Practical industrial Internet of Things security a practitioner's guide for securing connected industries
This book provides you with a comprehensive understanding of Industrial IoT security; and practical methodologies to implement safe, resilient cyber-physical systems. It will help you develop a strong foundation and deeper insights on the entire gamut of securing connected industries, from the edge...
Otros Autores: | |
---|---|
Formato: | Libro electrónico |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Publishing
2018.
|
Edición: | 1st ed |
Materias: | |
Ver en Biblioteca Universitat Ramon Llull: | https://discovery.url.edu/permalink/34CSUC_URL/1im36ta/alma991009631858806719 |
Tabla de Contenidos:
- Cover
- Title Page
- Copyright and Credits
- Dedication
- Packt Upsell
- Foreword
- Contributors
- Disclaimer
- Table of Contents
- Preface
- Chapter 1: An Unprecedented Opportunity at Stake
- Defining the Industrial IoT
- Industrial IoT, Industrial Internet, and Industrie 4.0
- Consumer versus Industrial IoT
- Industrial IoT security - a business imperative
- Cybersecurity versus cyber-physical IoT security
- What is a cyber-physical system?
- Industrial "things," connectivity, and operational technologies
- Operational technology
- Machine-to-Machine
- An overview of SCADA, DCS, and PLC
- Industrial control system architecture
- ICS components and data networks
- ICS network components
- Fieldbus protocols
- IT and OT convergence - what it really means
- Industrial IoT deployment architecture
- Divergence in IT and OT security fundamentals
- Operational priorities
- Attack surface and threat actors
- Interdependence of critical infrastructures
- Industrial threats, vulnerabilities, and risk factors
- Threats and threat actors
- Vulnerabilities
- Policy and procedure vulnerabilities
- Platform vulnerabilities
- Software platform vulnerabilities
- Network vulnerability
- Risks
- Evolution of cyber-physical attacks
- Industrial IoT use cases - examining the cyber risk gap
- Energy and smart grids
- Manufacturing
- Cyberattack on industrial control systems - Stuxnet case study
- Event flow
- Key points
- Risk gap summary
- Smart city and autonomous transportation
- Healthcare and pharmaceuticals
- The ransomware attack on the healthcare enterprise - "WannaCry" case study
- Cyber risk gap summary
- Summary
- Chapter 2: Industrial IoT Dataflow and Security Architecture
- Primer on IIoT attacks and countermeasures
- Attack surfaces and attack vectors
- OWASP IoT attack surfaces
- Attack trees.
- Fault tree analysis
- Threat modeling
- STRIDE threat model
- DREAD threat model
- Trustworthiness of an IIoT system
- Industrial big data pipeline and architectures
- Industrial IoT security architecture
- Business viewpoint
- Usage viewpoint
- Functional viewpoint
- Implementation viewpoint
- IIoT architecture patterns
- Pattern 1 - Three-tier architectural model
- Pattern 2 - Layered databus architecture
- Building blocks of industrial IoT security architecture
- A four-tier IIoT security model
- Summary
- Chapter 3: IIoT Identity and Access Management
- A primer on identity and access control
- Identification
- Authentication
- Authorization
- Account management
- Distinguishing features of IAM in IIoT
- Diversity of IIoT endpoints
- Resource-constrained and brownfield considerations
- Physical safety and reliability
- Autonomy and scalability
- Event logging is a rarity
- Subscription-based models
- Increasing sophistication of identity attacks
- Risk-based access control policy
- Identity management across the device lifecycle
- Authentication and authorization frameworks for IIoT
- Password-based authentication
- Biometrics
- Multi-factor authentication
- Key-based authentication
- Symmetric keys
- Asymmetric keys
- Zero-knowledge keys
- Certificate-based authentication
- Trust models - public key infrastructures and digital certificates
- PKI certificate standards for IIoT
- ITU-T X.509
- IEEE 1609.2
- Certificate management in IIoT deployments
- Extending the OAuth 2.0 authorization framework for IoT access control
- IEEE 802.1x
- Identity support in messaging protocols
- MQTT
- CoAP
- DDS
- REST
- Monitoring and management capabilities
- Activity logging support
- Revocation support and OCSP
- Building an IAM strategy for IIoT deployment
- Risk-based policy management
- Summary.
