<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>IoT - RiskInsight</title>
	<atom:link href="https://www.riskinsight-wavestone.com/en/tag/iot-en/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.riskinsight-wavestone.com/en/tag/iot-en/</link>
	<description>The cybersecurity &#38; digital trust blog by Wavestone&#039;s consultants</description>
	<lastBuildDate>Wed, 12 Apr 2023 16:46:21 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.riskinsight-wavestone.com/wp-content/uploads/2024/02/Blogs-2024_RI-39x39.png</url>
	<title>IoT - RiskInsight</title>
	<link>https://www.riskinsight-wavestone.com/en/tag/iot-en/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</title>
		<link>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/</link>
					<comments>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/#respond</comments>
		
		<dc:creator><![CDATA[Arnaud Soullié]]></dc:creator>
		<pubDate>Fri, 07 Apr 2023 13:00:00 +0000</pubDate>
				<category><![CDATA[Deep-dive]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[Azure]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[RBAC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=20232</guid>

					<description><![CDATA[<p>Internet of Things (IoT) platforms enable the connection, management and monitoring of fleets of devices. The 3 cloud leaders, GCP, AWS and Azure each have their own offering, in a particularly fragmented sector, which sees many players competing. Azure, in...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/">Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Internet of Things (IoT) platforms enable the connection, management and monitoring of fleets of devices. The 3 cloud leaders, GCP, AWS and Azure each have their own offering, in a particularly fragmented sector, which sees many players competing.</p>
<p>Azure, in recent years, has been gaining a foothold in this sector, as Gartner has pointed out, ranking them among the <strong>visionary leaders</strong> of Industrial IoT (IIoT) platforms [1] due to its capabilities, and its almost complete coverage of all use cases and industries.</p>
<p>The IoT, by nature often widely exposed, even on the Internet, can be the<strong> target of attacks</strong>. It is therefore essential to put in place security mechanisms, and to<strong> apply best practices</strong> to improve the security level of the platform and the objects that connect to it, which we will explore in this article.</p>
<p>Before moving on to specific <strong>recommendations</strong> for protecting your IoT devices and data, let&#8217;s look at how the various Azure IoT services can be used together to<strong> create secure IoT solutions</strong>.</p>
<h1><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">Presentation of the Azure IoT offer</span></h1>
<p>Microsoft Azure IoT is an <strong>end-to-end platform</strong> for connectivity, analysis and visualization of data from IoT devices. It also offers <strong>interconnection with other standard Azure services</strong> such as Azure Machine Learning and Azure SQL Database.</p>
<p>Azure IoT offers <strong>two solution ecosystems</strong> to its customers:</p>
<ul style="text-align: justify;">
<li>Azure IoT Central is a <strong>fully managed aPaaS</strong>, Platform as a Service application that <strong>simplifies the creation of IoT solutions</strong>. This service is responsible for connecting, managing and operating fleets of devices, and provides a management user interface. Azure IoT Central is an <strong>aggregate of different Azure IoT services</strong> such as Azure IoT Hub or Azure IoT Hub Device Provisioning Service (DPS).</li>
</ul>
<p><img fetchpriority="high" decoding="async" class="aligncenter wp-image-20200 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1.png" alt="" width="836" height="543" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1.png 836w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-294x191.png 294w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-60x39.png 60w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image1-768x499.png 768w" sizes="(max-width: 836px) 100vw, 836px" /></p>
<p><em>Azure IoT Central </em><strong>offers application models</strong> according to several business domains: Retail, Health, Energy, Industry, etc., and aims at a &#8220;turnkey&#8221; implementation.  </p>
<ul style="text-align: justify;">
<li>A <strong>customised ecosystem</strong> thanks to the various Azure PaaS (Platform as a Service) services. In this ecosystem, two services; Azure IoT Hub and Azure Digital Twins are the <strong>foundations of an IoT solution</strong>. We have also combined them with Azure Device Provisioning and Azure Device Update for optimal coverage of cyber security needs.</li>
</ul>
<p><img decoding="async" class="aligncenter wp-image-20202 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2.png" alt="" width="830" height="519" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2.png 830w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image2-768x480.png 768w" sizes="(max-width: 830px) 100vw, 830px" /></p>
<p>These two ecosystems enable Azure to <strong>address all types of IoT and IIoT needs</strong>:</p>
<ul style="text-align: justify;">
<li>Azure IoT Central offers a complete service if you want to quickly develop a <strong>low-complexity application</strong> thanks to its application template catalogue.</li>
<li>If you want a <strong>custom solution</strong>, or with features not supported by Azure IoT Central: opt for an ecosystem based on Azure IoT Hub.</li>
</ul>
<p>Now that we have a good understanding of the Azure IoT ecosystems, it is important to <strong>focus on securing these ecosystems</strong>. How can we effectively protect IoT devices and data when using Azure IoT services? This is what we will explore in the following sections.</p>
<p> </p>
<h1><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">Preamble: the Azure CLI tool</span></h1>
<p>In order to manage Azure resources, Microsoft provides several tools, most of which can be used in CLI (Command Line Interface). The tool offering the most functionality for management is <strong>Azure CLI</strong>.</p>
<p>This tool, available for <strong>Windows</strong> and <strong>UNIX</strong> operating systems, allows a user who is a member of an Azure environment to <strong>manage and obtain information about Azure resources</strong>. It should be noted that the range of possibilities of this tool varies according to the rights that the user has over the resources in question.</p>
<p>To install it, Microsoft provides a <a href="https://learn.microsoft.com/fr-fr/cli/azure/install-azure-cli">dedicated page</a> explaining the steps for any type of environment.</p>
<p>In order to use it, all you must do is <strong>connect</strong> to an Azure user account via the chosen command interface (<strong>PowerShell</strong> or <strong>Bash</strong>), then <strong>enter the desired commands</strong>. Once the use of this tool is finished, a disconnection of the account is recommended.</p>
<p>A <strong>typical use</strong> of this tool is shown below:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> login [<span style="color: #808080;">-u</span> Nom d’utilisateur] [<span style="color: #808080;">&#8211;use-device</span>]</span></p>
<p><span style="color: #ffffff;">[Commandes Azure CLI] [Exemple : ]</span><br /><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> resource list</span></p>
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> logout</span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">The documentation of this tool, presenting and explaining all the possible commands, is available at this </span><a style="font-size: revert;" href="https://learn.microsoft.com/fr-fr/cli/azure/reference-index?view=azure-cli-latest">address</a><span style="font-size: revert; color: initial;">.</span></p>
<p>This tool will be used later in the example of technical manipulations.</p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">1st security vector: authentication of objects</span></h1>
<p>Device authentication is crucial for an Azure infrastructure as it ensures that <strong>only authorised devices can access cloud resources</strong>. Azure IoT services support two main means of authentication for IoT devices:</p>
<ul style="text-align: justify;">
<li>A <strong>SAS Token</strong> (Shared Access Signature) is a <strong>string of characters</strong> used to authenticate devices and services. An SAP token has the following structure:</li>
</ul>
<p style="text-align: justify;"> </p>
<p><img decoding="async" class="aligncenter wp-image-20249 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12.png" alt="" width="2426" height="637" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12.png 2426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-437x115.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-768x202.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-1536x403.png 1536w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image12-2048x538.png 2048w" sizes="(max-width: 2426px) 100vw, 2426px" /></p>
<p>This type of authentication has a <strong>defined validity period</strong> and permissions, which are assigned based on an access policy, on a <strong>given perimeter</strong>. The <strong>signature</strong>, on the other hand, is a crucial element because it is responsible for guaranteeing the security of communications between the object and Azure services, but also for proving the identity of the device. This signature is generated from a secret that must be <strong>specific to each device</strong>.</p>
<ul style="text-align: justify;">
<li>An <strong>X.509 certificate</strong> [2] is a digital certificate allowing <strong>strong authentication</strong> of the object. It contains information about the <strong>entity issuing</strong> the certificate, the validity period of the certificate and the<strong> identity of the subject</strong> (e.g. the object). One of the strengths of certificates is the ability to create chains of certificates, and thus <strong>create trust relationships</strong>:</li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20206 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4.png" alt="" width="844" height="426" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4.png 844w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-378x191.png 378w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image4-768x388.png 768w" sizes="auto, (max-width: 844px) 100vw, 844px" /></p>
<p style="text-align: justify;"><span style="font-size: revert; color: initial;">X.509 certificates offer a <strong>higher level of security</strong>, assuming a state-of-the-art cryptographic algorithm, as they <strong>allow trust relationships to be represented</strong>. However, the management and use of certificates can involve <strong>additional complexity</strong> for an IoT project.</span></p>
<p>In order to force the use of X.509 certificates to authenticate connected objects, it is possible <strong>to prohibit SAS tokens for an IoT Hub</strong>. Indeed, Azure IoT Hubs have three properties related to the <strong>use or not of SAS tokens</strong>: disableLocalAuth, disableDeviceSAS and disableModuleSAS. Therefore, the best practice associated with disabling SAS tokens is to set these three parameters to True. This can be done using the <strong>Azure CLI</strong> tool:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 836px; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az <span style="color: #ffffff;">resource update <span style="color: #808080;">&#8211;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt;<span style="color: #808080;"> &#8211;resource-type</span> Microsoft.Devices/IotHubs <span style="color: #808080;">&#8211;set</span> properties.disableDeviceSAS=true properties.disableModuleSAS=true properties.disableLocalAuth=true</span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p>Checking the values of these same parameters can also be done using the <strong>Azure CLI</strong>:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 836px; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;"><span style="color: #ffffff;"><span style="color: #ffff00;">az</span> resource show <span style="color: #808080;">&#8212;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt; <span style="color: #808080;">&#8211;resource-type</span> Microsoft.Devices/IotHubs | <span style="color: #ffff00;">Select-String</span> <span style="color: #33cccc;">&#8220;(disableLocalAuth|disableDeviceSAS|disableModuleSAS)&#8221;</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p>In the example response below, the disableDeviceSAS property has been set correctly, but the other two have not.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20217 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9.png" alt="" width="907" height="127" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9.png 907w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-437x61.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-71x10.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image9-768x108.png 768w" sizes="auto, (max-width: 907px) 100vw, 907px" /></p>
<p style="text-align: justify;">The <strong>Azure portal</strong> also allows you to perform this verification:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20208 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5.png" alt="" width="580" height="317" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5.png 580w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5-349x191.png 349w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image5-71x39.png 71w" sizes="auto, (max-width: 580px) 100vw, 580px" /></p>
<p style="text-align: justify;">The choice of authentication method for Azure IoT will <strong>depend on the security requirements</strong> of your solution. If you need <strong>strong security</strong> and have the infrastructure to manage certificates, then <strong>X.509 certificate</strong> authentication is a good option. However, if you are looking for <strong>a solution that is simple to manage and use</strong>, the SAS token may be more suitable for your needs.</p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">2nd security vector: RBAC and alerts </span></h1>
<p>The assignment of roles on your Azure IoT infrastructure must be <strong>thoughtful and defined according to the needs of the users</strong>. A <strong>precise definition of roles and permissions</strong> makes it possible to limit access to resources and to the various functionalities available on the platform. The various Azure IoT services provide a <strong>multitude of pre-configured roles</strong> that can be adapted to your needs and your organisation. Secondly, <strong>applying the principle of least privilege</strong>, and limiting the number of accounts with important privileges, allows you to <strong>improve the security level</strong> of your Azure IoT infrastructure.</p>
<p><strong>Azure CLI </strong>allows you to <strong>list the users with rights to the desired Azure IoT</strong> resource and their associated roles. The following command allows you to perform this action</p>
<table style="border-collapse: collapse; width: 100%; height: 129px;">
<tbody>
<tr style="height: 129px;">
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid; height: 129px;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;"><span style="color: #33cccc;"><span style="color: #ffff00;">az</span> <span style="color: #ffffff;">role assignment list</span> <span style="color: #808080;">&#8211;scope</span> &#8220;/subscriptions/&lt;ID_de_souscription&gt;/resourceGroups/&lt;Resource_Group&gt;/providers/Microsoft.Devices/IotHubs/&lt;IoT_Hub&gt;&#8221; <span style="color: #808080;">&#8211;include-inherited</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p><span style="font-size: revert; color: initial;">It is possible to use string selectors (Select-String for </span><strong style="font-size: revert; color: initial;">PowerShell</strong><span style="font-size: revert; color: initial;">, grep for </span><strong style="font-size: revert; color: initial;">Bash</strong><span style="font-size: revert; color: initial;">) to retrieve only the desired information.</span></p>
<p>In the example below, <strong>names, types</strong> and <strong>roles</strong> were the only items retrieved using Select-String:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20220 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10.png" alt="" width="852" height="802" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10.png 852w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-203x191.png 203w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-41x39.png 41w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image10-768x723.png 768w" sizes="auto, (max-width: 852px) 100vw, 852px" /></p>
<p>The Azure built-in roles feature is available on <a href="https://learn.microsoft.com/fr-fr/azure/role-based-access-control/built-in-roles">this page</a>.</p>
<p>Configuring <strong>alerts based on the metrics</strong> of your Azure IoT services is another tool to consider. Alerts can be configured to detect suspicious behaviour or anomalies, <strong>allowing for rapid investigation</strong> of your infrastructure. Azure provides its customers with a large collection of signals to define alert conditions. It is also possible to <strong>define custom alert signals </strong>via the query language used by Azure Log Analytics.</p>
<p>The <strong>Azure Portal</strong> is the easiest way to set up alerts based on the data collected by the IoT Hub. For example, to define a log alert rule, you need to:</p>
<ol style="text-align: justify;">
<li>Go to the management page of the desired IoT Hub;</li>
<li>Go to the Logs sub-category of the Monitoring category;</li>
<li>Choose a rule using the Azure Log Analytics language;</li>
<li>Add an alert rule related to this query;</li>
<li>Choose the operator, unit, threshold value, check recurrence and time period for the rule</li>
</ol>
<p style="text-align: justify;">These actions are summarised in the screenshots below:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20210 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6.png" alt="" width="909" height="244" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6.png 909w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-437x117.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-71x19.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image6-768x206.png 768w" sizes="auto, (max-width: 909px) 100vw, 909px" /></p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20212 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7.png" alt="" width="824" height="603" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7.png 824w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-261x191.png 261w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-53x39.png 53w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image7-768x562.png 768w" sizes="auto, (max-width: 824px) 100vw, 824px" /></p>
<p>It will then be sufficient to choose an <strong>action group</strong> linked to a type of action (sending an email, SMS, etc.).</p>
<p>The example given will lead to an action if the number of failed connections of connected objects to the IoT Hub concerned exceeds 10 failures in 10 minutes or less.</p>
<p>A <a href="https://learn.microsoft.com/fr-fr/azure/azure-monitor/alerts/tutorial-log-alert">detailed guide</a> in the form of a tutorial is available on the Azure documentation. Note that this service is available at an additional cost.</p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><span lang="EN-GB" style="font-size: 20.0pt; line-height: 107%;">3rd vector of security: the service itself </span></h1>
<p>Finally, <strong>setting up proper configuration</strong> of Azure IoT services is a key element in improving the platform&#8217;s cyber maturity level. This includes options such as <strong>routing rules</strong> or setting the minimum version of TLS used by devices to connect to Azure IoT Hub.</p>
<p><strong>Routing rules</strong> are used to <strong>redirect messages</strong> from IoT devices to an endpoint (storage, services, database, etc.) and are configurable by routing requests. It is recommended to <strong>filter incoming messages</strong>, via routing requests, to increase the security of your IoT solution.</p>
<p><strong>Checking the minimum TLS version accepted</strong> can be done using the <strong>Azure CLI</strong>: indeed, an IoT Hub has the minTlsVersion attribute to check this property. This check is performed using the following command:</p>
<table style="border-collapse: collapse; width: 100%;">
<tbody>
<tr>
<td style="width: 100%; background-color: #002060; border-color: #002060; border-style: solid;">
<p><span style="color: #ffffff;"><span style="color: #ffff00;">az <span style="color: #ffffff;">resource show <span style="color: #808080;">&#8212;resource-group</span> &lt;Resource_Group&gt; <span style="color: #808080;">-n</span> &lt;IoT_Hub&gt; <span style="color: #808080;">&#8211;resource-type</span> Microsoft.Devices/IotHubs | <span style="color: #ffff00;">Select-String</span> <span style="color: #33cccc;">&#8220;minTlsVersion&#8221;</span></span></span></span></p>
</td>
</tr>
</tbody>
</table>
<p style="text-align: justify;">Si cette commande <strong>ne retourne rien</strong>, ou retourne <strong>une valeur inférieure à 1.2</strong>, alors la configuration <strong>n’est pas satisfaisante</strong>.</p>
<p style="text-align: justify;">Le <strong>portail d’Azure</strong> permet également d’effectuer cette vérification</p>
<p>If this command <strong>returns nothing</strong>, or returns a <strong>value less than 1.2</strong>, then the configuration <strong>is not satisfactory</strong>.</p>
<p>The <strong>Azure portal</strong> also allows you to perform this check:</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-20214 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8.png" alt="" width="668" height="315" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8.png 668w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8-405x191.png 405w, https://www.riskinsight-wavestone.com/wp-content/uploads/2023/04/Image8-71x33.png 71w" sizes="auto, (max-width: 668px) 100vw, 668px" /></p>
<p style="text-align: justify;"> </p>
<h1 style="text-align: justify;"><strong>En synthèse</strong></h1>
<p><strong>Security is a major issue for IoT projects</strong>: Microsoft, with its Azure IoT product, provides an IoT platform that meets the majority of IoT needs in a secure manner, provided that it is configured correctly. In this article, we have discussed<strong> recommendations for improving the security</strong> of your Azure IoT infrastructure.</p>
<p>It is important to keep in mind that <strong>other attack vectors exist</strong>, such as hardware and software vulnerabilities and the networks used by IoT devices.  Securing an IoT infrastructure is a <strong>complex challenge that requires an end-to-end approach</strong>.</p>
<p style="text-align: justify;"><strong> </strong></p>
<p style="text-align: justify;"><em> </em></p>
<p style="text-align: center;"><em>With the help of Marius ANDRE</em></p>
<p style="text-align: justify;">[1] “Magic Quadrant for Global Industrial IoT Platforms”</p>
<p style="text-align: justify;"><a href="https://www.gartner.com/doc/reprints?id=1-2BQFX3BJ&amp;ct=221116&amp;st=sb">https://www.gartner.com/doc/reprints?id=1-2BQFX3BJ&amp;ct=221116&amp;st=sb</a></p>
<p style="text-align: justify;">[2] “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile”</p>
<p style="text-align: justify;"><a href="https://www.rfc-editor.org/rfc/rfc5280">https://www.rfc-editor.org/rfc/rfc5280</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/">Improving the security of your IoT infrastructure: configuration tips and best practices on Azure IoT</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.riskinsight-wavestone.com/en/2023/04/improving-the-security-of-your-iot-infrastructure-configuration-tips-and-best-practices-on-azure-iot/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Connecting your connected coffee machine: yes, but how?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/04/connecting-your-connected-coffe-machine-yes-but-how/</link>
		
