure: an attacker may eavesdrop on a broadcast and obtain
    information without authorization Denial of Service: an attacker may jam the
    broadcast signal and deny information distribution
    Component Threat Mitigation Risk Implementation
    entity to
    the device
    Interfering the
    communication
    with the device
    Controlling the operational
    panel of the device
    (Physical)
    Field
    Gateway
    Cloud
    Gateway
    TID TLS
    (PSK/RSA)
    to encrypt
    the traffic.
    Eavesdropping
    or interfering
    the
    communication
    between the
    device and the
    gateway
    Security on the protocol
    level
    (MQTT/AMQP/HTTP/CoAP).
    With custom protocols, you
    need to figure out how to
    protect them.
    Device
    Cloud
    Gateway
    TID TLS
    (PSK/RSA)
    to encrypt
    the traffic.
    Eavesdropping
    or interfering
    the
    communication
    between the
    device and the
    gateway
    Security on the protocol
    level
    (MQTT/AMQP/HTTP/CoAP).
    With custom protocols, you
    need to figure out how to
    protect them.
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 15/17
    Storage
    Every device and field gateway has some form of storage (temporary for queuing the
    data, operating system (OS) image storage).
    Component Threat Mitigation Risk Implementation
    Device
    storage
    TRID Storage
    encryption,
    signing the
    logs
    Reading data from the
    storage (PII data),
    tampering with
    telemetry data.
    Tampering with queued
    or cached command
    control data. Tampering
    with configuration or
    firmware update
    packages while cached
    or queued locally can
    lead to OS and/or
    system components
    being compromised
    Encryption,
    message
    authentication
    code (MAC), or
    digital signature.
    Where possible,
    strong access
    control through
    resource access
    control lists
    (ACLs) or
    permissions.
    Device OS
    image
    TRID Tampering with OS
    /replacing the OS
    components
    Read-only OS
    partition, signed
    OS image,
    Encryption
    Field
    Gateway
    storage
    (queuing the
    data)
    TRID Storage
    encryption,
    signing the
    logs
    Reading data from the
    storage (PII data),
    tampering with
    telemetry data,
    tampering with queued
    or cached command
    control data. Tampering
    with configuration or
    firmware update
    packages (destined for
    devices or field
    gateway) while cached
    or queued locally can
    lead to OS and/or
    system components
    being compromised
    BitLocker
    Field
    Gateway OS
    image
    TRID Tampering with OS
    /replacing the OS
    components
    Read-only OS
    partition, signed
    OS image,
    Encryption
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 16/17
    Device and event processing/cloud gateway zone
    A cloud gateway is a system that enables remote communication from and to devices
    or field gateways from several different sites across public network space, typically
    towards a cloud-based control and data analysis system, a federation of such systems.
    In some cases, a cloud gateway may immediately facilitate access to special-purpose
    devices from terminals such as tablets or phones. In the context discussed here, “cloud”
    is meant to refer to a dedicated data processing system that is not bound to the same
    site as the attached devices or field gateways, and where operational measures prevent
    targeted physical access but is not necessarily to a “public cloud” infrastructure. A cloud
    gateway may potentially be mapped into a network virtualization overlay to insulate the
    cloud gateway and all of its attached devices or field gateways from any other network
    traffic. The cloud gateway itself is not a device control system or a processing or storage
    facility for device data; those facilities interface with the cloud gateway. The cloud
    gateway zone includes the cloud gateway itself along with all field gateways and
    devices directly or indirectly attached to it.
    Cloud gateway is mostly custom built piece of software running as a service with
    exposed endpoints to which field gateway and devices connect. As such it must be
    designed with security in mind. Follow SDL process for designing and building this
    service.
    Services zone
    A control system (or controller) is a software solution that interfaces with a device, or a
    field gateway, or cloud gateway for the purpose of controlling one or multiple devices
    and/or to collect and/or store and/or analyze device data for presentation, or
    subsequent control purposes. Control systems are the only entities in the scope of this
    discussion that may immediately facilitate interaction with people. The exceptions are
    intermediate physical control surfaces on devices, like a switch that allows a person to
    turn off the device or change other properties, and for which there is no functional
    equivalent that can be accessed digitally.
    Intermediate physical control surfaces are those where governing logic constrains the
    function of the physical control surface such that an equivalent function can be initiated
    remotely or input conflicts with remote input can be avoided – such intermediated
    control surfaces are conceptually attached to a local control system that leverages the
    same underlying functionality as any other remote control system that the device may
    be attached to in parallel. Top threats to the cloud computing can be read at Cloud
    Security Alliance (CSA) page.
    Additional resources
    2020/2/10 IoT Security Architecture | Microsoft Docs
    https://docs.microsoft.com/en-us/azure/iot-fundamentals/iot-security-architecture 17/17
    Is this page helpful?
    Yes No
    For more information, see the following articles:
    SDL Threat Modeling Tool
    Microsoft Azure IoT reference architecture
    See also
    To learn more about securing a solution created by an IoT solution accelerator, see
    Secure your IoT deployment.
    Read about IoT Hub security in Control access to IoT Hub in the IoT Hub developer
    guide.

  • 相关阅读:
    VS2005使用AjaxPro.2
    一步步教你实现富文本编辑器(第三部分)
    Ajax实现在textbox中输入内容,动态从数据库中模糊查询显示到下拉框中
    一步步教你实现跨游览器的JS日历
    2009年中国10大网络公司业绩比较
    Beautiful smile and love
    NGINX 配置404错误页面转向
    wget使用范例
    mcrypt以及mhash扩展的安装!
    linux下常用压缩格式的压缩与解压方法
  • 原文地址:https://www.cnblogs.com/mains-mandala/p/12355233.html
Copyright © 2020-2023  润新知