<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Paul Chopineau, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/paul-chopineau/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/author/paul-chopineau/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Fri, 13 Dec 2024 08:17:41 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Paul Chopineau, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/author/paul-chopineau/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Electric Mobility – How can charging point operators secure their charging infrastructure? </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/12/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/12/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure/#respond</comments>
		
		<dc:creator><![CDATA[Paul Chopineau]]></dc:creator>
		<pubDate>Fri, 13 Dec 2024 08:17:40 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=24868</guid>

					<description><![CDATA[<p>With the European Union’s ban on the sale of combustion engine vehicles set for 2035, the electric mobility market is rapidly expanding. Alongside it, electric vehicle charging infrastructures (EVCI) are developing at a fast pace: cumulative investments by 2030 could...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure/">Electric Mobility – How can charging point operators secure their charging infrastructure? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="auto">With the European Union’s ban on the sale of combustion engine vehicles set for 2035, the electric mobility market is rapidly expanding. Alongside it, </span><b><span data-contrast="auto">electric vehicle charging infrastructures</span></b><span data-contrast="auto"> (EVCI) are developing at a fast pace: cumulative investments by 2030 could reach €50 billion for private chargers and €30 billion for public chargers.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, unlike traditional gas stations, these are highly </span><b><span data-contrast="auto">computerized and connected systems</span></b><span data-contrast="auto">. Indeed, digitalization allows for a </span><b><span data-contrast="auto">smart</span></b> <b><span data-contrast="auto">ecosystem </span></b><span data-contrast="auto">and</span> <span data-contrast="auto">direct </span><b><span data-contrast="auto">operational gains</span></b><span data-contrast="auto">. This includes features such as </span><b><span data-contrast="auto">smart charging</span></b><span data-contrast="auto">, which allows for financial and energy savings by optimizing electricity consumption depending on grid strain. The</span><b><span data-contrast="auto"> driver’s experience</span></b><span data-contrast="auto"> is also improved, as they can use their smartphone to easily locate connected chargers and interact with them.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">All these functionalities present </span><b><span data-contrast="auto">specific cybersecurity challenges</span></b><span data-contrast="auto"> that we will analyze in this article. We will outline strategies that </span><b><span data-contrast="auto">Charging Point Operators</span></b><span data-contrast="auto"> (</span><b><span data-contrast="auto">CPOs</span></b><span data-contrast="auto">) can implement, focusing on </span><b><span data-contrast="auto">public charging stations</span></b><span data-contrast="auto">. Indeed, public chargers are more exposed and thus, are the most complex case study from both operational and cybersecurity perspectives.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><b><span data-contrast="auto">What are the cyber risks in the charging ecosystem?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p><span data-contrast="auto">Why are cyber risks significant, and what is their nature? To understand this, we need to examine the charging ecosystem.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The central player in this ecosystem is the CPO, who is on the </span><b><span data-contrast="auto">front line of cyber risks</span></b><span data-contrast="auto">. CPOs are responsible for the direct operation of charging stations, both on-site and remotely. Typically, they use a cloud-hosted software solution called a </span><b><span data-contrast="auto">CSMS (Charging Station Management System)</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The role of the CSMS has been highly standardized thanks to efforts by the </span><b><span data-contrast="auto">Open Charge Alliance (OCA)</span></b><span data-contrast="auto">, a consortium that developed the </span><b><span data-contrast="auto">OCPP (Open Charge Point Protocol)</span></b><span data-contrast="auto">. OCPP handles more than just maintenance and monitoring; it allows the CSMS to communicate with the charger in real-time to manage the charging process (reserving the station, driver authentication and authorization, billing, etc.). This introduces a cybersecurity risk: compromising the CSMS could lead to a widespread compromise of the CPO’s entire charging network.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">However, to fully map out the possible risks, we must also consider other industry players who share cyber risks with the CPO.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">First,</span><b><span data-contrast="auto"> charging stations</span></b> <b><span data-contrast="auto">manufacturers</span></b><span data-contrast="auto"> play a key role. Responsible for charger design and production, they also handle software updates and provide patches for vulnerabilities. In some charger models, manufacturers maintain permanent remote access for maintenance purposes via a secondary OCPP connection. If not properly secured, this connection can pose a risk to the CPO.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">To ensure the remote connection of charger networks to the CSMS, </span><b><span data-contrast="auto">Wide Area Network (WAN)</span></b><span data-contrast="auto"> solutions are frequently used. This can involve a 3G/4G link, or integration into a preexisting on-site network. In both cases, the link is not under the CPO’s control, making them dependent on the cybersecurity maturity of the </span><b><span data-contrast="auto">telecom provider</span></b><span data-contrast="auto"> they choose.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Additionally, the CPO must integrate their information system with the </span><b><span data-contrast="auto">site owner</span></b><span data-contrast="auto">. Indeed, chargers can be in a variety of environments: highway rest areas, corporate parking lots, shopping malls, public roads etc. Depending on the use case, the stations may be interfaced with building systems (such as occupancy sensors or smart meters) or with user authentication and payment systems. Typically, the CPO has no authority over these systems and their security.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">This </span><b><span data-contrast="auto">multiplicity of actors </span></b><span data-contrast="auto">tends to increase the </span><b><span data-contrast="auto">attack surface</span></b><span data-contrast="auto"> on the CPO’s information systems. A breach could result in the </span><b><span data-contrast="auto">leakage of customer data</span></b><span data-contrast="auto"> or serve as a foothold for a broader cyberattack targeting the CPO and/or its partners, with significant </span><b><span data-contrast="auto">financial and reputational impacts</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">On a local scale, potential attacks are also severe, including </span><b><span data-contrast="auto">cyber-physical risks</span></b><span data-contrast="auto"> (e.g.: a malicious modification of charging parameters, which could lead to battery overheating and potentially a fire) or </span><b><span data-contrast="auto">grid destabilization risks</span></b><span data-contrast="auto"> (e.g.: the malicious activation or deactivation of multiple chargers at once, potentially overloading the power grid).</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;469777462&quot;:[720],&quot;469777927&quot;:[0],&quot;469777928&quot;:[8]}"> </span></p>
<p><span data-contrast="auto">These scenarios are likely to become more plausible with the growing popularity of </span><b><span data-contrast="auto">extreme fast chargers </span></b><span data-contrast="auto">(especially for heavy-duty vehicles) and </span><b><span data-contrast="auto">bidirectional charging implementations</span></b><span data-contrast="auto">, which allow parked vehicles to feed stored energy back into the grid.</span><span data-ccp-props="{}"> </span></p>
<h1><b><span data-contrast="none">Implementing new standards: is it enough to address the risks?</span></b><span data-ccp-props="{}"> </span></h1>
<p><span data-contrast="none">As the charging market rapidly grows, it is becoming more structured, and new standards are emerging. This presents an opportunity to provide a unified cyber response to the risks we have discussed.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="none">Take </span><b><span data-contrast="none">ISO 15118-20</span></b><span data-contrast="none">, for example. Published in 2022, it specifies robust communication mechanisms between vehicles and chargers. In addition to the already mentioned </span><b><span data-contrast="none">smart charging</span></b><span data-contrast="none"> and </span><b><span data-contrast="none">bidirectional charging</span></b><span data-contrast="none"> use cases, ISO15118 introduces </span><b><span data-contrast="none">Plug &amp; Charge</span></b><span data-contrast="none">: this feature allows the charger to automatically authenticate a vehicle and process payment, eliminating the need for payment cards or RFID tags.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="none">The primary goals of ISO 15118 are thus to streamline usage, improve energy efficiency, and ensure interoperability. However, its adoption could also bring security benefits, notably through the implementation of a global </span><b><span data-contrast="none">Public Key Infrastructure (PKI)</span></b><span data-contrast="none"> for charging stakeholders: vehicle manufacturers, mobility operators, and CPOs.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="none">Meanwhile, the development of OCPP is also expected to accelerate, following the official approval of OCPP 2.0.1 as an </span><b><span data-contrast="none">international standard</span></b><span data-contrast="none"> (IEC 63584) by the International Electrotechnical Commission.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="none">However, it will take time before these standards become widely adopted. Several major players, such as Tesla, have developed </span><b><span data-contrast="none">proprietary protocols</span></b><span data-contrast="none"> with similar features. Moreover, most existing chargers and vehicles are not compatible with ISO 15118 or OCPP 2.0.1 and need to be replaced.</span><span data-ccp-props="{}"> </span></p>
<p><span data-contrast="auto">Thus, we cannot rely solely on standards to address cybersecurity risks: it is imperative to find ways to secure current infrastructures.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><i><span data-contrast="auto">Note : </span></i><i><span data-contrast="auto">to know more about Plug &amp; Charge and smart charging, feel free to check out the articles by EnergyStream, Wavestone’s energy blog (only available in French):</span></i><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<ul>