		<dc:creator><![CDATA[Paul Fauchet]]></dc:creator>
		<pubDate>Mon, 05 Apr 2021 07:00:43 +0000</pubDate>
				<category><![CDATA[How to]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[risk analysis]]></category>
		<category><![CDATA[use cases]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=15425</guid>

					<description><![CDATA[<p>Networks are at the backbone of every modern systems; for the ecosystems of connected objects, this is no exception. In this article, we will provide you with a methodology to use from the get-go to help in choosing a secure...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/connecting-your-connected-coffe-machine-yes-but-how/">Connecting your connected coffee machine: yes, but how?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Networks are at the backbone of every modern systems; for the ecosystems of connected objects, this is no exception. In this article, we will provide you with a methodology to use from the get-go to help in choosing a secure and suitable network for your IoT project.</p>
<p>In this example, we will assume that you are a coffee machine manufacturer. Your current project is to build a connected coffee machine for your corporate customers. You have identified multiple use cases for this IoT machine. For instance, it automatically orders new coffee capsules when the stock falls below a certain threshold. A second option would be that the coffee machine, sends automatic alerts to your servers when maintenance management such as cleaning, repairs, etc. is needed. Finally, it offers your clients functionalities for monitoring consumption.</p>
<p>How can you choose the right network for your needs? What questions should you ask yourself? How do you make a good choice while considering the overall security of your system?</p>
<p>&nbsp;</p>
<h2>First Step – Define your business requirements and perform a risk analysis</h2>
<p>First, you must identify the requirements for your IoT network which are twofold: business and security requirements. We characterize these requirements with levels 0 to 3, 0 being the lowest and 3 being the highest level.</p>
<p>For the business requirements, you must answer questions such as:</p>
<ol>
<li>How far should the object&#8217;s signal reach?</li>
<li>How much bandwidth do you need?</li>
<li>What is the autonomy of your object?</li>
</ol>
<p>In our example, we assume that your connected coffee machines will be distributed to corporate customers operating over a large geographical area (i.e. over 100 km radius). Therefore, you will need a wide coverage to enable your customers’ widespread machines to communicate with your Information System.</p>
<p>Two business cases are outlined here: If your customer agrees to connect your machine to its existing local network, you will then only need a short-range wireless network between the machine and the internet router. If they refuse to do so, you will then need to set up a long-range network as you will deploy your service and machines over a wide area.</p>
<p>For the bandwidth, a small/short amount will be needed as it solely requires to be able to send small data packages a few times a day at most (capsule orders, alerts, general status, …).</p>
<p>In regard to energy consumption, a coffee machine is traditionally connected to a power supply to perform its tasks; henceforth, power does not constitute an issue in terms of IOT, i.e. the object autonomy is therefore not constraint. There is no energy consumption requirement per se as it is already covered by the coffee machine’s connection to the power grid.</p>
<p>We summarize the levels for business requirements as follows:</p>
<ul>
<li>Range (R) = 3 or 1</li>
<li>Bandwidth (B) = 1</li>
<li>Energy consumption (E) = 0</li>
</ul>
<p>Having defined your business requirements, a risk analysis must be conducted to formulate the security requirements of your project for availability, integrity, confidentiality, and traceability purposes.</p>
<p>A loss of availability would occur in the event of a dysfunction on the connected coffee machine that would render it unusable for a customer. A loss of access to the network or unavailability of backend servers should never result in the machine being unavailable: it must remain working off-network. However, if a dysfunction of the machine occurs, we assume that you would want it to be reported back as quickly as possible through the network in order for maintenance actions to be triggered.</p>
<p>How long can this last? The answer would be several hours rather than several days, as we wouldn’t want to deprive employees from their coffee breaks! Therefore, 4 to 24 hours is an acceptable window of unavailability which can be translated into an availability requirement level of 2.</p>
<p>A loss of integrity would result in data corruption. For example, a potential excess order of coffee capsules may occur by altering the messages sent by the coffee machine or by replacing the same order multiple times. In both cases, this would result in a financial loss for your client. Data on the network needs to be communicated rigorously and exactly. Hence, we can conclude this is a requirement level of 3.</p>
<p>A loss of confidentiality would result in data being divulged; orders quantities are rather sensitive data that shouldn’t be shared with external parties. It needs to be ensured that data is communicated securely on the network and is not accessible by externals parties. &nbsp;Hence, we conclude that confidentiality has a requirement level of 2.</p>
<p>For traceability, and for simplification reasons, we choose to leave this aspect aside assuming that it is already accounted for by the study of the first 3 criteria.</p>
<p>In a nutshell, risk analysis concludes to the following security requirements:</p>
<ul>
<li>Availability (A) = 2</li>
<li>Integrity (I) = 3</li>
<li>Confidentiality (C) = 2</li>
</ul>
<p>For more details about risk analysis methodology for smart objects, you can refer to this <a href="https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/">article</a>.</p>
<p>At the end of this analysis, you obtain for both of your business cases a radar chart of your requirements.</p>
<h3>Business case 1: your customer connects your coffee machine to its local network</h3>
<figure id="post-15428 media-15428" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15428 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1.png" alt="" width="966" height="470" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1.png 966w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1-393x191.png 393w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-1-768x374.png 768w" sizes="auto, (max-width: 966px) 100vw, 966px" /></figure>
<h3>Business case 2: your customer does not connect your coffee machine to its local network</h3>
<figure id="post-15430 media-15430" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15430 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2.png" alt="" width="945" height="465" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2.png 945w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2-388x191.png 388w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-2-768x378.png 768w" sizes="auto, (max-width: 945px) 100vw, 945px" /></figure>
<p>Though not discussed in this article, financial aspects are also important and depend on various factors such as the network operator pricing model. Same goes for geographic constraints as some networks may not be available on some regions.</p>
<p>Eventually, the ease of configuration of the network may be included in your business requirements, especially if your connected object targets a B2C audience.</p>
<p>&nbsp;</p>
<h2>Second step &#8211; Choose your IoT Network</h2>
<p>Building on business and security requirements, we developed a methodology to choose the right network that will be optimal to meet your business and security needs: range, bandwidth, energy consumption, availability, integrity, confidentiality.</p>
<p>The three business requirements are mandatory, the network you choose must fulfil them, otherwise, it will be eliminated.</p>
<p>For security requirements, the assessment requires pre-emptive analysis. Between two networks that cover the same business requirements, you should choose the one that offers the best level of security with the minimum cost.</p>
<p>If a network doesn’t cover one of the security requirements, you will have to implement some additional security feature as a part of your project backlog, consequently raising your costs.</p>
<p>You should also be vigilant that the additional implementation doesn’t impact the system’s performance. For instance, if you implement data encryption at the application layer, increasing processing times would negatively impact your maximum data rate or could be constrained by the hardware capabilities of the device, with a potential financial impact in case of a hardware upgrade. Consequently, one of your business requirements may no longer be met.</p>
<p>In case high availability is required (A=3), you ought to choose a robust network by design that will meet your real-time needs.</p>
<p>In fact, spread spectrum (like Bluetooth or ZigBee) or frequency hopping modulated protocols (like Sigfox or Bluetooth) are more resistant to radio jamming or radio interferences.</p>
<p>These types of networks are particularly recommended when availability is an important requirement, such as on an industrial production line.</p>
<p>Moreover, mesh protocols are known to be more reliable and scalable than point to point protocols. However, for them to achieve efficiency, they need to be used in a context where multiple connected devices are linked together. Mesh protocols like WirelessHART can also guarantee real-time communications. Their usage is especially adapted to an industrial context.</p>
<p>A simple methodology to choose the right network is to confront your business requirements to the network’s business and security offerings.</p>
<p>In the following radar charts, we present different types of IoT networks providing different levels of business and security offerings, and we compare each one of them to our business requirements.</p>
<h3>Business case 1: your customer connects your coffee machine to its local network</h3>
<figure id="post-15432 media-15432" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15432 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3.png" alt="" width="1128" height="697" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3.png 1128w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3-309x191.png 309w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3-63x39.png 63w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-3-768x475.png 768w" sizes="auto, (max-width: 1128px) 100vw, 1128px" /></figure>
<h3>Business case 2: your customer does not connect your coffee machine to its local network</h3>
<figure id="post-15434 media-15434" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15434 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4.png" alt="" width="1127" height="712" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4.png 1127w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4-302x191.png 302w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-4-768x485.png 768w" sizes="auto, (max-width: 1127px) 100vw, 1127px" /></figure>
<p>Let&#8217;s apply the previous methodology to your connected coffee machine. First, we use our previous radar charts to see which networks comply with our business requirements.</p>
<h3>Business case 1: your customer connects your coffee machine to its local network</h3>
<p>For your first business case, Bluetooth and Wi-Fi are two viable short-range options if your customer connects the machine to its local network. On the one hand, Bluetooth meets all the security requirements, but it is less straightforward to implement compared to Wi-Fi. On the other hand, Wi-Fi meets all of them except for availability but that is something we can work out with SLA agreements.</p>
<h3>Business case 2: your customer does not connect your coffee machine to its local network</h3>
<figure id="post-15439 media-15439" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15439 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1.png" alt="" width="1471" height="537" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1.png 1471w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1-437x160.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1-71x26.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/04/Image-5-1-768x280.png 768w" sizes="auto, (max-width: 1471px) 100vw, 1471px" /></figure>
<p>For your second business case, Zigbee, BLE and Wi-Fi are clearly out of the equation because they do not meet the range requirements. However, LoRa, LTE-M and Sigfox are still in the mix.</p>
<p>We use the radar charts again, this time to assess these three candidate&#8217;s compliance with the security requirements.</p>
<p>Sigfox does not meet one of your security requirements (confidentiality) whereas LoRa complies with all security requirements. LTE-M is the best offering as it meets all your requirements, but it is also the most expensive. We conclude that LoRa is a relatively good candidate.</p>
<p>In conclusion, we have one good candidate: LoRa which will require the deployment of a new network and an alternative using a pre-existing Wi-Fi network. It should be noted that you may refuse to connect to the Wi-Fi network on company premises for security reasons.</p>
<p>We will undertake a new scenario in a next article: a customer company buys the machine and discusses what payment options to use.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/04/connecting-your-connected-coffe-machine-yes-but-how/">Connecting your connected coffee machine: yes, but how?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Risk analysis and IoT: a marriage of love or reason?</title>
		<link>https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Wed, 27 Jan 2021 06:00:22 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[connected devices]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IoT risk]]></category>
		<category><![CDATA[methodology]]></category>
		<category><![CDATA[project management]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[risk analysis]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14988</guid>

