<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Raquel De Faria Cristas, Auteur</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/author/raquel-de-faria-cristas/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/author/raquel-de-faria-cristas/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Mon, 31 Aug 2020 07:33:56 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>Raquel De Faria Cristas, Auteur</title>
	<link>https://www.riskinsight-wavestone.com/en/author/raquel-de-faria-cristas/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/</link>
		
		<dc:creator><![CDATA[Raquel De Faria Cristas]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 13:07:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Jitsuin]]></category>
		<category><![CDATA[POC]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Smart House]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14147</guid>

					<description><![CDATA[<p>In a previous article, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the “Security Twins” can improve the security of physical accesses to a building...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In a <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">previous article</a>, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the “Security Twins” can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: “Jitsuin Archivist”.</p>
<p>&nbsp;</p>
<h2>What does “Jitsuin Archivist” look like?</h2>
<p style="text-align: justify;">The start-up Jitsuin has developed a tool called &#8220;Jitsuin Archivist&#8221; based on Distributed Ledger Technology (DLT). The purpose of this tool is to know &#8220;Who did what to a Thing and When”.</p>
<p style="text-align: justify;">As of today, 5 types of users can interact with the tool: Archivist Administrator, System Administrator, Maintenance Operator, Auditor, Custom (currently in beta version).</p>
<p>&nbsp;</p>
<figure id="post-14148 media-14148" class="align-none"><img fetchpriority="high" decoding="async" class="aligncenter wp-image-14148 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1.png" alt="" width="1277" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1.png 1277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-437x94.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-768x165.png 768w" sizes="(max-width: 1277px) 100vw, 1277px" /></figure>
<p style="text-align: center;">Figure 1 – The 5 user roles of “Jitsuin Archivist”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">On this tool the user has access to the &#8220;Security Twins&#8221; of the connected devices. Indeed, after logging in, the user accesses a dashboard through which he has a global view of all the connected devices linked to the tool. He can see relevant statistics related to his IoT deployment, such as the number of critical incidents, the activity of connected objects, etc.</p>
<p style="text-align: justify;">The user can also access the &#8220;Manage Assets&#8221; page where he will find a map with the location of all the connected objects linked to the tool and a list of them (where he can also see in more detail the events linked to a particular connected device).</p>
<p>&nbsp;</p>
<figure id="post-14150 media-14150" class="align-none"><img decoding="async" class="aligncenter wp-image-14150 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2.png" alt="" width="1339" height="653" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2.png 1339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-392x191.png 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-768x375.png 768w" sizes="(max-width: 1339px) 100vw, 1339px" /></figure>
<p style="text-align: center;">Figure 2 &#8211; The different views of the tool &#8220;Jitsuin Archivist&#8221;: 1. dashboard with a global view, 2. all the objects and their location, 3. detailed view of an object, 4. all the actions of the object useful during security audits</p>
<p>&nbsp;</p>
<h2>The PoC: A House with a digital lock</h2>
<p style="text-align: justify;">Wavestone used Jitsuin&#8217;s tool to first address the issue of identity and access management in buildings in at the dawn of digital transformation and the to illustrate the usefulness of &#8220;Security Twins&#8221;.</p>
<p style="text-align: justify;">To do this Wavestone used the lego house &#8220;SmartHouse&#8221; :</p>
<p>&nbsp;</p>
<figure id="post-14152 media-14152" class="align-none"><img decoding="async" class="aligncenter wp-image-14152 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3.jpg" alt="" width="1085" height="955" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3.jpg 1085w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-217x191.jpg 217w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-44x39.jpg 44w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-768x676.jpg 768w" sizes="(max-width: 1085px) 100vw, 1085px" /></figure>
<p style="text-align: center;">Figure 3 – The “SmartHouse”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Equipped with an RFID card reader, a Raspberry Pi microcontroller and a servomotor, the entrance door of the &#8220;SmartHouse&#8221; only opens to users who have an authorized access card. All actions related to opening, closing, granting of entry rights, etc. are recorded on &#8220;Jitsuin Archivist&#8221; (see figure 4).</p>
<p>&nbsp;</p>
<figure id="post-14154 media-14154" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14154 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4.png" alt="" width="1037" height="474" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4.png 1037w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-768x351.png 768w" sizes="auto, (max-width: 1037px) 100vw, 1037px" /></figure>