<li><a href="https://www.energystream-wavestone.com/2024/04/le-plug-charge-une-nouvelle-solution-dauthentification-et-de-facturation-securisee-au-service-de-la-recharge-des-vehicules-electriques/"><i><span data-contrast="none">Le Plug &amp; Charge : une nouvelle solution d&#8217;authentification et de facturation sécurisée</span></i></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><a href="https://www.energystream-wavestone.com/2024/06/les-defis-du-deploiement-du-plug-charge-pour-accelerer-la-transition-vers-une-mobilite-electrique/"><i><span data-contrast="none">Les défis du déploiement du Plug &amp; Charge</span></i></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
<li><a href="https://www.energystream-wavestone.com/2024/10/panorama-des-usages-du-smart-charging/"><i><span data-contrast="none">Panorama des usages du smart charging</span></i></a><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></li>
</ul>
<h1><b><span data-contrast="auto">So, how can CPOs secure their architecture?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p><span data-contrast="auto">Standards are only one part of the puzzle: it is primarily up to CPOs to implement a comprehensive cybersecurity policy. But how can they tackle the complex risks we have discussed?</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">The first step is to </span><b><span data-contrast="auto">understand and</span></b> <b><span data-contrast="auto">document their architecture and solutions</span></b><span data-contrast="auto">. This may seem basic, but there is currently no reference architecture model for charging infrastructure. In this article, we will be model the architecture using four zones, as presented below:</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p style="text-align: center;"><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"><img fetchpriority="high" decoding="async" class="size-full wp-image-24871 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en1.png" alt="" width="1036" height="311" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en1.png 1036w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en1-437x131.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en1-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en1-768x231.png 768w" sizes="(max-width: 1036px) 100vw, 1036px" /></span><i><span data-contrast="auto">Figure 1. Base architecture model for public chargers in commercial contexts.</span></i><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">To secure this architecture end-to-end, we will look at </span><b><span data-contrast="auto">key measures</span></b><span data-contrast="auto"> to secure </span><b><span data-contrast="auto">each zone</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">We can, however, disregard the </span><b><span data-contrast="auto">vehicle interface</span></b><span data-contrast="auto"> for now. Until ISO 15118 becomes widely adopted, current charging connectors are not integrated into the information system and therefore are not a risk vector.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">For the </span><b><span data-contrast="auto">charging network</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">cyber hygiene</span></b><span data-contrast="auto"> measures and </span><b><span data-contrast="auto">network segmentation</span></b><span data-contrast="auto"> are crucial. Chargers are often vulnerable systems, due to the use of default accounts, weak passwords, open network ports, and unencrypted storage systems. The CPO must implement best practices for </span><b><span data-contrast="auto">hardening</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">firmware updating</span></b><span data-contrast="auto">, for each manufacturer and model they use.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Network segmentation usually involves the use of </span><b><span data-contrast="auto">firewalls</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">VLANs</span></b><span data-contrast="auto">, depending on the local network topology and external systems that need to be integrated. Using a </span><b><span data-contrast="auto">local controller</span></b><span data-contrast="auto"> can help isolate chargers more easily from untrusted networks. This controller can aggregate all charging stations on a site and serve as a proxy with the CSMS.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">As the </span><b><span data-contrast="auto">WAN network</span></b><span data-contrast="auto"> is often outsourced, it is essential for the CPO to encrypt the flows between the chargers and the CSMS. The main existing solution today is the use of </span><b><span data-contrast="auto">TLS with server-side and client-side certificates</span></b><span data-contrast="auto">, as provided in the latest versions of OCPP.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p><span data-contrast="auto">Finally, how to secure the </span><b><span data-contrast="auto">CSMS</span></b><span data-contrast="auto">? It can generally be assimilated to a cloud-based IoT platform and approached similarly. Priority should be given to </span><b><span data-contrast="auto">code security </span></b><span data-contrast="auto">best practices and proper </span><b><span data-contrast="auto">identity and access management</span></b><span data-contrast="auto"> (following the RBAC model). In the future, we can imagine that the CSMS will also play an active role in </span><b><span data-contrast="auto">detecting cyber threats</span></b><span data-contrast="auto">: analyzing logs and OCPP communications could be facilitated by the implementation of AI-based solutions.</span><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<h1><b><span data-contrast="auto">Conclusion: what should be the reference architecture for CPOs?</span></b><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></h1>
<p><span data-contrast="auto">Although new standards promise to streamline architectures, the charging ecosystem remains complex due to the diversity in business contexts. This is why we encourage CPOs to adapt the best practices from this article to their use case. The architecture diagram below should be seen as a starting point, rather than a definitive target.</span><span data-ccp-props="{}"> </span></p>
<p style="text-align: center;"><span data-ccp-props="{}"><img decoding="async" class="size-full wp-image-24869 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en2.png" alt="" width="1046" height="374" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en2.png 1046w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en2-437x156.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en2-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/12/borne_ev_en2-768x275.png 768w" sizes="(max-width: 1046px) 100vw, 1046px" /> </span><i><span data-contrast="auto">Figure 2. Secure architecture model for public chargers in commercial contexts.</span></i><span data-ccp-props="{&quot;335551550&quot;:6,&quot;335551620&quot;:6}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/12/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure/">Electric Mobility – How can charging point operators secure their charging infrastructure? </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/12/electric-mobility-how-can-charging-point-operators-secure-their-charging-infrastructure/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/#respond</comments>
		
		<dc:creator><![CDATA[Paul Chopineau]]></dc:creator>
		<pubDate>Wed, 11 Sep 2024 12:20:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23850</guid>

					<description><![CDATA[<p>The Cyber Resilience Act (CRA) represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount. The...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/">Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><span data-contrast="auto">The <strong>Cyber Resilience Act (CRA)</strong> represents a significant step forward in ensuring the cybersecurity of products with digital elements within the European Union. As digital products increasingly integrate into every aspect of daily life, ensuring their security becomes paramount.</span> <span data-contrast="auto">The CRA thus represents a </span><b><span data-contrast="auto">steep change in the security of products </span></b><span data-contrast="auto">as the first regulation of this kind worldwide. Wavestone, as a key player in cybersecurity consultancy, is particularly invested in this regulation due to its involvement in the exploratory studies that shaped the CRA.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><b><span data-contrast="auto">In a few words, if you either manufacture, import or resell a product with digital elements, you will surely be affected by the CRA, and need to ensure compliance. This article is intended to shed light on: What does this regulation entail? Who is affected? How can compliance be achieved?</span></b><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h1><b><span data-contrast="auto">What is the cyber resilience act and what does it entail?  </span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">To understand the necessity of the Cyber Resilience Act, it&#8217;s crucial to consider the broader context of cybersecurity in Europe. The CRA is an ambitious regulation designed to </span><b><span data-contrast="auto">ensure the security of EU citizens</span></b><span data-contrast="auto"> by addressing the currently observed low levels of cybersecurity in products with digital elements through a European Union policy intervention. In response, comprehensive studies focusing on the cybersecurity of digital products were conducted, leading to the proposal of legislation defining the obligations for the whole products supply chain actors, from manufacturers to distributors.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Wavestone&#8217;s involvement in this process underscores its commitment to enhancing cybersecurity standards. We participated in an </span><b><span data-contrast="auto">in-depth exploratory study commissioned by the EU</span></b><span data-contrast="auto">, engaging with a broad spectrum of stakeholders involved to varying degrees in the products ecosystem, including national authorities, EU bodies, hardware and software manufacturers, trade associations, consumer organizations, researchers, academia, and cybersecurity professionals. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">Through Wavestone’s position as a global, and particularly European leader in the field of cybersecurity, several interviews, focus groups and workshops were conducted.  Valuable insights were gathered from a wide range of different interlocutors, providing a comprehensive view that takes into account the perspectives of all stakeholders and allowed the foundation for the development of the CRA.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="3"><b><span data-contrast="auto">Definition and Scope</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The Cyber Resilience Act is a legislative proposal </span><b><span data-contrast="auto">defining the obligations of manufacturers, importers, and distributors of products containing digital elements marketed in the EU</span></b><span data-contrast="auto">, all of which must bear the CE mark across all sectors. As defined in the regulation, this includes “</span><i><span data-contrast="auto">any software or hardware product and its remote data processing solutions, encompassing components that can be marketed separately</span></i><span data-contrast="auto">”. The regulation&#8217;s aim is not only to secure standalone products but also to ensure the security of data transmission chains and central infrastructures through the application of this standard.