					<description><![CDATA[<p>Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/">Risk analysis and IoT: a marriage of love or reason?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Wavestone and Sigfox share a common passion for tech, innovation and security. Our discussions led us to explore the foundation of all cybersecurity initiatives (the risk analysis), why this is different for an IoT project and, most importantly, how you can get started.</p>
<p>&nbsp;</p>
<h2>What is a cyber risk analysis?</h2>
<p>Did you ever wonder what would happen if a device your company developed and sells leak the data it collects? Or if that data were corrupted or suddenly made unavailable? What would be the most detrimental? <strong>What if your solution was vulnerable to a cyberattack?</strong> Could the consequences be a takeover of device(s) which leads to a safety hazard such as a building taking fire or even a human casualty? Or maybe it could “just” be a pivot attack onto your customer’s network that leads to a full incapacity for your and your customer’s businesses to operate.</p>
<p>If you are currently developing an IoT solution and are not having a nervous breakdown when considering such possibilities, you are probably wondering though how your CISO (Chief Information Security Officer) is not having one.</p>
<p>Well it is probably because your CISO<strong> has a method</strong>: they consider every risk from <strong>an unbiased perspective and in a comparable manner</strong>. Ensuring each risk is correctly evaluated (i.e. not overestimated or underestimated) and sharing the outcome of this evaluation with all project stakeholders is the first important step. Once all stakeholders agree upon every risk your company has the right basis to decide control measures.</p>
<p>This approach does not mean you should address every risk to the point that your solution is virtually <em>unhackable</em>. Frankly, this is not technically possible, and your budget would vanish far before achieving a so called zero cyber risk solution. Each control measure must be prioritized and proportional to the risk likelihood and severity.</p>
<p>What we described above is known as a <strong>risk analysis methodology</strong>. Cybersecurity professionals use this methodology as the baseline to their company’s cybersecurity initiatives. The professionals evaluate risk scenarios (often tied to service availability, data integrity, confidentiality and/or traceability of actions) and the impacts on their company’s brand image, legal liabilities, safety consequences and of course financial outcomes. The higher the risk is evaluated, the higher the priority is set to lower the likelihood of the risk occurring (e.g. add barriers to an attack, reduce the attack surface, etc.) or the severity of outcomes if the risk occurs (e.g. apply segmentation to reduce the spread of an attack).</p>
<p>If you want to learn more about the existing risk analysis methodologies you should start with ISO27005 which has a wide scope of adoption and understanding across various industries.</p>
<p>Be reassured that <strong>talking about risks will not increase the likelihood of the problem occurring </strong>(if you ever feared that), however not talking about them puts the project at great risk.</p>
<p>&nbsp;</p>
<h2>What makes an IoT Project risk analysis different?</h2>
<p>Hopefully we have convinced you that doing a risk analysis of your project is an important task; we will touch upon how you can get started quickly in the next chapter. Before we get there, we will detail what makes the exercise specific for an IoT project: what are the characteristics of such projects and what makes the risk analysis more difficult or simpler?</p>
<p>Let us start with the common characteristics that should be considered for a risk analysis. First of all, an IoT initiative often relies on a very decentralized network of hardware (sensors, gateways, servers, etc.). These devices can be spread over a large geographical area, sometimes all over the world, and are meant to remain in the field for a long time with little to no onsite maintenance. It is common to see B2B IoT devices that aim for a lifetime of more than 10 years (e.g. a water metering project for utility companies). B2C devices can also aim for such lifetimes – think of connected vehicles for instance. It is also noteworthy that IoT devices usually have limited user interfaces such as a screen and keyboard. Despite this, the buttons, LED and mobile applications allow the necessary interactions or customizations to the IoT device for you to collect data from the field. Remember, the data collected from connected devices is where the value resides. Thus, whether that data is critical or not is essential in the risk evaluation. Finally, we need to remind ourselves that an IoT project is still an IT project. If the devices are not typical laptops, the application servers and storage remain central in most cases. This is where a large part of the risk remains, but fortunately, there are many best practices for this portion of the solution as well.</p>
<p>From a cybersecurity perspective such characteristics can make IoT projects riskier. For instance:</p>
<ul>
<li>The physical security of a decentralized network is very hard to enforce. Where are the devices located? Are the devices accessible to the public? Can someone easily steal, damage or tamper the devices? For example, a tracker installed on a pallet travels outside trusted premises and can be damaged or removed – intentionally or not. Of course, this risk is amplified by a wider geographical footprint.</li>
<li>Given the limited user interactions and the longer device lifetime, it can become very costly and time-consuming to maintain the devices, especially if you must physically dispatch technicians. Hands-on intervention can be simply unrealistic, but even firmware upgrades have a failure rate. Because of all this, the controls must be relevant for the long run.</li>
<li>In any IoT project, the sensitivity of the data is a factor that must be considered. Is it critical for your company? For consumer projects the sensitivity of the data can be perceived as very high because the devices will collect data from the “real” world.</li>
<li>IoT solutions consist of many different technologies and vendors. This is a challenge for us: what are the security practices followed by each of these vendors and do these practices sufficiently cover my risks?</li>
<li>Finally, the security controls that can be applied are dependent on the capacities of the devices and softwares. For example, many sensors run on 8-bits MCU and thus cannot run complicated encryption algorithms.</li>
</ul>
<p>Fortunately, all these characteristics also play a role in reducing the cyber risks for IoT projects.</p>
<ul>
<li>With very decentralized deployments, the level of effort required by an attacker to access a large number of devices is burdensome. Compromising a single device is one thing but compromising the entire fleet of devices is an entirely different task. This is especially true if physical tampering or proximity is required.</li>
<li>The application of the IoT devices are rarely handled directly by a user and there are limited user interactions after installation. Thus, attackers have limited opportunities to trick the user into misusing the application.</li>
<li>Depending on the context, the value of the data can be very limited for attackers (e.g. room temperature monitoring used to control AC systems). What is more, the value can also decrease sharply with time. Production data can be critical for real-time control of processes, but it becomes a lot less valuable a few minutes after.</li>
<li>The architecture of IoT solutions is usually segregated from the IT systems including servers or data centers. This segregation enables companies to easily define and protect integration points.</li>
<li>Finally, the limited capacities of the device play a role in preventing any harmful attempt. Attackers simply cannot access, implant malware or effectively control sensors with 8-bit MCUs.</li>
</ul>
<p>&nbsp;</p>
<div class="slate-resizable-image-embed slate-image-embed__resize-full-width">
<figure id="post-15039 media-15039" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-15039 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3.png" alt="" width="1845" height="883" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3.png 1845w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-399x191.png 399w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-768x368.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2021/01/Image-1-3-1536x735.png 1536w" sizes="auto, (max-width: 1845px) 100vw, 1845px" /></figure>
</div>
<div></div>
<h2>So now, how can I get started?</h2>
<p>Well, take a deep breath and involve your CISO.</p>
<p>The CISO must identify and evaluate applicable regulations, decide what level of risks is acceptable, provide policies to follow and tools to implement security measures. Perhaps you should appoint Product Security Officer to specifically address IoT security in your company or even a given IoT product’s security if the stakes require it.</p>
<p>Getting to an acceptable level of security will require expertise on the various areas of the IoT solution. If you are that expert, then you should probably be ready to get involved. This will drive the whole team to consider the:</p>
<ul>
<li>End-to-end security on the technology stack: from hardware to cloud including embedded software, network connectivity, mobile apps, etc.</li>
<li>End-to-end security from a device lifecycle perspective. When you design your device, think about all phases: from manufacturing to distribution; from initial use to normal usage; resell, refurbish, recycle or trash.</li>
<li>Partners involvement: make sure not to forget them and assess their maturity. You might need to take measures to support them or upskill them (<em>hint</em>: ask your CISO or PSO for it).</li>
<li>Audit of your device and the whole technology stack. Do this regularly because your software may not have changed but the threats and known vulnerabilities may have.</li>
<li>Long-term security updates and maintenance: define for how long you will update and deploy your devices.</li>
<li>Incident response organization: define how you can be notified of vulnerabilities or breaches and how you can plan to respond (from a technical and a communication point of view).</li>
</ul>
<p>IoT cybersecurity is not impossible. It actually provides methodologies and tools to help achieve a secure landscape.</p>
<p>Project stakeholders and customers are seeking and pressuring for secure products. Regulation to enforce security are imminent and frameworks to help align every actor regarding its duties will continue to be applied. It is time to get ahead now if you are looking to make cybersecurity an asset for your product on your market!</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2021/01/risk-analysis-and-iot-a-marriage-of-love-or-reason/">Risk analysis and IoT: a marriage of love or reason?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/</link>
		
		<dc:creator><![CDATA[Raquel De Faria Cristas]]></dc:creator>
		<pubDate>Fri, 28 Aug 2020 13:07:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Jitsuin]]></category>
		<category><![CDATA[POC]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[Smart House]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=14147</guid>