<p style="text-align: center;">Figure 4 – The functional diagram of the “SmartHouse”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">In order to facilitate the interaction with the digital lock of the “SmartHouse”, a platform allowing the simulation of different operations made by different peopled involved in the life cycle of connected devices has been created using the Django web framework and Bootstrap. This platform allows, among other things, to:</p>
<ul style="text-align: justify;">
<li>Send security patches to the connected lock (using Azure IoTHub)</li>
<li>Assign access rights to the “SmartHouse”</li>
<li>View the history of access rights requests made and those awaiting validation, etc.</li>
</ul>
<p style="text-align: justify;">This is what the platform looks like:</p>
<p>&nbsp;</p>
<figure id="post-14156 media-14156" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14156 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5.png" alt="" width="1426" height="729" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5.png 1426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-768x393.png 768w" sizes="auto, (max-width: 1426px) 100vw, 1426px" /></figure>
<p style="text-align: center;">Figure 5 &#8211; SmartHouse&#8217;s management platform</p>
<p>&nbsp;</p>
<p style="text-align: justify;">The use of “Jitsuin Archivist” in this PoC is very interesting when regards to security audits of connected devices. Indeed, as “Jitsuin Archivist” is based on Distributed Ledger Technology (DLT), this system can be considered as &#8220;secure by design&#8221; since an auditor has a technical guarantee on the non-compromise of data (provided that the sending of this data is secure).</p>
<p style="text-align: justify;">Here is the &#8220;Auditor View&#8221; on “Jitsuin Archivist” where it is possible to see all the information regarding the connected devices linked to the platform and to know who has done what to the connected device:</p>
<p>&nbsp;</p>
<figure id="post-14158 media-14158" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14158 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6.png" alt="" width="1804" height="884" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6.png 1804w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-390x191.png 390w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-768x376.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-1536x753.png 1536w" sizes="auto, (max-width: 1804px) 100vw, 1804px" /></figure>
<p style="text-align: center;">Figure 6 &#8211; The &#8220;Auditor View&#8221; of “Jitsuin Archivist”</p>
<p>&nbsp;</p>
<h2>The PoC scenario: WaveHouse rents “SmartHouses” in France &#8230;</h2>
<figure id="post-14160 media-14160" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14160 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7.png" alt="" width="1246" height="566" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7.png 1246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-420x191.png 420w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-768x349.png 768w" sizes="auto, (max-width: 1246px) 100vw, 1246px" /></figure>
<p>Here is the general architecture of the PoC:</p>
<p>&nbsp;</p>
<figure id="post-14162 media-14162" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14162 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8.png" alt="" width="1326" height="831" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8.png 1326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-768x481.png 768w" sizes="auto, (max-width: 1326px) 100vw, 1326px" /></figure>
<p style="text-align: center;">Figure 7 &#8211; The general architecture of the PoC</p>
<p>&nbsp;</p>
<p style="text-align: justify;">As one can see, the digital lock (represented by the RFID card reader, the Raspberry Pi microcontroller and the servomotor) interacts with Azure IoTHub as well to facilitate the management of its firmware updates.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The main use cases studied by Wavestone and Jitsuin</h2>
<p>The main use cases studied by Wavestone and Jitsuin are explained in the video below:</p>
<div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-14147-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4?_=1" /><a href="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4">https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4</a></video></div>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p style="text-align: justify;">Wavestone and Jitsuin were able to demonstrate &#8211; with the different use cases illustrated above in the video &#8211; how to improve the security of connected devices:</p>
<ul style="text-align: justify;">
<li>First of all, all of the people involved in the life cycle of the digital lock of the “SmartHouse” had access to its &#8220;Security Twin&#8221;. Indeed, each of them had access to a decentralized and unchangeable register provided by “Jitsuin Archivist” with all the information regarding the security of the digital lock.</li>
<li>Then, as mentioned above, this architecture is &#8220;secure by design&#8221; because as “Jitsuin Archivist” is based on Distributed Ledger Technology (DLT), one has a technical guarantee on the non-compromising of data.</li>
<li>The &#8220;Security Twin&#8221; of the digital lock ensured physical security since it had the rights management information, allowing all the people involved to know who had access to the &#8220;SmartHouse&#8221;.</li>