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">To this notion of product is added a notion of criticality, therefore the CRA differentiates two types of products: </span><b><span data-contrast="auto">products with digital elements</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">critical products with digital elements</span></b><span data-contrast="auto">. As detailed below in “Checklist for CRA compliance”, it will affect how compliance can be achieved.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">A few examples of products with digital elements include consumer products, smarts cities and non-essential software. Critical products with digital elements include for example industrial control systems and firewalls. The detailed list of concerned products can be found in the regulation’s annexes.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> <img decoding="async" class=" wp-image-23883 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800.png" alt="" width="674" height="406" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800.png 1254w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800-317x191.png 317w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800-65x39.png 65w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143800-768x463.png 768w" sizes="(max-width: 674px) 100vw, 674px" /></span><span data-contrast="auto">However, as is detailed below in “A complex ecosystem”, the </span><b><span data-contrast="auto">CRA does not apply universally</span></b><span data-contrast="auto">; products in some specific sectors do not have to comply to the requirements</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="3"><b><span data-contrast="auto">Stakeholders and Responsibilities</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The CRA impacts the entire lifecycle of digital products, from development by </span><b><span data-contrast="auto">manufacturers</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">importers</span></b><span data-contrast="auto">, </span><b><span data-contrast="auto">distributers</span></b><span data-contrast="auto"> to the final </span><b><span data-contrast="auto">consumer</span></b><span data-contrast="auto">, but also the vulnerability management from conception to the product end-life, through a share responsibility.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> <img loading="lazy" decoding="async" class=" wp-image-23885 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733.png" alt="" width="550" height="340" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733.png 1214w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143733-768x475.png 768w" sizes="auto, (max-width: 550px) 100vw, 550px" /><br /></span></p>
<h2 aria-level="3"><b><span data-contrast="auto">Essential Requirements</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">As said earlier, the CRA’s objective is to allow a sufficient level of cybersecurity in products with digital elements. To do so, it introduces essential requirements built on three pillars:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">Product Security:</span></b><span data-contrast="auto"> Ensuring products are designed, developed, and manufactured to meet appropriate cybersecurity levels and are free from known exploitable vulnerabilities.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">User Documentation:</span></b><span data-contrast="auto"> Providing documentation to ensure safe use from commissioning to end of life.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="" data-font="Symbol" data-listid="5" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><b><span data-contrast="auto">Vulnerability Management:</span></b><span data-contrast="auto"> Identifying and documenting vulnerabilities, conducting regular security tests, and implementing a vulnerability disclosure policy.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
</ul>
<p><span data-contrast="auto">In the event of </span><b><span data-contrast="auto">non-compliance with the essential requirements</span></b><span data-contrast="auto">, sanctions may be applied on any of the three stakeholders. Like GDPR, each Member State shall determine the </span><b><span data-contrast="auto">penalties applicable</span></b><span data-contrast="auto"> to infringements of this Regulation. Penalties are based on the company&#8217;s annual turnover and the severity of the infraction, with fines reaching up to 15 million euros or 2.5% of the total worldwide annual turnover for significant breaches. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:360,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h1 aria-level="2"><b><span data-contrast="auto">How to achieve compliance with the CRA?</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h1>
<h2 aria-level="3"><b><span data-contrast="auto">Timeline of the CRA</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">The CRA has been a long-term project, with almost </span><b><span data-contrast="auto">10 years</span></b><span data-contrast="auto"> from identification of the need to application, reflecting the complexity of establishing comprehensive cybersecurity regulations:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> <img loading="lazy" decoding="async" class=" wp-image-23905 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854.png" alt="" width="751" height="362" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854.png 1261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854-396x191.png 396w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-13-111854-768x370.png 768w" sizes="auto, (max-width: 751px) 100vw, 751px" /><br /></span></p>
<p><span data-contrast="auto">Businesses have until the 2026 to achieve compliance, with interim obligations. Similar requirements can be found in other regulations, such as NIS2, but contrary to other regulations, the CRA does not need a national transposition. The CRA was passed by the European Parliament in March 2024, and it is awaiting a vote by the European Council to become a law.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<h2 aria-level="3"><b><span data-contrast="auto">A complex ecosystem</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">One of the major concerns raised during the preparation of the Cyber Resilience Act was how to navigate the multitude of existing regulations and </span><b><span data-contrast="auto">achieve regulatory harmony</span></b><span data-contrast="auto">, particularly in sectors where safety, privacy, and cybersecurity standards intersect. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The CRA aims to foster interoperability by aligning with the general product safety framework, the Cyber Security Act&#8217;s requirements for ICT products, processes, and services, and the CE marking standards for European compliance.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">To streamline compliance, the CRA includes</span><b><span data-contrast="auto"> presumptions of conformity</span></b> <b><span data-contrast="auto">with existing regulations</span></b><span data-contrast="auto"> such as the RED Directive, the AI Act, and certain sector-specific rules. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">However, the </span><b><span data-contrast="auto">CRA does not apply universally</span></b><span data-contrast="auto">; some sectors, such as medical, aviation, and automotive, are already governed by established regulations and are thus exempt from the CRA&#8217;s provisions.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-23881 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818.png" alt="" width="1410" height="677" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818.png 1410w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818-398x191.png 398w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-143818-768x369.png 768w" sizes="auto, (max-width: 1410px) 100vw, 1410px" /></p>
<h2><b><span data-contrast="auto">Checklist for CRA compliance</span></b><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335559738&quot;:160,&quot;335559739&quot;:80,&quot;335559740&quot;:259}"> </span></h2>
<p><span data-contrast="auto">Compliance with the CRA involves a thorough understanding of the regulation&#8217;s core text and two annexes, which detail: the list of concerned products, essential requirements, the obligations for manufacturers, importers, and distributors and national competent authorities and sanctions. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">The certification process varies based on product criticality:</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Symbol&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;&quot;,&quot;469777815&quot;:&quot;multilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><b><span data-contrast="auto">For non-critical products</span></b><span data-contrast="auto"> : a self-assessment is necessary</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">For critical products</span></b><span data-contrast="auto"> </span><span data-contrast="auto"> : third-party assessment is necessary, meaning the product compliance to the CRA will be assessed by a certified entity. At the time of writing this article, the exact certification schemes have yet to be specified but in France, the CESTI certification is in discussion. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
</ul>
<p><b><span data-contrast="auto">Five main checkpoints</span></b><span data-contrast="auto"> are to be considered to achieve compliance: </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p><img loading="lazy" decoding="async" class="size-full wp-image-23853 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243.png" alt="" width="1298" height="376" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243.png 1298w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243-437x127.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243-71x21.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/09/Capture-decran-2024-09-11-140243-768x222.png 768w" sizes="auto, (max-width: 1298px) 100vw, 1298px" /></p>
<ol>
<li><b><span data-contrast="auto">Legislative Gap Analysis:</span></b><span data-contrast="auto"> Identify discrepancies between current practices and the requirements of the CRA by reviewing existing cybersecurity policies, processes, and controls to pinpoint areas needing improvement.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="25" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><b><span data-contrast="auto">Product Security Assessment:</span></b><span data-contrast="auto"> Conduct thorough assessments to ensure product identification and security. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">User Instructions Update:</span></b><span data-contrast="auto"> Provide clear and comprehensive user documentation by ensuring that all products are accompanied by documentation in adequation with the regulation standards.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li data-leveltext="%1." data-font="" data-listid="25" data-list-defn-props="{&quot;335552541&quot;:0,&quot;335559685&quot;:768,&quot;335559991&quot;:360,&quot;469769242&quot;:[65533,0],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;%1.&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><b><span data-contrast="auto">Vulnerability Management:</span></b><span data-contrast="auto"> Set up a process for identifying and sharing vulnerabilities.</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></li>
<li><b><span data-contrast="auto">Internal Organization Review:</span></b><span data-contrast="auto"> Implement a permanent procedure to ensure compliance, covering the above-mentioned key points and enforce a watch on product or legislation changes that may imply new gaps to remediate</span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:240}">.</span></li>
</ol>