					<description><![CDATA[<p>In a previous article, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the “Security Twins” can improve the security of physical accesses to a building...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: justify;">In a <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">previous article</a>, we discovered how &#8220;Security Twins&#8221; could improve the security and trust of connected devices. In this new article we will now look at how the “Security Twins” can improve the security of physical accesses to a building through a PoC made by Wavestone in collaboration with the start-up Jitsuin using their tool: “Jitsuin Archivist”.</p>
<p>&nbsp;</p>
<h2>What does “Jitsuin Archivist” look like?</h2>
<p style="text-align: justify;">The start-up Jitsuin has developed a tool called &#8220;Jitsuin Archivist&#8221; based on Distributed Ledger Technology (DLT). The purpose of this tool is to know &#8220;Who did what to a Thing and When”.</p>
<p style="text-align: justify;">As of today, 5 types of users can interact with the tool: Archivist Administrator, System Administrator, Maintenance Operator, Auditor, Custom (currently in beta version).</p>
<p>&nbsp;</p>
<figure id="post-14148 media-14148" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14148 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1.png" alt="" width="1277" height="275" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1.png 1277w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-437x94.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-71x15.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/1-768x165.png 768w" sizes="auto, (max-width: 1277px) 100vw, 1277px" /></figure>
<p style="text-align: center;">Figure 1 – The 5 user roles of “Jitsuin Archivist”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">On this tool the user has access to the &#8220;Security Twins&#8221; of the connected devices. Indeed, after logging in, the user accesses a dashboard through which he has a global view of all the connected devices linked to the tool. He can see relevant statistics related to his IoT deployment, such as the number of critical incidents, the activity of connected objects, etc.</p>
<p style="text-align: justify;">The user can also access the &#8220;Manage Assets&#8221; page where he will find a map with the location of all the connected objects linked to the tool and a list of them (where he can also see in more detail the events linked to a particular connected device).</p>
<p>&nbsp;</p>
<figure id="post-14150 media-14150" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14150 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2.png" alt="" width="1339" height="653" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2.png 1339w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-392x191.png 392w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/2-768x375.png 768w" sizes="auto, (max-width: 1339px) 100vw, 1339px" /></figure>
<p style="text-align: center;">Figure 2 &#8211; The different views of the tool &#8220;Jitsuin Archivist&#8221;: 1. dashboard with a global view, 2. all the objects and their location, 3. detailed view of an object, 4. all the actions of the object useful during security audits</p>
<p>&nbsp;</p>
<h2>The PoC: A House with a digital lock</h2>
<p style="text-align: justify;">Wavestone used Jitsuin&#8217;s tool to first address the issue of identity and access management in buildings in at the dawn of digital transformation and the to illustrate the usefulness of &#8220;Security Twins&#8221;.</p>
<p style="text-align: justify;">To do this Wavestone used the lego house &#8220;SmartHouse&#8221; :</p>
<p>&nbsp;</p>
<figure id="post-14152 media-14152" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14152 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3.jpg" alt="" width="1085" height="955" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3.jpg 1085w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-217x191.jpg 217w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-44x39.jpg 44w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/3-768x676.jpg 768w" sizes="auto, (max-width: 1085px) 100vw, 1085px" /></figure>
<p style="text-align: center;">Figure 3 – The “SmartHouse”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Equipped with an RFID card reader, a Raspberry Pi microcontroller and a servomotor, the entrance door of the &#8220;SmartHouse&#8221; only opens to users who have an authorized access card. All actions related to opening, closing, granting of entry rights, etc. are recorded on &#8220;Jitsuin Archivist&#8221; (see figure 4).</p>
<p>&nbsp;</p>
<figure id="post-14154 media-14154" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14154 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4.png" alt="" width="1037" height="474" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4.png 1037w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-418x191.png 418w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/4-768x351.png 768w" sizes="auto, (max-width: 1037px) 100vw, 1037px" /></figure>
<p style="text-align: center;">Figure 4 – The functional diagram of the “SmartHouse”</p>
<p>&nbsp;</p>
<p style="text-align: justify;">In order to facilitate the interaction with the digital lock of the “SmartHouse”, a platform allowing the simulation of different operations made by different peopled involved in the life cycle of connected devices has been created using the Django web framework and Bootstrap. This platform allows, among other things, to:</p>
<ul style="text-align: justify;">
<li>Send security patches to the connected lock (using Azure IoTHub)</li>
<li>Assign access rights to the “SmartHouse”</li>
<li>View the history of access rights requests made and those awaiting validation, etc.</li>
</ul>
<p style="text-align: justify;">This is what the platform looks like:</p>
<p>&nbsp;</p>
<figure id="post-14156 media-14156" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14156 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5.png" alt="" width="1426" height="729" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5.png 1426w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/5-768x393.png 768w" sizes="auto, (max-width: 1426px) 100vw, 1426px" /></figure>
<p style="text-align: center;">Figure 5 &#8211; SmartHouse&#8217;s management platform</p>
<p>&nbsp;</p>
<p style="text-align: justify;">The use of “Jitsuin Archivist” in this PoC is very interesting when regards to security audits of connected devices. Indeed, as “Jitsuin Archivist” is based on Distributed Ledger Technology (DLT), this system can be considered as &#8220;secure by design&#8221; since an auditor has a technical guarantee on the non-compromise of data (provided that the sending of this data is secure).</p>
<p style="text-align: justify;">Here is the &#8220;Auditor View&#8221; on “Jitsuin Archivist” where it is possible to see all the information regarding the connected devices linked to the platform and to know who has done what to the connected device:</p>
<p>&nbsp;</p>
<figure id="post-14158 media-14158" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14158 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6.png" alt="" width="1804" height="884" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6.png 1804w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-390x191.png 390w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-768x376.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/6-1536x753.png 1536w" sizes="auto, (max-width: 1804px) 100vw, 1804px" /></figure>
<p style="text-align: center;">Figure 6 &#8211; The &#8220;Auditor View&#8221; of “Jitsuin Archivist”</p>
<p>&nbsp;</p>
<h2>The PoC scenario: WaveHouse rents “SmartHouses” in France &#8230;</h2>
<figure id="post-14160 media-14160" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14160 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7.png" alt="" width="1246" height="566" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7.png 1246w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-420x191.png 420w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/7-768x349.png 768w" sizes="auto, (max-width: 1246px) 100vw, 1246px" /></figure>
<p>Here is the general architecture of the PoC:</p>
<p>&nbsp;</p>
<figure id="post-14162 media-14162" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-14162 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8.png" alt="" width="1326" height="831" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8.png 1326w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-305x191.png 305w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-62x39.png 62w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/8-768x481.png 768w" sizes="auto, (max-width: 1326px) 100vw, 1326px" /></figure>
<p style="text-align: center;">Figure 7 &#8211; The general architecture of the PoC</p>
<p>&nbsp;</p>
<p style="text-align: justify;">As one can see, the digital lock (represented by the RFID card reader, the Raspberry Pi microcontroller and the servomotor) interacts with Azure IoTHub as well to facilitate the management of its firmware updates.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">The main use cases studied by Wavestone and Jitsuin</h2>
<p>The main use cases studied by Wavestone and Jitsuin are explained in the video below:</p>
<p><div style="width: 640px;" class="wp-video"><video class="wp-video-shortcode" id="video-14147-1" width="640" height="360" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4?_=1" /><a href="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4">https://www.riskinsight-wavestone.com/wp-content/uploads/2020/08/video-article-720p-mp4.mp4</a></video></div></p>
<p>&nbsp;</p>
<h2>Conclusion</h2>
<p style="text-align: justify;">Wavestone and Jitsuin were able to demonstrate &#8211; with the different use cases illustrated above in the video &#8211; how to improve the security of connected devices:</p>
<ul style="text-align: justify;">
<li>First of all, all of the people involved in the life cycle of the digital lock of the “SmartHouse” had access to its &#8220;Security Twin&#8221;. Indeed, each of them had access to a decentralized and unchangeable register provided by “Jitsuin Archivist” with all the information regarding the security of the digital lock.</li>
<li>Then, as mentioned above, this architecture is &#8220;secure by design&#8221; because as “Jitsuin Archivist” is based on Distributed Ledger Technology (DLT), one has a technical guarantee on the non-compromising of data.</li>
<li>The &#8220;Security Twin&#8221; of the digital lock ensured physical security since it had the rights management information, allowing all the people involved to know who had access to the &#8220;SmartHouse&#8221;.</li>
<li>Finally, since the “Security Twin” also had firmware information, the different people involved could easily know which connected devices had vulnerabilities and quickly plan the distribution of security patches.</li>
</ul>
<p style="text-align: justify;">The &#8220;Security Twins&#8221; would therefore ultimately improve the security of the connected devices, since it would be easy to know which objects are secure and which are not.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/08/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/</link>
		
		<dc:creator><![CDATA[Raquel De Faria Cristas]]></dc:creator>
		<pubDate>Fri, 24 Jul 2020 12:55:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[connected device]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[NIST]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=13959</guid>