<li>Finally, since the “Security Twin” also had firmware information, the different people involved could easily know which connected devices had vulnerabilities and quickly plan the distribution of security patches.</li>
</ul>
<p style="text-align: justify;">The &#8220;Security Twins&#8221; would therefore ultimately improve the security of the connected devices, since it would be easy to know which objects are secure and which are not.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/</link>
		
		<dc:creator><![CDATA[Raquel De Faria Cristas]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 12:55:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[connected device]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NIST]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13959</guid>

					<description><![CDATA[<p>In 2010, the early hype-cycle of IoT (Ericsson and Cisco) predicted 50 billion devices by 2020. In reality, that figure was highly overestimated. Today, Gartner states that approximately 5.8 billion IoT terminals will be in use in 20201. Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In 2010, the early hype-cycle of IoT (Ericsson and Cisco) predicted 50 billion devices by 2020. In reality, that figure was highly overestimated. Today, Gartner states that approximately 5.8 billion IoT terminals will be in use in 2020<sup>1</sup>. Even if the market is not as developed as it was first predicted, it is still growing: those 5.8 billion of IoT devices represent <strong>an increase of 21%</strong> over 2019.</p>
<p>Despite their usefulness, introducing connected devices unfortunately brings <strong>new risks</strong> for companies. Indeed, according to the Palo Alto Networks report<sup>2</sup> published in March 2020, <strong>57% of the connected devices analyzed were vulnerable to medium or high severity attacks</strong>. This is not surprising. Securing connected devices is proving to be an arduous task that explains why Beecham Research<sup>3</sup> finds 62% of Industrial IoT transformations fail to scale because of a lack of trust.</p>
<p>Therefore, with this article we will try to ask ourselves about the security and trust issues of connected devices and how companies can deal with them.</p>
<p>&nbsp;</p>
<h2>What are the security and trust issues of connected devices?</h2>
<p style="text-align: justify;">In order to mitigate the security risks on connected devices, NIST recommends in its report<sup>4</sup> published in 2019 to focus on 6 main areas:</p>
<ul>
<li style="text-align: justify;"><strong>Inventory</strong>: Maintain an accurate inventory of all connected devices and their most relevant characteristics throughout their lifecycle (<a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">see the article</a> detailing the lifecycle of connected devices).</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13960 media-13960" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13960 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1.png" alt="" width="1479" height="755" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1.png 1479w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1-768x392.png 768w" sizes="auto, (max-width: 1479px) 100vw, 1479px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; Connected device lifecycle</p>
<ul>
<li style="text-align: justify;"><strong>Vulnerabilities</strong>: Identify and eliminate known vulnerabilities in the software and firmware of connected devices to reduce the likelihood and ease of exploitation and compromise.</li>
<li style="text-align: justify;"><strong>Access</strong>: Prevent unauthorized and inappropriate physical and logical access, use and administration of connected devices by people, processes and other computing devices.</li>
<li style="text-align: justify;"><strong>Detect security incidents of connected devices</strong>: Monitor and analyze connected device activity for signs of incidents involving the security of the device.</li>
<li style="text-align: justify;"><strong>Detect data security incidents</strong>: Monitor and analyze the activity of the connected device for signs of data security incidents.</li>
<li style="text-align: justify;"><strong>Protect data</strong>: Prevent access and alteration of data that could expose sensitive information or allow manipulation or disruption of the operation of connected devices.</li>
</ul>
<p style="text-align: justify;">However, current IoT platforms only partially meet these security requirements (<a href="https://www.wavestone.com/en/insight/iot-platforms-cornerstone-successful-iot-strategy/">see the article</a> detailing the usefulness of IoT platforms).</p>
<p>&nbsp;</p>
<p id="post-13962 media-13962" class="align-none" style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-13962 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1.png" alt="" width="1073" height="329" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1.png 1073w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1-437x134.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1-768x235.png 768w" sizes="auto, (max-width: 1073px) 100vw, 1073px" />Figure 2 &#8211; The usefulness of IoT platforms</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Indeed, traditional IoT architectures rely on a <strong>centralized cloud platform</strong>, operated by a third-party company and where most often the rules for data collection and storage are opaque. <strong>This is not the best solution to ensure the security of connected devices since</strong>:</p>
<ul>