- Chapter 4: Endpoint Security and Trustworthiness
- Defining an IIoT endpoint
- Motivation and risk-based endpoint protection
- Resource-constrained endpoint protection
- Brownfield scenario considerations
- Endpoint security enabling technologies
- IIoT endpoint vulnerabilities
- Case study - White hack exposes smart grid meter vulnerability
- Use case
- Developing the exploit
- Demonstration
- Establishing trust in hardware
- Hardware security components
- Root of trust - TPM, TEE, and UEFI
- Securing secrets, or sealing
- Endpoint identity and access control
- Initialization and boot process integrity
- Establishing endpoint trust during operations
- Secure updates
- A trustworthy execution ecosystem
- Endpoint data integrity
- Endpoint configuration and management
- Endpoint visibility and control
- Endpoint security using isolation techniques
- Process isolation
- Container isolation
- Virtual isolation
- Physical isolation
- Endpoint physical security
- Machine learning enabled endpoint security
- Endpoint security testing and certification
- Endpoint protection industry standards
- Summary
- Chapter 5: Securing Connectivity and Communications
- Definitions - networking, communications, and connectivity
- Distinguishing features of IIoT connectivity
- Deterministic behavior
- Interoperability - proprietary versus open standards
- Performance characteristics - latency, jitter, and throughput
- Legacy networks with disappearing air gaps
- Access to resource-constrained networks
- Massive transition by connecting the unconnected
- IIoT connectivity architectures
- Multi-tier IIoT-secured connectivity architecture
- Layered databus architecture
- Controls for IIoT connectivity protection
- Secure tunnels and VPNs
- Cryptography controls
- Network segmentation
- Industrial demilitarized zones.
- Boundary defense with firewalls and filtering
- Comprehensive access control
- Core and edge gateways
- Unidirectional gateway protection
- Asset discovery, visibility, and monitoring
- Physical security - the first line of defense
- Security assessment of IIoT connectivity standards and protocols
- Fieldbus protocols
- Connectivity framework standards
- Data Distribution Service
- DDS security
- oneM2M
- oneM2M security
- Open Platform Communications Unified Architecture (OPC UA)
- OPC UA security
- Web services and HTTP
- Web services and HTTP security
- Connectivity transport standards
- Transmission Control Protocol (TCP)
- TCP security
- User Datagram Protocol (UDP)
- UDP security
- MQTT and MQTT-SN
- MQTT security
- Constrained Application Protocol (CoAP)
- CoAP security
- Advanced Message Queuing Protocol (AMQP)
- Connectivity network standards
- Data link and physical access standards
- IEEE 802.15.4 WPAN
- IEEE 802.11 wireless LAN
- Cellular communications
- Wireless wide area network standards
- IEEE 802.16 (WiMAX)
- LoRaWAN
- Summary
- Chapter 6: Securing IIoT Edge, Cloud, and Apps
- Defining edge, fog, and cloud computing
- IIoT cloud security architecture
- Secured industrial site
- Secured edge intelligence
- Secure edge cloud transport
- Secure cloud services
- Cloud security - shared responsibility model
- Defense-in-depth cloud security strategy
- Infrastructure security
- Identity and access management
- Application security
- Microservice architecture
- Container security
- Credential store and vault
- Data protection
- Data governance
- Data encryption
- Key and digital certificate management
- Securing the data life cycle
- Cloud security operations life cycle
- Business continuity plan and disaster recovery
- Secure patch management
- Security monitoring.
- Vulnerability management
- Threat intelligence
- Incident response
- Secure device management
- Cloud security standards and compliance
- Case study of IIoT cloud platforms
- Case study 1 - Predix IIoT platform
- Case study 2 - Microsoft Azure IoT
- Case study 3 - Amazon AWS IoT
- Cloud security assessment
- Summary
- Chapter 7: Secure Processes and Governance
- Challenges of unified security governance
- Securing processes across the IIoT life cycle
- Business cases
- System definitions
- Development
- Deployment
- Evaluating security products
- Operations
- Understanding security roles
- Solution provider
- Hardware manufacturers
- Industry governance
- Solution owner
- Elements of an IIoT security program
- Risk assessment
- Regulatory compliance
- Security policy
- Security monitoring
- Security analysis
- Incident response and management
- Security audits
- Security maturity model
- Implementing an IIoT security program
- Establishing an IIoT security team
- Deciding on regulatory compliance
- Assessing and managing risks
- Managing third-party security
- Enforcing the security policy
- Continuous monitoring and analysis
- Conducting security training
- Implementing incident management
- Defining security audits
- Security revisions and maturity
- Summary
- Chapter 8: IIoT Security Using Emerging Technologies
- Blockchain to secure IIoT transactions
- Public and private blockchains
- Digital identity with blockchains
- Securing the supply chain
- Blockchain challenges
- Cognitive countermeasures - AI, machine learning, and deep learning
- Practical considerations for AI-based IIoT security
- Time-sensitive networking - Next-gen industrial connectivity
- Time synchronization
- Traffic scheduling
- Network and system configuration
- TSN security
- Other Promising Trends
- Summary.
- Chapter 9: Real-World Case Studies in IIoT Security.