					<description><![CDATA[<p>In 2010, the early hype-cycle of IoT (Ericsson and Cisco) predicted 50 billion devices by 2020. In reality, that figure was highly overestimated. Today, Gartner states that approximately 5.8 billion IoT terminals will be in use in 20201. Even if...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In 2010, the early hype-cycle of IoT (Ericsson and Cisco) predicted 50 billion devices by 2020. In reality, that figure was highly overestimated. Today, Gartner states that approximately 5.8 billion IoT terminals will be in use in 2020<sup>1</sup>. Even if the market is not as developed as it was first predicted, it is still growing: those 5.8 billion of IoT devices represent <strong>an increase of 21%</strong> over 2019.</p>
<p>Despite their usefulness, introducing connected devices unfortunately brings <strong>new risks</strong> for companies. Indeed, according to the Palo Alto Networks report<sup>2</sup> published in March 2020, <strong>57% of the connected devices analyzed were vulnerable to medium or high severity attacks</strong>. This is not surprising. Securing connected devices is proving to be an arduous task that explains why Beecham Research<sup>3</sup> finds 62% of Industrial IoT transformations fail to scale because of a lack of trust.</p>
<p>Therefore, with this article we will try to ask ourselves about the security and trust issues of connected devices and how companies can deal with them.</p>
<p>&nbsp;</p>
<h2>What are the security and trust issues of connected devices?</h2>
<p style="text-align: justify;">In order to mitigate the security risks on connected devices, NIST recommends in its report<sup>4</sup> published in 2019 to focus on 6 main areas:</p>
<ul>
<li style="text-align: justify;"><strong>Inventory</strong>: Maintain an accurate inventory of all connected devices and their most relevant characteristics throughout their lifecycle (<a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">see the article</a> detailing the lifecycle of connected devices).</li>
</ul>
<p>&nbsp;</p>
<figure id="post-13960 media-13960" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13960 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1.png" alt="" width="1479" height="755" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1.png 1479w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1-71x36.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-1-1-768x392.png 768w" sizes="auto, (max-width: 1479px) 100vw, 1479px" /></figure>
<p style="text-align: center;">Figure 1 &#8211; Connected device lifecycle</p>
<ul>
<li style="text-align: justify;"><strong>Vulnerabilities</strong>: Identify and eliminate known vulnerabilities in the software and firmware of connected devices to reduce the likelihood and ease of exploitation and compromise.</li>
<li style="text-align: justify;"><strong>Access</strong>: Prevent unauthorized and inappropriate physical and logical access, use and administration of connected devices by people, processes and other computing devices.</li>
<li style="text-align: justify;"><strong>Detect security incidents of connected devices</strong>: Monitor and analyze connected device activity for signs of incidents involving the security of the device.</li>
<li style="text-align: justify;"><strong>Detect data security incidents</strong>: Monitor and analyze the activity of the connected device for signs of data security incidents.</li>
<li style="text-align: justify;"><strong>Protect data</strong>: Prevent access and alteration of data that could expose sensitive information or allow manipulation or disruption of the operation of connected devices.</li>
</ul>
<p style="text-align: justify;">However, current IoT platforms only partially meet these security requirements (<a href="https://www.wavestone.com/en/insight/iot-platforms-cornerstone-successful-iot-strategy/">see the article</a> detailing the usefulness of IoT platforms).</p>
<p>&nbsp;</p>
<p id="post-13962 media-13962" class="align-none" style="text-align: center;"><img loading="lazy" decoding="async" class="aligncenter wp-image-13962 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1.png" alt="" width="1073" height="329" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1.png 1073w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1-437x134.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1-71x22.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-2-1-768x235.png 768w" sizes="auto, (max-width: 1073px) 100vw, 1073px" />Figure 2 &#8211; The usefulness of IoT platforms</p>
<p>&nbsp;</p>
<p style="text-align: justify;">Indeed, traditional IoT architectures rely on a <strong>centralized cloud platform</strong>, operated by a third-party company and where most often the rules for data collection and storage are opaque. <strong>This is not the best solution to ensure the security of connected devices since</strong>:</p>
<ul>
<li>The use of a centralized cloud platform introduces the risk of &#8220;<strong>single point of failure</strong>&#8221; on the <strong>IoT architecture</strong> (although today this risk is mitigated with the implementation of a redundant architecture and backups).</li>
<li>It is entirely possible for an attacker to <strong>change the data stored in the cloud database</strong>. The decision making of the different stakeholders is therefore impacted.</li>
<li><strong>Collaboration</strong> between the different stakeholders of the IoT deployment (manufacturers, maintenance operators, &#8230;) becomes more <strong>difficult</strong> because access to the platform can be restricted to them.</li>
</ul>
<p style="text-align: justify;">The use of a <strong>decentralized management system</strong> for connected devices where all stakeholders would have the possibility to <strong>reliably consult or contribute information</strong> regarding connected devices (firmware version, maintenance operations, etc.) becomes essential to guarantee the security of those devices and the integrity of data they produce.</p>
<p>&nbsp;</p>
<h2 style="text-align: justify;">How do &#8220;Security Twins&#8221; help meet the security challenges of connected devices?</h2>
<p>In order to support IoT platforms and improve the security of IoT deployments, the notion of  <strong>&#8220;Security Twin&#8221; should be introduced in IoT deployments.</strong></p>
<p>The principle of a &#8220;Security Twin&#8221; is simple. It is a <strong>virtual representation</strong> of the connected device that <strong>contains all its security information</strong>, such as firmware version, vulnerabilities, etc. upon which all stakeholders involved in its upkeep can reach consensus (see figure 3).</p>
<p>&nbsp;</p>
<figure id="post-13966 media-13966" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-13966 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1.png" alt="" width="1012" height="459" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1.png 1012w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-421x191.png 421w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-768x348.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/07/Figure-3-1-730x330.png 730w" sizes="auto, (max-width: 1012px) 100vw, 1012px" /></figure>
<p style="text-align: center;">Figure 3 &#8211; The &#8220;Security Twin&#8221; mechanism (from: Jitsuin)</p>
<p>&nbsp;</p>
<p>A &#8220;Security Twin&#8221; gains effectiveness when more <strong>stakeholders</strong> of the deployment <strong>can interact with it</strong> and reach consensus that the<strong> information provided/recorded is correct</strong>.</p>
<p>Therefore, solutions based on <strong>Distributed Ledger Technology (DLT)</strong> represent a logical first step in the creation of Security Twins, as they would allow the security information of the connected device to be gathered in <strong>a decentralized and immutable registry</strong> that would be accessible by all authorized stakeholders in the IoT deployment. The best well known distributed registry solution is the Blockchain (<a href="https://www.wavestone.com/en/insight/blockchain-practice/">see the article</a> on Blockchain’s uses and limitations).</p>
<p>Taking up the points raised earlier in the NIST report, one could say that the use of a &#8220;Security Twin&#8221; would therefore improve:</p>
<ul>
<li><strong>Device and access management</strong>: all stakeholders of the IoT deployment would have access to a decentralized and immutable register of all the connected devices with the corresponding security and trust information.</li>
<li><strong>Vulnerability management and the detection of device security incidents</strong>: the different stakeholders could share device security information and take the necessary actions (e.g. the manufacturer of a connected device could notify the other stakeholders of the availability of a new firmware update thanks to the &#8220;Security Twin&#8221;).</li>
<li><strong>Data protection and the detection of data related security incidents</strong>: The very foundation of a &#8220;Security Twin&#8221; is based on the use of a decentralized and immutable register to record data related to the security of connected devices. This makes it more difficult for attackers to change the data, which reduces the risk of a security incident.</li>
</ul>
<p>The use of &#8220;Security Twins&#8221; therefore offers the possibility of strengthening the security, integrity, trust and resilience of connected devices.</p>
<p>The start-up Jitsuin has developed &#8220;Jitsuin Archivist&#8221; a tool based on Distributed Ledger Technology (DLT) to overcome the lack of collaborative tools to secure connected devices. The purpose of this tool is not to replace IoT platforms but to allow the creation of &#8220;Security Twins&#8221;.</p>
<p>Together, Wavestone and <a href="https://jitsuin.com/">Jitsuin</a> sought to demonstrate the benefits of using a decentralized architecture with “Security Twins”. The two companies have therefore collaborated on the construction of a PoC (Proof of Concept) to tackle identity and access management of buildings using connected devices, which will be introduced in a future article.</p>
<p>&nbsp;</p>
<p>1 Gartner, 29th August 2019 : https://www.gartner.com/en/newsroom/press-releases/2019-08-29-gartner-says-5-8-billion-enterprise-and-automotive-io<br />
2 Palo Alto Networks, 10th March 2020, “Unit 42 IoT threat report”: https://unit42.paloaltonetworks.com/iot-threat-report-2020/<br />
3 Why IoT projects fail https://www.whyiotprojectsfail.com/?cs=br2<br />
4 NIST – “Considerations for Managing Internet of Things (IoT) Cybersecurity and Privacy Risks” : https://csrc.nist.gov/publications/detail/nistir/8228/final</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/07/security-twins-a-new-security-trust-guarantee-for-connected-devices-2-2/">&#8220;Security Twins&#8221;: A new security &#038; trust guarantee for connected devices (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity issues around Smart City (2/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Wed, 15 Apr 2020 09:00:51 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[data protection]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[risks]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[SOC]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12966</guid>

					<description><![CDATA[<p>In a previous article, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>In a previous </em><a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/"><em>article</em></a><em>, we saw that the Smart City was inducing a paradigm shift which, combined with the general public&#8217;s high expectations on the security of its data, required adapting the approach to such a project. Indeed, as the Smart City develops, urban activity becomes more and more dependent on its services, increasing not only its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify a new approach to take account of Cyber ​​Security risks and, if not completely eliminate them, to reduce them. This is the purpose of this second article.</em></p>
<p>&nbsp;</p>
<h2>Building a Smart City project with Cybersecurity</h2>
<p>It is essential to integrate cyber security aspects from the start of a Smart City project. Indeed, carrying it out later in the project may prove to be more complex and expensive, with the risk of not dealing with it / not being able to deal with all the risks.</p>
<p>This requires <strong>rethinking the organization of the project regarding data and security governance</strong>: security principles must be defined at the global project level and considered by each of the sub-projects composing the Smart City, depending on their constraints. This is particularly true as Smart Cities involve many actors with different core businesses, means and cybersecurity maturity. A global and shared vision is essential to ensure that each element processes the data with the appropriate level of security.</p>
<p>It is then necessary <strong>to define the main principles of architecture and interoperability</strong>, according to the constraints inherent to the Smart City, related to Edge Computing and the deployment of objects in a hostile environment. System resilience must be at the heart of safety requirements, as the fall or compromise of one element should not cause the entire system to fall.</p>
<p>To this end, common <strong>standards</strong> must be adopted, based on specific frameworks such as ETSI or OneM2M. These increase the chances of maintaining scalable interoperable systems. More generally, the NIST or the ISO 27002 standard are proven Cybersecurity frameworks on which it would be interesting to rely.</p>
<p>The development mode must be <a href="https://www.riskinsight-wavestone.com/en/2019/07/cybersecurity-in-an-agile-world/">agile</a>, integrating a long-term vision to anticipate new use cases, and with short milestones in order to quickly deliver the first services. <strong>Cybersecurity must be included in the development process</strong>, by defining Evil User Stories, enabling risks to be identified and considered each time services or the information system evolves, and by appointing cybersecurity experts in a support and validation role.</p>
<p>&nbsp;</p>
<figure id="post-12967 media-12967" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12967 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png" alt="" width="1740" height="571" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1.png 1740w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-437x143.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-71x23.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-768x252.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image1-1536x504.png 1536w" sizes="auto, (max-width: 1740px) 100vw, 1740px" /></figure>
<p>&nbsp;</p>
<p>Defining and maintaining a satisfactory level of security will, more than ever, require the rigorous integration of security in all phases of the project, which may lead to greater but necessary human and technological investments.</p>
<p>&nbsp;</p>
<h2>Protecting critical and regulated data</h2>
<p>Given the propensity of the Smart City to collect and process large amounts of data, their protection will primarily involve <strong>identifying critical data and assets.</strong></p>
<p>&nbsp;</p>
<figure id="post-12969 media-12969" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12969 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png" alt="" width="1340" height="661" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2.png 1340w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-387x191.png 387w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-71x35.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image2-768x379.png 768w" sizes="auto, (max-width: 1340px) 100vw, 1340px" /></figure>
<p>&nbsp;</p>
<p>Most of the services offered by the Smart City are aimed at citizens. Therefore, personal and potentially sensitive data will be collected. Furthermore, a loss of availability or integrity of certain services could have serious repercussions since some components of the IS have a direct hold on the physical world. <strong>Smart Cities are not exempt from regulations</strong>, in particular the General Data Protection Regulations (GDPR), but also, depending on usage, from the General Security Regulations (GSR), the Military Programming Law (MPL) or the Network and Information Security (NIS) directive, whose data protection requirements will have to be integrated into the programs.</p>
<p>Levels of data sensitivity classification must therefore be formalized in order to enable the prioritization of actions and the setting up of an appropriate framework for the processing of critical data such as encryption and anonymization.</p>
<p>The problem of access to data should also be raised. There are many actors in the Smart City and it will be necessary to segment the &#8220;vision&#8221; they may have of the IS. This will involve a preliminary phase of defining the authorization profiles, necessary to respect the principle of least privilege, combined with a regular review of their assignments to ensure that they are still legitimate.</p>
<p>&nbsp;</p>
<h2>Operating in trusted environments</h2>
<figure id="post-12971 media-12971" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12971 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png" alt="" width="1612" height="203" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4.png 1612w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-437x55.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-71x9.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-768x97.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image-4-1536x193.png 1536w" sizes="auto, (max-width: 1612px) 100vw, 1612px" /></figure>
<p>&nbsp;</p>
<p>The Smart City project will necessarily rely on <strong>different technical and organizational foundations</strong>. If these bases are to the Information System what foundations are to a house, it is easy to understand that it will be difficult to build anything if this base is fragile.</p>
<p>As always, these technical bases must be covered by fundamental security measures: implementation of trust bubbles, hardening of systems, patch management, securing of privileged accounts and their use, etc.</p>
<p>Furthermore, an information system with a large attack area such as the Smart City will necessarily have to break with the traditional security model known as &#8220;castle security&#8221;, by relying more on aspects of partitioning and access control of the data itself. The conformity of assets within the information system will have to be continuously evaluated using common configuration and hardening frameworks. Exposed systems and applications must be subject to controls and audits, particularly during the development phase, but also during the operational phase.</p>
<p>In addition, business continuity and disaster recovery will have to be at the heart of the security strategy. Plans will have to be formalized, but also tested, including both technical considerations such as the resilience of different systems, with the ability to restore systems independently of each other, and organizational considerations through crisis management exercises.</p>
<p>Finally, as Smart City involves many players, all stakeholders should ensure the implementation of significant means in the protection of the information systems involved and comply with the requirements of the project&#8217;s security policy. To do this, they will have to be contractually committed, at the very least by including security requirements in contracts, but also by formalizing and implementing security assurance plans, particularly for the most critical service providers. Regular controls may be commissioned to ensure that the security level is maintained over time and to address future risk scenarios.</p>
<p>&nbsp;</p>
<h2>Detecting, reacting and sharing</h2>
<p>The Smart City cannot do without <strong>a service to detect and deal with security incidents.</strong></p>
<p>It will be necessary to collect traces of activity on the systems and look for weak signals. In view of the large number of events to be processed, it will be essential to define the risks to be guarded against and to rely on correlation solutions to facilitate these searches. The use of automation tools will allow a first sorting of false positives, facilitating the work of analysts in the qualification of security alerts.</p>
<p>The detection and response service can be built using the PDIS and PRIS standards. Qualified external suppliers may be used for these two services as required.</p>
<p>The use of <strong>Cyber Threat Intelligence services</strong> will bring a significant efficiency gain in the creation and enrichment of SOC detection rules. Indeed, it will be possible to adopt a proactive detection posture by monitoring attacks that have targeted Smart Cities and the operating modes used. This will also have the advantage of improving the efficiency of the response service by saving precious investigation time.</p>
<p>Finally, the process of handling significant and major security incidents cannot be carried out without the formalization of a <strong>crisis management unit</strong>, composed of actors with well-defined roles and trained for this exercise. Particular attention will be paid to the external communication system, since the &#8220;severity&#8221; of a crisis depends as much on the event that caused it as on how it is perceived by the outside world.</p>
<p>&nbsp;</p>
<figure id="post-12973 media-12973" class="align-none"><img loading="lazy" decoding="async" class="alignnone size-full wp-image-12973" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png" alt="" width="1647" height="873" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3.png 1647w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-360x191.png 360w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-768x407.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/04/Image3-1536x814.png 1536w" sizes="auto, (max-width: 1647px) 100vw, 1647px" /></figure>
<p>&nbsp;</p>
<p>In conclusion, and as we have seen through these two articles, the Smart City is a self-evident development in an era where demographic, ecological and economic issues are all intertwined. Its promises are seductive, but the implementation framework may give rise to some fears.</p>
<p>As with any digital transformation, ensuring a level of security in line with the challenges of the project will necessarily involve identifying the vulnerabilities and security risks it generates.</p>
<p><strong>In the era of cyber-warfare and cyber-threats</strong>, the Smart City should be considered as a Digital Service Provider, within the meaning of the NIS directive, and be protected by security measures adapted to this status.</p>
<p>The provision of secure services, respectful of their users&#8217; data, is a sine qua non condition for the success of a Smart City project, the benefits of which will only be matched by the magnitude of the impact of a successful cyberattack.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/04/cybersecurity-issues-around-smart-city-2-2/">Cybersecurity issues around Smart City (2/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity issues around Smart City (1/2)</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/</link>
		