<p><span data-contrast="auto">In conclusion, the Cyber Resilience Act represents a comprehensive framework to enhance the cybersecurity of digital products within the EU. Compliance with this legislation requires thorough preparation.</span> <span data-contrast="auto">For businesses, adhering to the CRA is not just a legal obligation but also an </span><b><span data-contrast="auto">opportunity to enhance their standing in a market</span></b><span data-contrast="auto"> increasingly aware of cybersecurity issues. </span><span data-ccp-props="{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559731&quot;:720,&quot;335559739&quot;:160,&quot;335559740&quot;:240}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/">Cyber Resilience Act: A revolution redefining product security and transforming the ecosystem</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/09/cyber-resilience-act-a-revolution-redefining-product-security-and-transforming-the-ecosystem/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>KMS: The Key to Secure Management of Cryptographic Objects </title>
		<link>https://www.riskinsight-wavestone.com/en/2024/05/kms-the-key-to-secure-management-of-cryptographic-objects/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/05/kms-the-key-to-secure-management-of-cryptographic-objects/#respond</comments>
		
		<dc:creator><![CDATA[Paul Chopineau]]></dc:creator>
		<pubDate>Wed, 29 May 2024 13:08:52 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=23220</guid>

					<description><![CDATA[<p>This article is intended primarily for an informed public, mastering the use of cryptographic keys in an IS and their management in organizations.  Increasing security requirements for both industrial environments and connected objects have led to a profusion of cryptographic...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/kms-the-key-to-secure-management-of-cryptographic-objects/">KMS: The Key to Secure Management of Cryptographic Objects </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p><i><span data-contrast="auto">This article is intended primarily for an informed public,</span></i> <i><span data-contrast="auto">mastering the use of cryptographic keys in an IS and their management in organizations.</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Increasing security requirements for both industrial environments and connected objects have led to a </span><b><span data-contrast="auto">profusion of cryptographic keys </span></b><span data-contrast="auto">in companies that are sometimes difficult to manage. These are used to encrypt and decrypt documents and exchanges as well as to verify the authenticity of messages and files, for example, when updating a component&#8217;s software, to ensure its integrity.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">One solution, to the problem of the complexity of managing numerous cryptographic keys within a company, is to implement a </span><b><span data-contrast="auto">KMS</span></b><span data-contrast="auto"> (Key Management System). This tool helps protect data, product, and process security in the form of a </span><b><span data-contrast="auto">centralized</span></b><span data-contrast="auto"> cryptographic key management </span><b><span data-contrast="auto">tool</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Beyond </span><b><span data-contrast="auto">standardizing</span></b><span data-contrast="auto"> processes, the KMS can help solve problems such as the </span><b><span data-contrast="auto">generation of large numbers of different keys</span></b><span data-contrast="auto">, key storage and </span><b><span data-contrast="auto">access</span></b><span data-contrast="auto">, and </span><b><span data-contrast="auto">key depreciation</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">Why use a KMS?</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:240,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">KMS (Key Management Systems) are cryptographic key management systems that allow companies to </span><b><span data-contrast="auto">manage their encryption keys centrally and securely</span></b><span data-contrast="auto">. KMSs are designed for organizations managing a large number of cryptographic keys and improve the security of their environments by standardizing processes and providing APIs for crypto functions (signature, encryption, decryption). Organizations with large IT networks and those in the industry with connected objects such as sensors, actuators, embedded systems, or selling connected products are also particularly concerned.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">The importance of good key management is crucial to cybersecurity. Encryption, signature, or verification processes are essential for many organizations, even if they sometimes appear transparent to operational staff. It is important that encryption keys are optimally managed, to avoid, for example, </span><b><span data-contrast="auto">insecure key storage</span></b><span data-contrast="auto"> or the use of </span><b><span data-contrast="auto">the same key</span></b><span data-contrast="auto"> for multiple devices.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">This article will take a closer look at what a KMS is, how it works, and why it may become essential. Several types of KMS will be presented, as well as the advantages of using them and the difficulties of integrating them. Finally, this article looks at some of the keys to targeting companies that can benefit from this type of tool.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">To get more information on the KMS architecture, you can watch Paul Chopineau conference at the Miami S4x24 <a href="https://youtu.be/J5aeAYxcc24?feature=shared">https://youtu.be/J5aeAYxcc24?feature=shared</a>.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="size-full wp-image-23226 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144022.png" alt="" width="1429" height="801" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144022.png 1429w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144022-341x191.png 341w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144022-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144022-768x430.png 768w" sizes="auto, (max-width: 1429px) 100vw, 1429px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">1</span></i><i><span data-contrast="none"> : Typical KMS architecture</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">The different ways to deploy a KMS</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:240,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">There are several ways to implement a KMS depending on the options offered by the manufacturer. Some Key Management Systems are offered in </span><b><span data-contrast="auto">SaaS</span></b><span data-contrast="auto"> mode while others can be installed on the company&#8217;s servers (</span><b><span data-contrast="auto">on premise</span></b><span data-contrast="auto">) or in a </span><b><span data-contrast="auto">hybrid</span></b><span data-contrast="auto"> mode- where the keys are stored on premise, but the application is in the cloud.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Implementing KMSs through </span><b><span data-contrast="auto">cloud solutions</span></b><span data-contrast="auto"> enable encryption keys to be managed from a computer or server. These products are more scalable and agile, and easier to deploy and update. Key security, however, will depend on that of the cloud service, even if it is possible to introduce over-encryption.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="auto">On-premise</span></b><span data-contrast="auto"> KMS are software and hardware solutions that enable cryptographic keys to be managed using an organization&#8217;s internal servers and HSMs. They are generally more customizable and sometimes better adapted to specific needs than KMS deployed in SaaS mode. On premise KMSs, however, take longer to integrate and cost more to purchase (initial CAPEX). They also have the advantage of enabling a company to ensure sovereignty over its cryptographic keys. On premise KMSs are therefore best suited to companies with very stringent security requirements and a greater capacity for initial investment.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Finally, </span><b><span data-contrast="auto">hybrid</span></b><span data-contrast="auto"> KMSs could represent the right balance between optimum security and ease of deployment. The aim is to retain control over the keys, which in this case are stored on site, but to benefit from greater ease of deployment and scalability thanks to a cloud-hosted application. Deployment of the application is made easier, but the hardware resources for key management (HSMs) still need to be installed. A hybrid KMS includes key security approaches of an on-premise solution with software that makes it dependent on the cloud service. Care must be taken, however, to protect against fraudulent exploitation of keys from cloud infrastructures, which could be more difficult to detect than with an on-premise KMS.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="size-full wp-image-23224 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144058.png" alt="" width="1419" height="757" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144058.png 1419w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144058-358x191.png 358w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144058-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144058-768x410.png 768w" sizes="auto, (max-width: 1419px) 100vw, 1419px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure </span></i><i><span data-contrast="none">2</span></i><i><span data-contrast="none"> : The three possible implementations for a KMS</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<p><span data-contrast="auto">It is also possible to classify products on the market according to </span><b><span data-contrast="auto">provider type</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Firstly, there are the products of the </span><b><span data-contrast="auto">major cloud players</span></b><span data-contrast="auto">:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Amazon with </span><a href="https://aws.amazon.com/kms/"><span data-contrast="none">AWS Key Management Service</span></a><span data-contrast="auto"> (AWS KMS),</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Microsoft which offers </span><a href="https://azure.microsoft.com/en-us/products/key-vault/"><span data-contrast="none">Azure Key Vault</span></a><span data-contrast="auto">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Google with the </span><a href="https://cloud.google.com/kms/docs?hl=fr"><span data-contrast="none">Cloud KMS</span></a><span data-contrast="auto"> (Key Management Service),</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="2" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">IBM which offers a </span><a href="https://www.ibm.com/docs/en/cloud-private/3.2.0?topic=guide-key-management-service-kms-adoption"><span data-contrast="none">KMS (Key Management Service)</span></a><span data-contrast="auto"> integrated into IBM Cloud Private.