<li>The use of a centralized cloud platform introduces the risk of &#8220;<strong>single point of failure</strong>&#8221; on the <strong>IoT architecture</strong> (although today this risk is mitigated with the implementation of a redundant architecture and backups).</li>
<li>It is entirely possible for an attacker to <strong>change the data stored in the cloud database</strong>. The decision making of the different stakeholders is therefore impacted.</li>
<li><strong>Collaboration</strong> between the different stakeholders of the IoT deployment (manufacturers, maintenance operators, &#8230;) becomes more <strong>difficult</strong> because access to the platform can be restricted to them.</li>
</ul>
<p style="text-align: justify;">The use of a <strong>decentralized management system</strong> for connected devices where all stakeholders would have the possibility to <strong>reliably consult or contribute information</strong> regarding connected devices (firmware version, maintenance operations, etc.) becomes essential to guarantee the security of those devices and the integrity of data they produce.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">How do &#8220;Security Twins&#8221; help meet the security challenges of connected devices?</h2>
<p>In order to support IoT platforms and improve the security of IoT deployments, the notion of  <strong>&#8220;Security Twin&#8221; should be introduced in IoT deployments.</strong></p>
<p>The principle of a &#8220;Security Twin&#8221; is simple. It is a <strong>virtual representation</strong> of the connected device that <strong>contains all its security information</strong>, such as firmware version, vulnerabilities, etc. upon which all stakeholders involved in its upkeep can reach consensus (see figure 3).</p>
<p>&nbsp;</p>
<figure id="post-13966 media-13966" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13966 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1.png" alt="" width="1012" height="459" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1.png 1012w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-421x191.png 421w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-768x348.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-730x330.png 730w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; The &#8220;Security Twin&#8221; mechanism (from: Jitsuin)</p>
<p>&nbsp;</p>
<p>A &#8220;Security Twin&#8221; gains effectiveness when more <strong>stakeholders</strong> of the deployment <strong>can interact with it</strong> and reach consensus that the<strong> information provided/recorded is correct</strong>.</p>
<p>Therefore, solutions based on <strong>Distributed Ledger Technology (DLT)</strong> represent a logical first step in the creation of Security Twins, as they would allow the security information of the connected device to be gathered in <strong>a decentralized and immutable registry</strong> that would be accessible by all authorized stakeholders in the IoT deployment. The best well known distributed registry solution is the Blockchain (<a href="https://www.wavestone.com/en/insight/blockchain-practice/">see the article</a> on Blockchain’s uses and limitations).</p>
<p>Taking up the points raised earlier in the NIST report, one could say that the use of a &#8220;Security Twin&#8221; would therefore improve:</p>
<ul>
<li><strong>Device and access management</strong>: all stakeholders of the IoT deployment would have access to a decentralized and immutable register of all the connected devices with the corresponding security and trust information.</li>
<li><strong>Vulnerability management and the detection of device security incidents</strong>: the different stakeholders could share device security information and take the necessary actions (e.g. the manufacturer of a connected device could notify the other stakeholders of the availability of a new firmware update thanks to the &#8220;Security Twin&#8221;).</li>
<li><strong>Data protection and the detection of data related security incidents</strong>: The very foundation of a &#8220;Security Twin&#8221; is based on the use of a decentralized and immutable register to record data related to the security of connected devices. This makes it more difficult for attackers to change the data, which reduces the risk of a security incident.</li>
</ul>
<p>The use of &#8220;Security Twins&#8221; therefore offers the possibility of strengthening the security, integrity, trust and resilience of connected devices.</p>
<p>The start-up Jitsuin has developed &#8220;Jitsuin Archivist&#8221; a tool based on Distributed Ledger Technology (DLT) to overcome the lack of collaborative tools to secure connected devices. The purpose of this tool is not to replace IoT platforms but to allow the creation of &#8220;Security Twins&#8221;.</p>
<p>Together, Wavestone and <a href="https://jitsuin.com/">Jitsuin</a> sought to demonstrate the benefits of using a decentralized architecture with “Security Twins”. The two companies have therefore collaborated on the construction of a PoC (Proof of Concept) to tackle identity and access management of buildings using connected devices, which will be introduced in a future article.</p>
<p>&nbsp;</p>
<p>1 Gartner, 29th August 2019 : https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io<br />
2 Palo Alto Networks, 10th March 2020, “Unit 42 IoT threat report”: https://unit42.paloaltonetworks.com/iot-threat-report-2020/<br />
3 Why IoT projects fail https://www.whyiotprojectsfail.com/?cs=br2<br />
4 NIST – “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks” : https://csrc.nist.gov/publications/detail/nistir/8228/final</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