		<dc:creator><![CDATA[Hervé Guillou-Hely]]></dc:creator>
		<pubDate>Mon, 16 Mar 2020 09:08:39 +0000</pubDate>
				<category><![CDATA[Cloud & Next-Gen IT Security]]></category>
		<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[architecture]]></category>
		<category><![CDATA[change]]></category>
		<category><![CDATA[data]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[smart city]]></category>
		<category><![CDATA[stakes]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12777</guid>

					<description><![CDATA[<p>Smart City, a possible answer to today&#8217;s challenges &#8220;A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation, and services and competitiveness, while...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/">Cybersecurity issues around Smart City (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Smart City, a possible answer to today&#8217;s challenges</h2>
<p><em>&#8220;A smart sustainable city is an innovative city that uses information and communication technologies (ICTs) and other means to improve quality of life, efficiency of urban operation, and services and competitiveness, while ensuring that it meets the needs of present and future generations with respect to economic, social, environmental and cultural aspects.»</em>, International Telecommunication Union (ITU) &#8211; United Nations Specialized Agency for Information and Communication Technologies.</p>
<p>Increase in the urban population, ecological emergency and energy transition, constraints on public finances, need to reinvent the link between the public service and the user, increase in the living comfort of the inhabitants, etc. All of these issues are challenges that the Smart City could help respond to and which are pushing communities to invest in this direction.</p>
<p>In order to meet these challenges of today and tomorrow, the Smart City will have to create a synergy between different areas such as intelligent traffic management, the development of new modes of transport, the optimization of energy consumption and waste management, the protection of goods and services, home automation, etc.</p>
<p>&nbsp;</p>
<figure id="post-12618 media-12618" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12618 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1.png" alt="" width="1233" height="667" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1.png 1233w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-353x191.png 353w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-71x39.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/02/Image-1-768x415.png 768w" sizes="auto, (max-width: 1233px) 100vw, 1233px" /></figure>
<p>&nbsp;</p>
<p>All these services can be federated around a single control center which will provide an uplink and downlink, giving the possibility of collecting information on the state of the services and/or acting directly on the infrastructure.</p>
<p>&nbsp;</p>
<h2>A new target for cyber attackers</h2>
<p>Many cities in France and around the world have taken up the subject of the Smart City to meet the challenges set out above: large metropolises of course, but also smaller cities.</p>
<p>In parallel with these initiatives, it is becoming more and more frequent to observe cyberattacks targeting cities. As an illustration, in 2019, 22 US municipalities were victims of cyberattacks. <strong>The losses amount to millions</strong>. The governor of Louisiana went so far as to declare a state of emergency following attacks on several cities in the state. But these attacks are not limited to the United States, as evidenced by the attacks in France on the cities of Sarrebourg (Moselle), Sequedin (Nord), Huez (Oisans), La Croix-Valmer (Var) or even Nuits-Saint-Gorges (Côtes-d&#8217;Or).</p>
<p>So, the question now is why Smart Cities present a new playground for Cyber Attacks and how to protect oneself from them.</p>
<p>&nbsp;</p>
<h2>The Smart City induces a paradigm shift</h2>
<p>Conducting a Smart City project requires changing the usual ways of proceeding by implementing a new kind of information system (IS), mixing many issues and generating new risks in terms of Cybersecurity.</p>
<p>&nbsp;</p>
<h3>A complex architecture</h3>
<p>The Smart City is partly characterized by the new structure of its architecture. <strong>Its atypical IS</strong> compiles the constraints of a management IS, those of an industrial IS and those of an IoT IS.</p>
<p>Thus, its management IS will have a propensity to collect and process a large amount of data, whereas its industrial IS will have the characteristic of being directly connected to the physical world: water management, traffic lights, variable road signs, retractable bollards, intelligent lighting, autonomous car control, etc. and reconciling the challenges of these two worlds is no easy task: where the industrial world traditionally focuses on availability, the IT world will focus on the integrity and confidentiality of information and processing, considering furthermore that the Smart City will reinforce the existing IT and digital dimension of industrial systems.</p>
<p>Furthermore, the rationale for an IoT IS must be considered, which is to collect data as close as possible to their sources, through the deployment of connected objects, multiple entry points to the IS in potentially hostile environments. As a result, these objects will be individually exposed to physical attacks against which it was not previously necessary or easier to guard against (e.g. physical access to a serial or USB port, replacement of flash memory, etc.).</p>
<p>Finally, the systems that make up the Smart City must be able to evolve rapidly in order to benefit from the innovations of market players. The challenge is to succeed in building a flexible IS with the capacity to respond to uses yet unidentified today while providing systems capable of being maintained over time, on the scale of a Smart City built for decades.</p>
<p>&nbsp;</p>
<h3>The paradox of interoperability</h3>
<p>Moreover, <strong>a Smart City approach is intended to be inclusive</strong> in order to take advantage of the strengths of all the players in the area. This implies managing heterogeneous systems, mixing new and old technological bricks, and mastering the opening of its IS.</p>
<p>Smart Cities polymorphism complicates the definition of global security policies. Their implementation evolves alongside the development of new technologies, making the security policies of another generation obsolete or inapplicable. This problem has already been present in the industrial world for years, where operational constraints make it sometimes impossible to evolve systems that have become vulnerable.</p>
<p>Beyond security policy, while interoperability between multi-generational systems makes it possible to develop new functionalities that create value for the user, it also implies using disparate protocols that can lead to security breaches. A &#8220;security by design&#8221; approach would consist in identifying the current need and its potential evolutions, in order to be able to propose specifications integrating both concrete answers to the functional need and minimum security rules allowing the service deployment with a satisfactory level of confidence. However, this is likely to oppose to the principle of inclusiveness of the Smart City.</p>
<h4>The importance of data</h4>
<h4>An operational and political challenge</h4>
<p>Information from the field is of paramount importance in driving the Smart City: assisting in decision-making, communicating information to citizens, planning events, and evaluating public policy. While the data itself is not necessarily critical, this is no longer true when it is aggregated into a larger whole. Errors in the collection or processing of data can lead to operational inefficiencies in services or to inappropriate choices in response to changing circumstances.</p>
<p>&nbsp;</p>
<figure id="post-12778 media-12778" class="align-none">
<figure id="post-12778 media-12778" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12778 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.png" alt="" width="958" height="554" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2.png 958w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-330x191.png 330w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-67x39.png 67w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-120x70.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-2-768x444.png 768w" sizes="auto, (max-width: 958px) 100vw, 958px" /></figure>
</figure>
<p>&nbsp;</p>
<p>Moreover, the construction of the Smart City is done by layer. Gradually, new services appear and develop. Historically siloed, the trend is to look for synergies between the different services to create ever more added value for the user. These growing interconnections and overlapping induce such complexity that in the event of a failure, there is a risk, if we are not careful, of seeing the whole infrastructure collapse, either because of error propagation or because each service has become dependent on the others.</p>
<h4>Security: a request coming from the citizens themselves</h4>
<p>Elabe and Wavestone have conducted a survey on the importance of data in tomorrow&#8217;s public services, and on the challenges facing stakeholders in such projects.</p>
<p>Among these challenges lies the use made of the user personal data. Overall, citizens are in favor of the idea of ​​digital transformation of public services, and a fortiori of the Smart City as a public service but remain <strong>concerned about the purpose</strong> of processing their data.</p>
<p>&nbsp;</p>
<figure id="post-12780 media-12780" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12780 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.png" alt="" width="878" height="666" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3.png 878w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3-252x191.png 252w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3-51x39.png 51w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-3-768x583.png 768w" sizes="auto, (max-width: 878px) 100vw, 878px" /></figure>
<p>&nbsp;</p>
<p>However, a significant proportion of the population, between 30% and 50%, is not in favour of transferring their data even if it could save money, save time or reduce their carbon footprint. This could be due to the fact that 76% of the population surveyed believe that the administration is not currently able to ensure the security of the data it collects.</p>
<p>&nbsp;</p>
<figure id="post-12782 media-12782" class="align-none"><img loading="lazy" decoding="async" class="size-full wp-image-12782 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.png" alt="" width="1209" height="546" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4.png 1209w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-423x191.png 423w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-71x32.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-768x347.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2020/03/Image-4-730x330.png 730w" sizes="auto, (max-width: 1209px) 100vw, 1209px" /></figure>
<p>&nbsp;</p>
<p>The success of the Smart City therefore also lies in the ability of stakeholders <strong>to reassure users</strong> about the use and protection of their data.</p>
<p>Thus, we have seen that the Smart City is inducing a paradigm shift which, combined with the high expectations of the general public on the security of its data, required an adaptation of its approach. Indeed, as the Smart City grows, urban activity becomes more and more dependent on its services, increasing its security needs, but also the interest of cyber attackers. Based on these observations, the challenge will therefore be to identify which approach to implement to take into account the risk of cybersecurity and, failing to completely eliminate it, to reduce it. We will talk about it in a second article.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/03/cybersecurity-issues-around-smart-city-1-2/">Cybersecurity issues around Smart City (1/2)</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>IAM of Things, un marché émergeant mais un besoin déjà présent</title>
		<link>https://www.riskinsight-wavestone.com/en/2020/02/iam-of-things-un-marche-emergeant-mais-un-besoin-deja-present/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Mon, 17 Feb 2020 13:28:16 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[IoT & smart products]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAMoT]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[SI]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12648</guid>