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-contrast="auto">Their products integrate perfectly with the services provided by these major providers, including their secure key storage tools, such as </span><a href="https://cloud.google.com/security-key-management"><span data-contrast="none">Google’s KMS, which enables keys to be created in the cloud and stored in HSM</span></a><span data-contrast="none">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><b><span data-contrast="auto">Specialized companies</span></b><span data-contrast="auto"> are also positioning themselves in the market:</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Cryptomathic with its </span><a href="https://www.cryptomathic.com/products/key-management/crypto-key-management-system"><span data-contrast="none">CKMS</span></a><span data-contrast="auto"> (Crypto Key Management System),</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Entrust, whose product is called </span><a href="https://www.entrust.com/digital-security/key-management/keycontrol"><span data-contrast="none">KeyControl</span></a><span data-contrast="auto">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">HashiCorp, with its product  </span><a href="https://developer.hashicorp.com/vault/docs/secrets/key-management"><span data-contrast="none">Vault</span></a><span data-contrast="auto">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Utimaco</span><span data-contrast="auto">, </span><span data-contrast="auto">whose</span><span data-contrast="auto"> KMS </span><span data-contrast="auto">is called </span><a href="https://utimaco.com/products/categories/key-management/keybridge-universal-key-management-ukm"><span data-contrast="none">KeyBridge</span></a><span data-contrast="auto">,</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="3" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="5" data-aria-level="1"><span data-contrast="auto">Thales</span><span data-contrast="auto">, </span><span data-contrast="auto">for example with its </span><a href="https://www.thalesgroup.com/en/markets/digital-identity-and-security/iot/industries/automotive/trusted-key-manager"><span data-contrast="none">Trusted Key Manager (TKM)</span></a><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<p><span data-contrast="auto">In particular, these companies offer to run their tools on software resources, such as KMS from Microsoft, Amazon, and Google for HashiCorp; or VMware for Entrust. But also, hardware resources, such as HSM, which provide a superior level of security against physical attacks.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Finally, the market has also been joined by </span><b><span data-contrast="auto">integrators</span></b><span data-contrast="auto">, such as Atos with its </span><a href="https://atos.net/en/solutions/cyber-security/data-protection-and-governance/trustway-dataprotect-kms-key-manager"><span data-contrast="none">Trustway DataProtect KMS</span></a><span data-contrast="auto"> suite, designed for on premises installation on company hardware.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Finally, Thalès, which positions itself as a hardware provider, publisher, and integrator, offers </span><a href="https://cpl.thalesgroup.com/fr/encryption/key-management"><span data-contrast="none">several key management products for companies</span></a><span data-contrast="auto">. These work in tandem with those offered by more specialized players, as well as with their customers&#8217; preferred cloud services.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-ccp-props="{&quot;134245418&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> <img loading="lazy" decoding="async" class="size-full wp-image-23222 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144145.png" alt="" width="1450" height="785" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144145.png 1450w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144145-353x191.png 353w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144145-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/05/Capture-decran-2024-05-29-144145-768x416.png 768w" sizes="auto, (max-width: 1450px) 100vw, 1450px" /></span></p>
<p style="text-align: center;"><i><span data-contrast="none">Figure 3: Three main types of KMS providers</span></i><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559739&quot;:200,&quot;335559740&quot;:240}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">The advantages of using a KMS</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:240,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">KMS (Key Management Systems) are tools whose full potential has still to be explored, of which can prove particularly useful for managing a company&#8217;s encryption keys centrally and securely. Here are just a few of the advantages of using KMSs.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">Firstly, keys will be easier to </span><b><span data-contrast="auto">deploy</span></b><span data-contrast="auto">. KMS enables new cryptographic-encryption keys to be </span><b><span data-contrast="auto">generated</span></b><span data-contrast="auto"> quickly and automatically, which is particularly useful when many different keys need to be generated for transmission to products, connected objects or industrial systems.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In a context where connected object keys are often not renewed and are managed in a non-standardized way, KMS will enable companies to introduce the level of security that will enable them to comply with future </span><b><span data-contrast="auto">regulations</span></b><span data-contrast="auto"> on IoT systems. The same applies to the encryption of sensitive data in a database, which is the use case that gave rise to KMS products in the first place.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">To improve </span><b><span data-contrast="auto">key</span></b> <b><span data-contrast="auto">storage</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">access</span></b><span data-contrast="auto">, KMS offer centralized APIs and interfaces, integrating permissions management with identity and access management (IAM), which can be particularly useful for companies with many types of keys and users of encryption keys. The challenge will be to convince providers and partners outside the company to enter keys via the KMS. This will be an element to be negotiated in future framework contracts.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">KMS also enables one to manage the depreciation of encryption keys, automatically replacing them with new ones when they expire, are compromised or simply become obsolete, for example following a change in the security policy. This ensures that data remains secure at all times.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">In short, KMS are invaluable tools for efficiently and securely managing a company&#8217;s encryption keys. They </span><b><span data-contrast="auto">improve compliance</span></b><span data-contrast="auto"> with regulations and security standards by ensuring that key management procedures and the keys used comply with established standards.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<h1 aria-level="1"><span data-contrast="none">Traps to avoid when implementing a KMS</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:240,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">Setting up a KMS (Key Management System) is a major undertaking, which can be hampered or even halted by the following factors: </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">Deployment costs: KMS can be very costly to deploy. These include </span><b><span data-contrast="auto">license fees</span></b><span data-contrast="auto">, as well as </span><b><span data-contrast="auto">hardware resources</span></b><span data-contrast="auto"> such as HSM for key storage, which need to be sized according to usage (frequency of access, volume).</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="2" data-aria-level="1"><span data-contrast="auto">Complexity of implementation: setting up a KMS can be complex, especially for companies with a large number of encrypted devices or systems, for whom it will be of </span><b><span data-contrast="auto">high added value</span></b><span data-contrast="auto">. Setting up a KMS can be complex, particularly for companies with a large number of encrypted devices or systems, for whom it will add considerable value. </span><b><span data-contrast="auto">Numerous integrations</span></b><span data-contrast="auto"> may need to be set up to communicate with the KMS API, depending on the different use cases.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="3" data-aria-level="1"><span data-contrast="auto">Specific </span><i><span data-contrast="auto">change management</span></i><span data-contrast="auto"> procedures: it will sometimes be difficult to convince all the company&#8217;s users of the importance of implementing a KMS, and to </span><b><span data-contrast="auto">encourage them to use this tool</span></b><span data-contrast="auto"> effectively. To solve this problem, a </span><b><span data-contrast="auto">communication</span></b><span data-contrast="auto"> and </span><b><span data-contrast="auto">training</span></b><span data-contrast="auto"> strategy is needed to make users aware of the importance of encryption key security and the usefulness of the system. </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<ul>
<li data-leveltext="\" data-font="Tahoma" data-listid="4" data-list-defn-props="{&quot;335552541&quot;:1,&quot;335559685&quot;:720,&quot;335559991&quot;:360,&quot;469769226&quot;:&quot;Tahoma&quot;,&quot;469769242&quot;:[8226],&quot;469777803&quot;:&quot;left&quot;,&quot;469777804&quot;:&quot;\\&quot;,&quot;469777815&quot;:&quot;hybridMultilevel&quot;}" aria-setsize="-1" data-aria-posinset="4" data-aria-level="1"><span data-contrast="auto">Skills that are rare on the market: IT architects, cryptography specialists, or project managers capable of managing large-scale cybersecurity projects. These are all profiles that are hard to source, and which will be all the more numerous to recruit the more cryptographic keys are used within the organization. Calling on external expertise will therefore be highly profitable and difficult to avoid.</span><span data-contrast="auto"> </span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></li>
</ul>
<h1 aria-level="1"><span data-contrast="none">KMS, an essential solution for secure encryption key management</span><span data-ccp-props="{&quot;134245418&quot;:true,&quot;134245529&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559738&quot;:360,&quot;335559739&quot;:240,&quot;335559740&quot;:259}"> </span></h1>
<p><span data-contrast="auto">In conclusion, KMSs are an essential solution for securely managing a company&#8217;s encryption keys. Whether a large enterprise with a large number of encrypted devices or systems, or a small business with similar issues, a KMS can greatly help to centralize and secure crypto key management.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">As an example, take the case of a freight company. It must manage numerous components in its vehicles, such as sensors to ensure compliance with the cold chain, or simply devices for tracking products. These objects connect to public or corporate networks, transmit encrypted data, and are regularly updated. Firmware must therefore be signed when an update is deployed, and encryption keys for data transmitted by sensors must be securely stored to ensure their integrity and confidentiality, as well as being available to operators in the event of a sensor modification. The KMS is particularly useful for all these processes, both to automate them and to facilitate the work of operators, and to ensure that each person involved only has access to the keys he or she uses. The tool will take care of key generation, or key recovery, if the keys have been generated externally, and then all the other stages in the key </span><b><span data-contrast="auto">life cycle</span></b><span data-contrast="auto">.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p><span data-contrast="auto">It should be noted, however, that assessing the suitability of this technology needs to be taken seriously. Upstream studies and a tendering procedure will be necessary to ensure that the right tool is put in place. By carrying out these procedures with a precise vision of business uses, the company can be sure of not having to change its system later on.</span><span data-ccp-props="{&quot;201341983&quot;:0,&quot;335551550&quot;:6,&quot;335551620&quot;:6,&quot;335559739&quot;:160,&quot;335559740&quot;:259}"> </span></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/05/kms-the-key-to-secure-management-of-cryptographic-objects/">KMS: The Key to Secure Management of Cryptographic Objects </a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/05/kms-the-key-to-secure-management-of-cryptographic-objects/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why is SBOM considered a vital ally for the security of your products?</title>