					<description><![CDATA[<p>Dans un précédent article, nous avons pu découvrir l’IAM of Things (IAMoT) et souligner les très fortes interactions avec les domaines de l’IAM et du Customer IAM (CIAM). Dans ce nouvel article, nous allons maintenant mettre en évidence les lacunes...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/iam-of-things-un-marche-emergeant-mais-un-besoin-deja-present/">IAM of Things, un marché émergeant mais un besoin déjà présent</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Dans <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">un précédent article</a>, nous avons pu découvrir l’IAM <em>of Things</em> (IAMoT) et souligner les très fortes interactions avec les domaines de l’IAM et du <em>Customer</em> IAM (CIAM). Dans ce nouvel article, nous allons maintenant mettre en évidence les lacunes actuelles du marché à couvrir les besoins de l’IAMoT.</p>
<p>&nbsp;</p>
<h2>Quels besoins pour l’IAMoT ?</h2>
<p>Il est possible de définir l’IAM comme une discipline permettant de « <strong>donner les bons droits, aux bonnes personnes, aux bons moments</strong> ». L’IAMoT vient ajouter une composante à cette définition pour permettre de « donner les bons droits, <strong>aux bonnes personnes et aux bons objets</strong>, aux bons moments ».</p>
<p>Mettre en œuvre des solutions pour permettre une gestion adaptée des identités des objets connectés se traduit donc par le besoin de prendre en compte :</p>
<ul>
<li>La gestion des identités des objets et de leur état (<a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">voir l’article</a> détaillant le cycle de vie des objets) ;</li>
<li>La gestion du contrôle d’accès et des habilitations :
<ul>
<li>des objets sur le SI et sur ses données ;</li>
<li>des objets sur les autres objets et leurs données ;</li>
<li>des employés/partenaires de l’entreprise sur l’objet et ses données ;</li>
<li>des clients finaux sur l’objet et ses données ;</li>
</ul>
</li>
<li>La gouvernance des identités des objets et la pertinence des droits associés dans le temps.</li>
</ul>
<p>Tout comme pour l’IAM, pour chacun de ces domaines, il va être nécessaire de définir des processus, une organisation associée et des outils adaptés aux contraintes technologiques du projet.</p>
<p>La question est donc maintenant : vers quelles solutions s’orienter pour répondre à mes besoins ?</p>
<p>&nbsp;</p>
<h2>Des plates-formes IoT orientées connectivité et gestion de flotte</h2>
<p>Le premier réflexe est de se tourner vers les services que peuvent fournir les plates-formes de gestion d’objets connectés.</p>
<p>En étudiant ces plates-formes plus en détail, nous avons fait le constat que leur priorité est déjà de couvrir les services essentiels pour la gestion de la flotte des objets connectés :</p>
<ul>
<li>gérer la connectivité multi-protocolaire des objets avec le SI de l’entreprise (SigFox, LoRa, 3/4/5G…) ;</li>
<li>maîtriser l’inventaire des objets déployés et en assurer la configuration ou la mise à jour via un module de « Device Management » (LWM2M, OMA-DM, TR-069/CWMP…) ;</li>
<li>permettre la remontée et la mise à disposition des données générées par l’objets (DTLS, CoAP, MQTT, AMQP…).</li>
</ul>
<p>Ces fonctions s’accompagnent de solutions techniques d’authentification de l’objet sur les plates-formes mais celle-ci n’offrent aucune opportunité de couverture des besoins métier.</p>
<p>Dans ce cas, que font les acteurs traditionnels de l’IAM et du CIAM ? Puis-je me tourner vers leurs solutions qui sont aujourd’hui orientées sur la couverture des besoins des utilisateurs ?</p>
<p>&nbsp;</p>
<h2>Des marchés IAM et CIAM en mutation pour couvrir une infime partie du besoin IoT</h2>
<p>Les éditeurs historiques de solutions IAM et CIAM ont compris l’énorme opportunité que représente l’IAMoT et orientent progressivement leurs offres et le discours associé sur ce marché. Néanmoins, nous constatons qu’ils ne couvrent encore que très partiellement les besoins identifiés ci-dessus et que selon leur capacité à innover le délai de mise en œuvre des nouveautés pourra être important.</p>
<p>Forts de leurs savoir-faire technologiques, ils se concentrent aujourd’hui quasi-exclusivement sur le volet contrôle d’accès. Ils offrent ainsi des solutions pertinentes pour permettre l’authentification applicative des objets sur le SI et la délivrance de jetons d’autorisation dont la gestion du contenu relève encore d’un défi propre à chaque projet. Sur les autres volets de l’IAMoT tels que la gestion de l’identité et de l’état des objets, la gestion du modèle de rôles liant objets / utilisateurs / identités internes / identités externes, ou la gouvernance des droits dans le temps, il est urgent que leur offre s’étoffe.</p>
<p>Dès lors, comment peut-on couvrir des besoins IAMoT bien présents malgré les lacunes du marché ?</p>
<p>&nbsp;</p>
<h2>Une hétérogénéité des usages rendant complexe la normalisation des pratiques et la standardisation des solutions</h2>
<p>La diversité des usages et donc des modes de fonctionnement des objets connectés est évidemment à l’origine de la difficulté des éditeurs à proposer une offre générique adaptée à ses clients. Mais les projets IoT sont là et il n’est pas envisageable d’attendre que le marché prenne forme.</p>
<p>Mais si l’harmonisation est actuellement impossible au niveau global du marché, un effort peut être consenti au niveau de l’entreprise afin d’essayer d’harmoniser les réponses pour l’ensemble de ses usages IoT. Ainsi tout en cherchant à tirer parti de ce que propose le marché IAMoT, il est nécessaire d’envisager le développement modulaire des briques manquantes et en priorité celles ayant trait à la gestion des relations « objets / utilisateurs / identités internes / identités externes ». Attention toutefois à ne pas succomber aveuglement à l’utilisation des <em>frameworks</em> bas-niveau propriétaires proposés par les plates-formes IoT. Chacun devra être vigilant à conserver un niveau d’abstraction et d&#8217;autonomie suffisant pour ne pas être lié <em>ad vitam æternam</em> à un éditeur unique. Ce point d’attention est d’autant plus important dans un marché peu mature et en explosion où les bonnes idées se font et se défont.</p>
<p>&nbsp;</p>
<h2>Que faut-il retenir ?</h2>
<p>Aucune solution du marché ne couvre l’intégralité des besoins fondamentaux de l’<em>IAM of Things</em>. Les plates-formes IoT se limitent aux fonctions de connectivité des objets, de gestion de flotte et de remontée de données. Les plates-formes IAM et CIAM n’offrent quant à elles que des réponses technologiques aux besoins d’authentification et d’autorisation.</p>
<p>Afin de combler les manques, chaque entreprise devra évaluer le besoin de se lancer dans le développement de ses propres modules applicatifs. Un effort tout particulier devra être entrepris pour atteindre un niveau adapté de généricité des modules pour l’ensemble de leurs usages et d’indépendance vis-à-vis des solutions éditeur.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2020/02/iam-of-things-un-marche-emergeant-mais-un-besoin-deja-present/">IAM of Things, un marché émergeant mais un besoin déjà présent</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A life cycle approach for IoT security</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 20:59:03 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & Consumer goods]]></category>
		<category><![CDATA[cybersecurity]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[Life cycle]]></category>
		<category><![CDATA[security]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=12089</guid>

					<description><![CDATA[<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">A life cycle approach for IoT security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>As with employee or customer identity management, the life cycle approach of connected objects within the Internet of Things (IoT) makes it possible to address all security issues. This article presents the key elements of this methodology and the major points to be addressed at each event in the life of a connected object.</p>
<h2>What are the risks in the iot world?</h2>
<p>The IoT advent has enabled millions of new potential technological advantages for consumers and companies. However, with <strong>these new advantages</strong>, certain risks are higher in the field of connected devices.</p>
<p>&nbsp;</p>
<figure id="post-12098 media-12098" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-12098 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1.png" alt="" width="1441" height="977" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1.png 1441w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-282x191.png 282w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-768x521.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image1-58x39.png 58w" sizes="auto, (max-width: 1441px) 100vw, 1441px" /></figure>
<p style="text-align: center;"><em>Figure 1 – Most significant risks in the IoT world</em></p>
<p>&nbsp;</p>
<p>These business and technological risks which could cause significant potential impacts for consumers and companies, should be identified <strong>from the upstream phases of an IoT project.</strong></p>
<p>&nbsp;</p>
<h2>Which project methodology to choose in order to ensure security of connected devices?</h2>
<p>Even though security issues to address in IoT project are common for all project, we think necessary <strong>to structure reflections regarding the life cycle of the connected device</strong>.</p>
<p>The diagram below highlights all the stages of their life cycle.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12096 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2.png" alt="" width="1479" height="755" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2.png 1479w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-374x191.png 374w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-768x392.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image2-71x36.png 71w" sizes="auto, (max-width: 1479px) 100vw, 1479px" /></p>
<p style="text-align: center;"><em>Figure 2- A life cycle enabling to address all the security issues</em></p>
<p>&nbsp;</p>
<p>Let us review  some important issues raised by this approach:</p>
<ol>
<li><strong>Design, manufacturing, and distribution phases</strong></li>
</ol>
<p>This first phase addresses issues related to the design of the object, regarding business stakes, targeted users (B2B, B2C, B2E), deployment environment (controlled or not) and criticality of the use:</p>
<ul>
<li>What are the regulatory constraints related to the use of the object?</li>
<li>What identity should be labeled and how is this identity created?</li>
<li>How is the security related to object’s hardware and software secrets and data stored in the object?</li>
<li>How is the state of a device on the management platform initialized, ensuring it has no right on the IS before the initialization step?</li>
</ul>
<p>The determined choices during the manufacturing phases are crucial because they determine characteristics and capacities of the device. Some of them will therefore be immutable throughout the life of the device and will impose strong constraints in the following steps.</p>
<p>Furthermore, although the end of the manufacturing phase marks the beginning of the existence of the device on the device management platform, there is still no reason to consider an interaction with the IS.</p>
<p>Any interaction before the device’s association to a user (physical or moral) would mean that it has been diverted in the distribution phase. <strong>Any access to the IS before the initialization phase must be strictly limited</strong> to the firmware update (version N installed at the factory and version N+1 available when unpacking) or to the pre-customization of the object (operating settings or injection of secrets not related to the user). Beyond IS security, an object that is unused before any pairing phase will reduce the risk of theft of that object in the factory or during distribution<em>.</em></p>
<ol start="2">
<li><strong>Initialization phase</strong></li>
</ol>
<p>Initialization phase materializes the association phase (also named pairing) between a device and its owner. Any data generated by the device (or realized action) is then declared as belonging or attributed to its owner..</p>
<p>Therefore, the main challenge is to <strong>ensure a reliable level of user / object association corresponding to the following business stakes:</strong></p>
<ul>
<li>Low level of association required (low-risk situation): An employee declares the usage of an attendance identification system in the meeting room;</li>
<li>Strong level of association required (high-risk situation): when purchasing a connected lock, a consumer provides a serial number and a one-time secret code to allow his mobile application to unlock the door of his home.</li>
</ul>
<p>It is very important to find a balance between the user experience and security.</p>
<p>The robustness of the expected association will <strong>vary according to the nature of the services to which the customer has subscribed.</strong></p>
<ol start="3">
<li><strong>Use phase</strong></li>
</ol>
<p>The definition of the use cases of connected devices is the most anticipated step by companies, however <strong>many aspects of security remain neglected</strong>.</p>
<p>Besides business use cases, additional questions must be raised:</p>
<ul>
<li>How can regular updates of the connected device be implemented?</li>
<li>What are the different actors of the company roles regarding the maintenance of the device operating system layer: the application layer, and the network module?</li>
<li>What is the detection and response requirements for a compromised device?</li>
<li>How to take advantage of the company SIEM (<strong><em>S</em></strong><em>ecurity <strong>I</strong>nformation and <strong>E</strong>vent <strong>M</strong>anagement</em>) and SOC (<strong><em>S</em></strong><em>ecurity <strong>O</strong>peration <strong>C</strong>enter</em>) for technical security incidents (software compromise of the device) and for business security incidents (misuse or theft of a device)?</li>
<li>How can backward compatibility of protocols and APIs used by different versions of the same type of device be maintained?</li>
<li>What are the models of roles and interactions between different populations acting on the object?</li>
</ul>
<p>Concerning this last question, and as an example, the scheme below illustrates the potential complexity stemming from the interactions and roles model such as a connected vehicle.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12094 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3.png" alt="" width="1464" height="725" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3.png 1464w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-386x191.png 386w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-768x380.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image3-71x35.png 71w" sizes="auto, (max-width: 1464px) 100vw, 1464px" /></p>
<p style="text-align: center;"><em>Figure 3- Example of a roles and interactions model with a connected vehicle (research carried out with IMT Atlantique)</em></p>
<p>&nbsp;</p>
<ol start="4">
<li><strong>Resale phase</strong></li>
</ol>
<p>Today, the resale is <strong>the most neglected</strong> phase during the device design. This event essentially concerns devices for B2C markets and raises very specific issues:</p>
<ul>
<li>How to detect and handle the resale of a device between individuals?</li>
<li>What privacy-by-design principles should be implemented to protect secrets and data from the former owner while resetting a device?</li>
<li>How can access rights of the former owner of the device be removed?</li>
<li>What are the ways to reset a device in a stable and clean state before re-pairing?</li>
</ul>
<p>The major difficulty involves <strong>the detection of the resale event</strong> which triggers the device/user unpairing processes, reset the state of the object, etc.</p>
<p>Our experience allows us to identify some circumstances that could indicate a change of ownership.</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12092 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4.png" alt="" width="1463" height="509" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4.png 1463w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-437x152.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-768x267.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image4-71x25.png 71w" sizes="auto, (max-width: 1463px) 100vw, 1463px" /></p>
<p style="text-align: center;"><em>Figure 4 – Examples of events that could indicate the change of ownership</em></p>
<p>&nbsp;</p>
<p>Despite such examples, we witness that resale remains a complex event to identify. Thus, some companies choose <strong>not to authorize the device resale</strong> via a lease contract. The device must therefore be returned when the service is terminated; otherwise it must be made unusable. This model is comparable to renting an Internet box with an ISP (<strong>I</strong>nternet <strong>S</strong>ervice <strong>P</strong>rovider).</p>
<ol start="5">
<li><strong>End-of-life and recycling</strong></li>
</ol>
<p>Although<strong> essential</strong>, we currently have little perspective on this step, however there are multiple stakes:</p>
<ul>
<li>Revoke access rights on the Information System of an end-of-life device;</li>
<li>Renew the identity of a recycled device;</li>
<li>Ensure the replacement of a defective object by re-associating a new one with the same owner and the same data;</li>
<li>Detect the inactivity of a device to trigger a replacement.</li>
</ul>
<p>The main risks are <strong>the loss of access control over the company IS</strong> via identifiers associated with recycled devices, <strong>the disclosure of personal data</strong> of the former owner or <strong>the additional cost of license</strong> for data generated by devices considered out of the scope.</p>
<p>&nbsp;</p>
<h2>A variable capacity of action in response to the risks according to the nature of the project</h2>
<p>At this stage of your reading, you probably think that this article is not your concern because you purchase pre-conceived connected modules or devices.</p>
<p>Unfortunately this mindset is wrong –  you are still exposed to the same risks! Even though you only purchase or welcome connected devices in your IS, by addressing all the issues above you will be able to feed the contents of requirement specifications to suppliers.</p>
<p>To conclude, <strong>whatever the nature of your IoT project</strong>, it is essential to design your object by structuring the reflections around its life cycle: from its manufacturing to its disposal. It is therefore necessary, at each stage, to address all the relevant security themes: Network / application / hardware security, standards, detection and reaction, governance, maintenance in security condition&#8230;</p>
<p>&nbsp;</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-12090 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5.png" alt="" width="807" height="589" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5.png 807w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-262x191.png 262w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-768x561.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/09/image5-53x39.png 53w" sizes="auto, (max-width: 807px) 100vw, 807px" /></p>
<p style="text-align: center;"><em>Figure 5 – Main security themes for an IoT project</em></p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/09/life-cycle-iot-security/">A life cycle approach for IoT security</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What is IAM of Things?</title>
		<link>https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/</link>
		