		<link>https://www.riskinsight-wavestone.com/en/2024/03/why-is-sbom-considered-a-vital-ally-for-the-security-of-your-products/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2024/03/why-is-sbom-considered-a-vital-ally-for-the-security-of-your-products/#respond</comments>
		
		<dc:creator><![CDATA[Paul Chopineau]]></dc:creator>
		<pubDate>Fri, 08 Mar 2024 17:14:36 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Focus]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=22663</guid>

					<description><![CDATA[<p>Since its initial appearance in 2014 and following its formalization in 2021 under the auspices of the Biden administration, the concept of SBOM (Software Bill of Materials) continues to captivate attention within the cyber community. CISOs, CIOs and DevSecOps teams...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/03/why-is-sbom-considered-a-vital-ally-for-the-security-of-your-products/">Why is SBOM considered a vital ally for the security of your products?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p style="text-align: justify;">Since its initial appearance in 2014 and following its formalization in 2021 under the auspices of the Biden administration, the concept of SBOM (Software Bill of Materials) continues to captivate attention within the cyber community. <strong>CISOs,</strong> <strong>CIOs </strong>and <strong>DevSecOps</strong> teams all wonder how to put it into practice and leverage it.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>What is SBOM, and in what context does it come into play?</strong></h1>
<p style="text-align: justify;"><strong> </strong>The SBOM (Software Bill of Materials) is a formal inventory, typically in JSON, XML, or plain text format, designed to be machine-readable. It contains detailed information about the software components of a system, including their dependencies, attributes, and hierarchical relationships. The primary goal of an SBOM is to provide a comprehensive and up-to-date view of all the software elements composing an application or system (<strong>source:</strong> <strong><a href="https://www.ntia.gov/page/software-bill-materials">NTIA-Software-Bill-Of-Materials</a>)</strong></p>
<p style="text-align: justify;">Like a physical product, software is a complex assembly of various elements. It includes internally developed code, third-party components (open-source libraries or modules subject to different licenses), as well as all the tools necessary for assembling the final product.</p>
<p style="text-align: justify;">However, with each new vulnerability discovered by researchers or exploited by hackers, suppliers and buyers are faced with a crucial question: where do potential critical vulnerabilities lie within their product?</p>
<p style="text-align: justify;">Today, Wavestone&#8217;s analysis formally attests that the SBOM is undeniably an essential element to address this issue.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>Generation methods </strong></h1>
<p style="text-align: justify;">A comprehensive technical analysis of tools available on the market has revealed the methods for generating Software Bill of Materials (SBOMs).</p>
<p style="text-align: justify;">Three main sources emerge for creating a SBOM:</p>
<ul style="text-align: justify;">
<li>Binary Code (compiled)</li>
<li>Project Source Code</li>
<li>Image Container, generated by platforms such as Docker.</li>
</ul>
<p style="text-align: justify;">These three sources can produce a file compliant with established standards, including<strong> SPDX</strong> and<strong> CycloneDX</strong>. However, it is essential to note that not all tools support these three inputs uniformly.</p>
<p style="text-align: justify;">The technical challenge lies in decompiling binary code, which can sometimes impede its integration. In such cases, the search for specific predefined indicators within the code proves to be an effective method for identifying most of hierarchical interdependencies in an appropriate format.</p>
<p style="text-align: justify;"><img loading="lazy" decoding="async" class="wp-image-22665 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage1.png" alt="" width="832" height="295" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage1.png 1129w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage1-437x155.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage1-71x25.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage1-768x272.png 768w" sizes="auto, (max-width: 832px) 100vw, 832px" /></p>
<p style="text-align: center;"><em>Types of Inputs for Generating an SBOM</em></p>
<p style="text-align: justify;">Despite these code extraction and analysis techniques, data completeness is not guaranteed, and additional verification must be considered.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>Facilitated generation but an exploitation that remains to be determined, posing numerous unanswered questions</strong></h1>
<p style="text-align: justify;"><strong> </strong>The creation of an SBOM has been significantly simplified due to the presence of major players specialized in the market, such as <strong>Dependency Track</strong>, <strong>Adolus</strong>, and <strong>Fossa</strong>, to name a few. Additionally, well-established Software Composition Analysis (<strong>SCA</strong>) tools within our clients&#8217; development teams now offer the capability to generate and read an SBOM.</p>
<p style="text-align: justify;"><strong>Generating it is no longer a major challenge today</strong>, thanks to the implementation of the standards mentioned earlier. They facilitate automated SBOM generation by providing clear guidelines on how information about components should be structured and presented. Moreover, many software development and supply chain management tools now natively integrate SBOM creation.</p>
<p style="text-align: justify;"><strong>However, the systems designed to analyze SBOMs are not yet fully mature.</strong> Clients receiving these inventories often face questions about how to use and share them with other parties. Furthermore, to this technical issue, organizational challenges are added, as the framework for use between organizations has not yet been clearly defined.</p>
<p style="text-align: justify;">Nevertheless, stakeholders are actively working to establish a secure integration architecture for these SBOMs within their <strong>CI/CD pipelines</strong>.</p>
<p style="text-align: justify;">Currently, obtaining a reliable SBOM from a third party remains a challenge. Concerns about exchange and sharing arise as soon as this topic is addressed. The <strong>diversity of contracts with suppliers</strong>, who seek to protect their intellectual property, and the challenge of <strong>centralization</strong> pose hurdles to the content of such inventories. Each inventory is developed heterogeneously, without follow-up or a uniform regulatory framework imposed. From a technical standpoint, each entity has the freedom to report the information of their choice.</p>
<p style="text-align: justify;">As of now, we observe that pioneers in the field are opting for internal generation of their SBOMs, including for third-party software. This approach offers greater control over the quality and specificity of data, underscoring the need for more detailed regulation and stricter standards to ensure the reliability of software inventory exchanges.</p>
<p style="text-align: justify;"><strong> </strong></p>
<h1 style="text-align: justify;"><strong>The SBOM Integrated into the Core of Your Software Processes</strong></h1>
<p style="text-align: justify;">All these gaps have prompted the design of an optimal, theoretically state-of-the-art process to integrate an SBOM into a CI/CD pipeline, a process that can be broken down into a few steps.</p>
<ol style="text-align: justify;">
<li><strong>Creation of an SBOM Generation and Collection Space</strong>, Automating the collection of these data to ensure their accuracy and completeness.</li>
<li><strong>Storage of SBOMs in a Repository, </strong>Configuring a centralized repository to store all generated SBOMs. This could be a version control repository or a suitable data storage system.</li>
<li><strong>Distribution of an SBOM Package upon Client Request, </strong>Ensuring that SBOMs are easily accessible, and clients can securely retrieve them on demand.</li>
</ol>
<p style="text-align: justify;"><strong> <img loading="lazy" decoding="async" class="size-full wp-image-22667 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage2.png" alt="" width="1255" height="537" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage2.png 1255w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage2-437x187.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage2-71x30.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2024/03/ENImage2-768x329.png 768w" sizes="auto, (max-width: 1255px) 100vw, 1255px" /></strong></p>
<p style="text-align: justify;">                                   <em>Projection</em> <em>on the Integration of an SBOM within a Software Supply Chain</em></p>
<p style="text-align: justify;">This theoretical outlook paves the way for the automation of the process of generating, storing, and disseminating inventories and vulnerability reports.</p>
<p style="text-align: justify;">This will provide stakeholders with the ability to:</p>
<ul style="text-align: justify;">
<li>Receive real-time SBOMs and vulnerability reports.</li>
<li>Authenticate the legitimacy of received artifacts (image containers, documents, etc.).</li>
<li>Establish trust and validation through transparency at the heart of the software production process.</li>
</ul>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>A Bright Future for SBOM?</strong></h1>
<p style="text-align: justify;"><strong> </strong>Political entities are becoming aware of the level of unpreparedness of their infrastructures in the face of increasing cyber threats. In this context, SBOM is increasingly seen as an effective means to enhance responsiveness to vulnerabilities that could simultaneously affect many companies.</p>
<p style="text-align: justify;">Even though the market is not quite ready for a widespread transition to the use of this solution, it is common for regulation, even if it may seem arbitrary, to profoundly influence the trajectory in a new direction.</p>
<p style="text-align: justify;">It is likely that Europe will eventually converge towards the regulation established in the United States, even though it still seems to be in a preliminary and incomplete stage, especially concerning the mechanisms for sharing and exchanging these inventories.</p>
<p style="text-align: justify;">In the current context, stakeholders are compelled to reassess their priority criteria. It will be important to have data on software composition, the origin of its components, their source, known vulnerabilities, and to trust the production and quality control process.</p>
<p style="text-align: justify;">However, it is necessary to bring back to the agenda the series of challenges they generally face:</p>
<ul style="text-align: justify;">
<li><strong>Incomplete or lacking data,</strong> the absence of comprehensive data on software composition can make risk assessment difficult.</li>
<li><strong>Ad hoc approaches for data sharing,</strong> non-standardized methods and improvised approaches for information sharing can make communication inefficient and unreliable.</li>
<li><strong>Additional costs for data collection and maintenance,</strong> Collecting, verifying, and updating information on software composition can incur additional costs.</li>
<li><strong>Lack of standardization,</strong> the lack of standards in collecting and sharing data makes it difficult to compare and analyze information among different stakeholders.</li>
<li><strong>Governance and data privacy,</strong> managing sensitive data on software composition raises concerns about its confidentiality, integrity, and availability.</li>
</ul>
<p style="text-align: justify;">In conclusion, the SBOM serves as a vital ally for the security of your products, enabling transparency, risk reduction, and informed decision-making throughout the software development lifecycle.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2024/03/why-is-sbom-considered-a-vital-ally-for-the-security-of-your-products/">Why is SBOM considered a vital ally for the security of your products?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2024/03/why-is-sbom-considered-a-vital-ally-for-the-security-of-your-products/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/#respond</comments>
		
		<dc:creator><![CDATA[Paul Chopineau]]></dc:creator>
		<pubDate>Fri, 07 Apr 2023 13:00:00 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20232</guid>

					<description><![CDATA[<p>Internet of Things (IoT) platforms enable the connection, management and monitoring of fleets of devices. The 3 cloud leaders, GCP, AWS and Azure each have their own offering, in a particularly fragmented sector, which sees many players competing. Azure, in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/">Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Internet of Things (IoT) platforms enable the connection, management and monitoring of fleets of devices. The 3 cloud leaders, GCP, AWS and Azure each have their own offering, in a particularly fragmented sector, which sees many players competing.</p>
<p>Azure, in recent years, has been gaining a foothold in this sector, as Gartner has pointed out, ranking them among the <strong>visionary leaders</strong> of Industrial IoT (IIoT) platforms [1] due to its capabilities, and its almost complete coverage of all use cases and industries.</p>
<p>The IoT, by nature often widely exposed, even on the Internet, can be the<strong> target of attacks</strong>. It is therefore essential to put in place security mechanisms, and to<strong> apply best practices</strong> to improve the security level of the platform and the objects that connect to it, which we will explore in this article.</p>
<p>Before moving on to specific <strong>recommendations</strong> for protecting your IoT devices and data, let&#8217;s look at how the various Azure IoT services can be used together to<strong> create secure IoT solutions</strong>.</p>
<h1><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">Presentation of the Azure IoT offer</span></h1>
<p>Microsoft Azure IoT is an <strong>end-to-end platform</strong> for connectivity, analysis and visualization of data from IoT devices. It also offers <strong>interconnection with other standard Azure services</strong> such as Azure Machine Learning and Azure SQL Database.</p>
<p>Azure IoT offers <strong>two solution ecosystems</strong> to its customers:</p>
<ul style="text-align: justify;">
<li>Azure IoT Central is a <strong>fully managed aPaaS</strong>, Platform as a Service application that <strong>simplifies the creation of IoT solutions</strong>. This service is responsible for connecting, managing and operating fleets of devices, and provides a management user interface. Azure IoT Central is an <strong>aggregate of different Azure IoT services</strong> such as Azure IoT Hub or Azure IoT Hub Device Provisioning Service (DPS).</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20200 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1.png" alt="" width="836" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1.png 836w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-294x191.png 294w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-768x499.png 768w" sizes="auto, (max-width: 836px) 100vw, 836px" /></p>
<p><em>Azure IoT Central </em><strong>offers application models</strong> according to several business domains: Retail, Health, Energy, Industry, etc., and aims at a &#8220;turnkey&#8221; implementation.  </p>
<ul style="text-align: justify;">
<li>A <strong>customised ecosystem</strong> thanks to the various Azure PaaS (Platform as a Service) services. In this ecosystem, two services; Azure IoT Hub and Azure Digital Twins are the <strong>foundations of an IoT solution</strong>. We have also combined them with Azure Device Provisioning and Azure Device Update for optimal coverage of cyber security needs.</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20202 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2.png" alt="" width="830" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2.png 830w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-768x480.png 768w" sizes="auto, (max-width: 830px) 100vw, 830px" /></p>
<p>These two ecosystems enable Azure to <strong>address all types of IoT and IIoT needs</strong>:</p>
<ul style="text-align: justify;">
<li>Azure IoT Central offers a complete service if you want to quickly develop a <strong>low-complexity application</strong> thanks to its application template catalogue.</li>
<li>If you want a <strong>custom solution</strong>, or with features not supported by Azure IoT Central: opt for an ecosystem based on Azure IoT Hub.</li>
</ul>
<p>Now that we have a good understanding of the Azure IoT ecosystems, it is important to <strong>focus on securing these ecosystems</strong>. How can we effectively protect IoT devices and data when using Azure IoT services? This is what we will explore in the following sections.</p>
<p> </p>
<h1><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">Preamble: the Azure CLI tool</span></h1>
<p>In order to manage Azure resources, Microsoft provides several tools, most of which can be used in CLI (Command Line Interface). The tool offering the most functionality for management is <strong>Azure CLI</strong>.</p>
<p>This tool, available for <strong>Windows</strong> and <strong>UNIX</strong> operating systems, allows a user who is a member of an Azure environment to <strong>manage and obtain information about Azure resources</strong>. It should be noted that the range of possibilities of this tool varies according to the rights that the user has over the resources in question.</p>
<p>To install it, Microsoft provides a <a href="https://learn.microsoft.com/fr-fr/cli/azure/install-azure-cli">dedicated page</a> explaining the steps for any type of environment.</p>
<p>In order to use it, all you must do is <strong>connect</strong> to an Azure user account via the chosen command interface (<strong>PowerShell</strong> or <strong>Bash</strong>), then <strong>enter the desired commands</strong>. Once the use of this tool is finished, a disconnection of the account is recommended.</p>
<p>A <strong>typical use</strong> of this tool is shown below:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> login [<span style="color: #808080;">-u</span> Nom d’utilisateur] [<span style="color: #808080;">&#8211;use-device</span>]</span></p>
<p><span style="color: #ffffff;">[Commandes Azure CLI] [Exemple : ]</span><br /><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> resource list</span></p>
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> logout</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">The documentation of this tool, presenting and explaining all the possible commands, is available at this </span><a style="font-size: revert;" href="https://learn.microsoft.com/fr-fr/cli/azure/reference-index?view=azure-cli-latest">address</a><span style="font-size: revert; color: initial;">.</span></p>
<p>This tool will be used later in the example of technical manipulations.</p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">1st security vector: authentication of objects</span></h1>
<p>Device authentication is crucial for an Azure infrastructure as it ensures that <strong>only authorised devices can access cloud resources</strong>. Azure IoT services support two main means of authentication for IoT devices:</p>
<ul style="text-align: justify;">
<li>A <strong>SAS Token</strong> (Shared Access Signature) is a <strong>string of characters</strong> used to authenticate devices and services. An SAP token has the following structure:</li>
</ul>
<p style="text-align: justify;"> </p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20249 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12.png" alt="" width="2426" height="637" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12.png 2426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-437x115.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-768x202.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-1536x403.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-2048x538.png 2048w" sizes="auto, (max-width: 2426px) 100vw, 2426px" /></p>
<p>This type of authentication has a <strong>defined validity period</strong> and permissions, which are assigned based on an access policy, on a <strong>given perimeter</strong>. The <strong>signature</strong>, on the other hand, is a crucial element because it is responsible for guaranteeing the security of communications between the object and Azure services, but also for proving the identity of the device. This signature is generated from a secret that must be <strong>specific to each device</strong>.</p>
<ul style="text-align: justify;">
<li>An <strong>X.509 certificate</strong> [2] is a digital certificate allowing <strong>strong authentication</strong> of the object. It contains information about the <strong>entity issuing</strong> the certificate, the validity period of the certificate and the<strong> identity of the subject</strong> (e.g. the object). One of the strengths of certificates is the ability to create chains of certificates, and thus <strong>create trust relationships</strong>:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20206 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4.png" alt="" width="844" height="426" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4.png 844w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-378x191.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-768x388.png 768w" sizes="auto, (max-width: 844px) 100vw, 844px" /></p>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">X.509 certificates offer a <strong>higher level of security</strong>, assuming a state-of-the-art cryptographic algorithm, as they <strong>allow trust relationships to be represented</strong>. However, the management and use of certificates can involve <strong>additional complexity</strong> for an IoT project.</span></p>
<p>In order to force the use of X.509 certificates to authenticate connected objects, it is possible <strong>to prohibit SAS tokens for an IoT Hub</strong>. Indeed, Azure IoT Hubs have three properties related to the <strong>use or not of SAS tokens</strong>: disableLocalAuth, disableDeviceSAS and disableModuleSAS. Therefore, the best practice associated with disabling SAS tokens is to set these three parameters to True. This can be done using the <strong>Azure CLI</strong> tool:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 836px; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az <span style="color: #ffffff;">resource update <span style="color: #808080;">&#8211;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt;<span style="color: #808080;"> &#8211;resource-type</span> Microsoft.Devices/IotHubs <span style="color: #808080;">&#8211;set</span> properties.disableDeviceSAS=true properties.disableModuleSAS=true properties.disableLocalAuth=true</span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p>Checking the values of these same parameters can also be done using the <strong>Azure CLI</strong>:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 836px; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;"><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> resource show <span style="color: #808080;">&#8212;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt; <span style="color: #808080;">&#8211;resource-type</span> Microsoft.Devices/IotHubs | <span style="color: #ffff00;">Select-String</span> <span style="color: #33cccc;">&#8220;(disableLocalAuth|disableDeviceSAS|disableModuleSAS)&#8221;</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p>In the example response below, the disableDeviceSAS property has been set correctly, but the other two have not.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20217 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9.png" alt="" width="907" height="127" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9.png 907w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-437x61.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-768x108.png 768w" sizes="auto, (max-width: 907px) 100vw, 907px" /></p>
<p style="text-align: justify;">The <strong>Azure portal</strong> also allows you to perform this verification:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20208 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5.png" alt="" width="580" height="317" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5.png 580w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5-71x39.png 71w" sizes="auto, (max-width: 580px) 100vw, 580px" /></p>
<p style="text-align: justify;">The choice of authentication method for Azure IoT will <strong>depend on the security requirements</strong> of your solution. If you need <strong>strong security</strong> and have the infrastructure to manage certificates, then <strong>X.509 certificate</strong> authentication is a good option. However, if you are looking for <strong>a solution that is simple to manage and use</strong>, the SAS token may be more suitable for your needs.</p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">2nd security vector: RBAC and alerts </span></h1>
<p>The assignment of roles on your Azure IoT infrastructure must be <strong>thoughtful and defined according to the needs of the users</strong>. A <strong>precise definition of roles and permissions</strong> makes it possible to limit access to resources and to the various functionalities available on the platform. The various Azure IoT services provide a <strong>multitude of pre-configured roles</strong> that can be adapted to your needs and your organisation. Secondly, <strong>applying the principle of least privilege</strong>, and limiting the number of accounts with important privileges, allows you to <strong>improve the security level</strong> of your Azure IoT infrastructure.</p>
<p><strong>Azure CLI </strong>allows you to <strong>list the users with rights to the desired Azure IoT</strong> resource and their associated roles. The following command allows you to perform this action</p>
<table style="border-collapse: collapse; width: 100%; height: 129px;">
<tbody>
<tr style="height: 129px;">
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid; height: 129px;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;"><span style="color: #33cccc;"><span style="color: #ffff00;">az</span> <span style="color: #ffffff;">role assignment list</span> <span style="color: #808080;">&#8211;scope</span> &#8220;/subscriptions/&lt;ID_de_souscription&gt;/resourceGroups/&lt;Resource_Group&gt;/providers/Microsoft.Devices/IotHubs/&lt;IoT_Hub&gt;&#8221; <span style="color: #808080;">&#8211;include-inherited</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p><span style="font-size: revert; color: initial;">It is possible to use string selectors (Select-String for </span><strong style="font-size: revert; color: initial;">PowerShell</strong><span style="font-size: revert; color: initial;">, grep for </span><strong style="font-size: revert; color: initial;">Bash</strong><span style="font-size: revert; color: initial;">) to retrieve only the desired information.</span></p>
<p>In the example below, <strong>names, types</strong> and <strong>roles</strong> were the only items retrieved using Select-String:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20220 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10.png" alt="" width="852" height="802" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10.png 852w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-203x191.png 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-41x39.png 41w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-768x723.png 768w" sizes="auto, (max-width: 852px) 100vw, 852px" /></p>
<p>The Azure built-in roles feature is available on <a href="https://learn.microsoft.com/fr-fr/azure/role-based-access-control/built-in-roles">this page</a>.</p>
<p>Configuring <strong>alerts based on the metrics</strong> of your Azure IoT services is another tool to consider. Alerts can be configured to detect suspicious behaviour or anomalies, <strong>allowing for rapid investigation</strong> of your infrastructure. Azure provides its customers with a large collection of signals to define alert conditions. It is also possible to <strong>define custom alert signals </strong>via the query language used by Azure Log Analytics.</p>
<p>The <strong>Azure Portal</strong> is the easiest way to set up alerts based on the data collected by the IoT Hub. For example, to define a log alert rule, you need to:</p>
<ol style="text-align: justify;">
<li>Go to the management page of the desired IoT Hub;</li>
<li>Go to the Logs sub-category of the Monitoring category;</li>
<li>Choose a rule using the Azure Log Analytics language;</li>
<li>Add an alert rule related to this query;</li>
<li>Choose the operator, unit, threshold value, check recurrence and time period for the rule</li>
</ol>
<p style="text-align: justify;">These actions are summarised in the screenshots below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20210 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6.png" alt="" width="909" height="244" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6.png 909w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-437x117.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-768x206.png 768w" sizes="auto, (max-width: 909px) 100vw, 909px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20212 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7.png" alt="" width="824" height="603" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7.png 824w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-768x562.png 768w" sizes="auto, (max-width: 824px) 100vw, 824px" /></p>
<p>It will then be sufficient to choose an <strong>action group</strong> linked to a type of action (sending an email, SMS, etc.).</p>
<p>The example given will lead to an action if the number of failed connections of connected objects to the IoT Hub concerned exceeds 10 failures in 10 minutes or less.</p>
<p>A <a href="https://learn.microsoft.com/fr-fr/azure/azure-monitor/alerts/tutorial-log-alert">detailed guide</a> in the form of a tutorial is available on the Azure documentation. Note that this service is available at an additional cost.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">3rd vector of security: the service itself </span></h1>
<p>Finally, <strong>setting up proper configuration</strong> of Azure IoT services is a key element in improving the platform&#8217;s cyber maturity level. This includes options such as <strong>routing rules</strong> or setting the minimum version of TLS used by devices to connect to Azure IoT Hub.</p>
<p><strong>Routing rules</strong> are used to <strong>redirect messages</strong> from IoT devices to an endpoint (storage, services, database, etc.) and are configurable by routing requests. It is recommended to <strong>filter incoming messages</strong>, via routing requests, to increase the security of your IoT solution.</p>
<p><strong>Checking the minimum TLS version accepted</strong> can be done using the <strong>Azure CLI</strong>: indeed, an IoT Hub has the minTlsVersion attribute to check this property. This check is performed using the following command:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az <span style="color: #ffffff;">resource show <span style="color: #808080;">&#8212;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt; <span style="color: #808080;">&#8211;resource-type</span> Microsoft.Devices/IotHubs | <span style="color: #ffff00;">Select-String</span> <span style="color: #33cccc;">&#8220;minTlsVersion&#8221;</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">Si cette commande <strong>ne retourne rien</strong>, ou retourne <strong>une valeur inférieure à 1.2</strong>, alors la configuration <strong>n’est pas satisfaisante</strong>.</p>
<p style="text-align: justify;">Le <strong>portail d’Azure</strong> permet également d’effectuer cette vérification</p>
<p>If this command <strong>returns nothing</strong>, or returns a <strong>value less than 1.2</strong>, then the configuration <strong>is not satisfactory</strong>.</p>
<p>The <strong>Azure portal</strong> also allows you to perform this check:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20214 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8.png" alt="" width="668" height="315" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8.png 668w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8-405x191.png 405w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8-71x33.png 71w" sizes="auto, (max-width: 668px) 100vw, 668px" /></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>En synthèse</strong></h1>
<p><strong>Security is a major issue for IoT projects</strong>: Microsoft, with its Azure IoT product, provides an IoT platform that meets the majority of IoT needs in a secure manner, provided that it is configured correctly. In this article, we have discussed<strong> recommendations for improving the security</strong> of your Azure IoT infrastructure.</p>
<p>It is important to keep in mind that <strong>other attack vectors exist</strong>, such as hardware and software vulnerabilities and the networks used by IoT devices.  Securing an IoT infrastructure is a <strong>complex challenge that requires an end-to-end approach</strong>.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;"><em> </em></p>
<p style="text-align: center;"><em>With the help of Marius ANDRE</em></p>
<p style="text-align: justify;">[1] “Magic Quadrant for Global Industrial IoT Platforms”</p>
<p style="text-align: justify;"><a href="https://www.gartner.com/doc/reprints?id=1-2BQFX3BJ&amp;ct=221116&amp;st=sb">https://www.gartner.com/doc/reprints?id=1-2BQFX3BJ&amp;ct=221116&amp;st=sb</a></p>
<p style="text-align: justify;">[2] “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”</p>
<p style="text-align: justify;"><a href="https://www.rfc-editor.org/rfc/rfc5280">https://www.rfc-editor.org/rfc/rfc5280</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/">Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