		<dc:creator><![CDATA[Kévin Guérin]]></dc:creator>
		<pubDate>Mon, 14 Jan 2019 08:55:54 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Identity]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[customer IAM]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[IAM of Things]]></category>
		<category><![CDATA[identity]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11499/</guid>

					<description><![CDATA[<p>Identity and IoT, what stakes? Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">What is IAM of Things?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h2>Identity and IoT, what stakes?</h2>
<p>Connected objects bring a whole range of new perspectives for the evolution of processes and working methods for businesses and users. Indeed, they are now able to interact with their environment to exchange information or perform actions. These interactions are characterized by relationships between corporate information systems, employees, end users and even other objects. To ensure the security of such exchanges, it is absolutely necessary to implement access control mechanisms which implies<strong> knowing and managing the identities of all connected objects of a fleet as well as their users.</strong></p>
<p>This identity management discipline is well known within companies and linked to the IAM field (Identity &amp; Access Management), that means the lifecycle management of the identities of employees and partners (traditional IAM) or end clients (<a href="https://www.riskinsight-wavestone.com/en/2017/01/ciam-pilier-de-transformation-business/">Customer IAM</a>). It must now be applied to the fleets of connected objects: it is the <strong>IAM <em>of Things</em></strong> (IAMoT).</p>
<figure id="post-11493 media-11493" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11493 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1.png" alt="" width="1924" height="1009" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1.png 1924w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-364x191.png 364w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-768x403.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-1-71x37.png 71w" sizes="auto, (max-width: 1924px) 100vw, 1924px" /></figure>
<figure id="post-11497 media-11497" class="align-none"></figure>
<p style="text-align: center;"><em>Figure 1 – Traditional IAM, Customer IAM and IAMoT: three strongly related fields</em></p>
<p>&nbsp;</p>
<h2>A connected object, yes&#8230; but to WHAT?</h2>
<p>The interactions between a connected object and its environment can be grouped into 3 main categories.</p>
<p>&nbsp;</p>
<h3>1 &#8211; An object connected to the company’s IS</h3>
<p>This is the first use case that comes to mind. Each object communicates with the IS via <strong>a unique identity that represents it and is associated to its access rights</strong>. This implies the implementation of principles for the creation, referencing, management, control and piloting of theses identities. We must <strong>know the condition of an object or the identity of its owner at any time.</strong></p>
<p>In a standard technological chain such as “objects – relays – IoT platform – applications”, <strong>the IoT platform offers a central point for managing all objects identities.</strong></p>
<p>In this context, it is also essential to manage the authentication of objects to applications, and therefore to define the principles of creating the secrets that will be used.</p>
<figure id="post-11495 media-11495" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-11495" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2.png" alt="" width="250" height="397" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2.png 547w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2-120x191.png 120w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image-2-25x39.png 25w" sizes="auto, (max-width: 250px) 100vw, 250px" /></figure>
<p style="text-align: center;"><em>Figure 2 – Standard technological chain</em></p>
<p>&nbsp;</p>
<h3>2 &#8211; An object used by customers</h3>
<p>For this type of object, appears <strong>a strong relationship with the <em>Customer IAM</em> field</strong>. Indeed, the object must be able to <strong>verify the user’s identity</strong> against the CIAM and <strong>determine the services to which the customer has subscribed. </strong></p>
<p>In case of shared usage of the same object, <strong>a role and data model involving different types of end-users</strong> must also be considered.</p>
<p>Let’s take the example of a connected vehicle:</p>
<ul>
<li>The vehicle driver wants to use the GPS service. Before granting access to the service, the vehicle must answer many questions. What is the identity of the driver and what personal profile should I use (in order to load his previous rides for instance)? Is he the owner of the vehicle, the driver of a rental car, or has he borrowed it for a one-time use? Has the driver subscribed to the GPS services from the manufacturer and what is his level of service (routes calculation only, or also alerts for danger zones)?</li>
</ul>
<p>&nbsp;</p>
<h3>3 &#8211; An object in interaction with the company’s employees and partners</h3>
<p>Last use case, each object can interact with the company’s employees, service providers or partners. <strong>The relationship with the traditional IAM domain</strong> managing the authorizations and roles of the company’s partners and employees is therefore essential.</p>
<p><strong>The use cases</strong> of an object require the creation of <strong>a role model</strong> to answer the question: which rights for which populations of users on which functionalities of the object?</p>
<p>Let’s take again the example of a connected vehicle:</p>
<ul>
<li>If repairs are needed, the mechanic must be able to view the latest vehicle’s operating indicators before the breakdown for diagnostic purposes. Is this garage part of the manufacturer’s network or independent? Is the mechanic allowed to access all GPS information or only the technical indicators of the engine? Can the customer consent or at least be informed of such access to his vehicle’s data?</li>
</ul>
<p>This example also highlights that access rights may be closely linked <strong>to a time frame</strong> (only for the duration of the repair) or <strong>to the nature of the data</strong> (privacy protection of GPS data).</p>
<p>&nbsp;</p>
<h2>IAM of Things also means processes!</h2>
<p>All IAM experts will agree: there is no IAM without a thorough study of the lifecycle of the identities involved. Our conviction is that <strong>IAMoT must study all the processes involving the object over its entire life cycle.</strong> Indeed, throughout the life of an object, the nature of interactions with its environment is likely to evolve according to its condition. For example, a brand-new object should be associated with its main user via a pairing process that ensures a level of trust consistent with the issues at stake…</p>
<p>Let’s use for the last time the example of the connected vehicle:</p>
<ul>
<li><em>A person has just acquired a second-hand connected vehicle from a private owner. In the context of this resale, it is necessary for the new purchaser to ensure that all accesses to services will be properly revoked for the previous owner. The detection of the resale event must therefore trigger a process of un-pairing the former owner.</em></li>
</ul>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-11497 size-full" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3.png" alt="" width="1354" height="544" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3.png 1354w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-437x176.png 437w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-768x309.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2019/01/image3-71x29.png 71w" sizes="auto, (max-width: 1354px) 100vw, 1354px" /></p>
<p style="text-align: center;"><em>Figure </em><em>3</em><em> – Ingredients for the IAM of Things recipe</em></p>
<p>&nbsp;</p>
<h2>The IAM of Things, a new discipline based on mastered concepts</h2>
<p>This article highlights the identity management issue for the IoT and underlines the existing links with other fields of the IAM. It is important to keep in mind that even if <strong>the fundamental principles of the IAM also apply</strong> to the identity of connected objects, <strong>responses adapted to each project’s context</strong> must be carefully studied.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2019/01/what-is-iam-of-things/">What is IAM of Things?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Saga 1/3: connected car: between cybersecurity and safety</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/10/saga-13-connected-car/</link>
		
		<dc:creator><![CDATA[Qu3tinM4TYas]]></dc:creator>
		<pubDate>Thu, 25 Oct 2018 07:51:05 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Manufacturing & Industry 4.0]]></category>
		<category><![CDATA[connected car]]></category>
		<category><![CDATA[connected mobility]]></category>
		<category><![CDATA[embbeded security]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[mobility]]></category>
		<category><![CDATA[regulation]]></category>
		<category><![CDATA[safety]]></category>
		<category><![CDATA[stakes]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11369/</guid>

					<description><![CDATA[<p>The revolution is underway! The vehicles we drive will become ever-more connected and autonomous in the near future, something that will open the door to new uses. The user experience, in terms of mobility, will undoubtedly be better, but the...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/10/saga-13-connected-car/">Saga 1/3: connected car: between cybersecurity and safety</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>The revolution is underway! The vehicles we drive will become ever-more connected and autonomous in the near future, something that will open the door to new uses. The user experience, in terms of mobility, will undoubtedly be better, but the services on offer will go hand -in-hand with new threats and new cybersecurity issues to be considered.</em></p>
<p><em>In this series, we’ll first present connected vehicles and their associated cybersecurity challenges; the main sources of threat and the risks will be addressed in a second installment. Lastly, a third article will present our views on the issue and the main lines of the response required to address it.</em></p>
<p>&nbsp;</p>
<h2>The connected car: a vehicle supporting a raft of interactions</h2>
<p>Entertainment, an extension of your smartphone, shared mobility, management of the car&#8217;s life cycle&#8230; users are demanding new experiences, and the services and applications they generate are resulting in a range of interactions. We can imagine a smart car being able to find a free parking space, automatically schedule an appointment for maintenance, or turn a traffic light green as it approaches. Since April 1, 2018, all new vehicle models must also have an emergency call system, as well as geolocalization to enable the authorities to be contacted in the case of an accident. In this respect, they are already &#8220;connected&#8221;.</p>
<p>Manufacturers and other players are already capitalizing on the opportunity to maintain a close relationship with customers throughout the vehicle life cycle. By doing this, they become &#8220;<strong>providers of services and mobility solutions</strong>,&#8221; drawing on, among other things, collected data. In particular, because such connectivity represents a step toward autonomy, the vehicle needs to be able to communicate with other vehicles and the surrounding environment. These changes are underway, and their pace will progressively increase.</p>
<p>However, the challenge of cybersecurity is scarcely taken into account, or ignored: yet it has to be a key plank of any connected solution—from the design phase to the end of the life cycle. Such thinking is essential to safeguarding the vehicle’s integrity, protecting passenger lives, and complying with current and future regulation.</p>
<p>The first prerequisite is to properly understand the connected vehicle&#8217;s technologies and ecosystem.</p>
<p>&nbsp;</p>
<h2>How connected vehicles interact with their environment</h2>
<p>A specific feature of a connected vehicle is that it interacts with its ecosystem, via mobile data streams, over both the short and long-ranges.</p>
<ul>
<li><strong>Short-range connections</strong>: Here, the vehicle interacts directly with an object (such as a smartphone, infrastructure, etc.), without any intermediary. It uses technologies with a limited range for local exchanges (WAVE, on-board Wi-Fi, Bluetooth, etc.).</li>
<li><strong>Long-range connections</strong>: Here, the vehicle uses remote access to interact with external components via a cloud platform. 4G, and soon 5G, connections are the technologies of choice for connecting vehicles to the internet.</li>
</ul>
<p>This connected-vehicle concept also covers exchanges with the vehicle’s direct environment under the umbrella term &#8220;Vehicle-to-Everything&#8221; (or V2X). Lastly, the standard, ISO 20077, covers &#8220;<strong>Extended Vehicles</strong>&#8221; (or ExVe) as a whole: which comprise the physical vehicle as well as all the platforms and infrastructures that the car manufacturer is responsible for.</p>
<p><img loading="lazy" decoding="async" class="aligncenter wp-image-10710" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/image-1-395x191.png" alt="" width="600" height="290" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/image-1-395x191.png 395w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/image-1-768x372.png 768w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/image-1-71x34.png 71w, https://www.riskinsight-wavestone.com/wp-content/uploads/2018/05/image-1.png 1405w" sizes="auto, (max-width: 600px) 100vw, 600px" /></p>
<p>&nbsp;</p>
<h2>A range of ecosystems and players that need to work together</h2>
<p>The car was once a very closed system; with the exception of diagnostic connections for garages and some connectivity to be able to broadcast multimedia content; any connectivity risks were largely contained. Today, the proliferation of forms of connectivity and access to the internet have opened up new opportunities for manufacturers and service providers, but also for attackers.</p>
<p>The first ecosystem to consider is the . Electronic and communication systems must be able to communicate with each other without the transmitted data or stored secrets being altered or stolen. Among these systems are the ECUs, the mini &#8220;on-board computers&#8221; that control the vehicle’s key functions, such as the braking system, air conditioning, lighting, etc.</p>
<p>Beyond on-board security, there are the <strong>user and owner </strong>(the latter not necessarily an individual) who have the right to give orders to the vehicle according to pre-defined rules. In the future, their authentication will be essential when it comes to questions of responsibility, as well as for verifying the legitimacy of the orders they issue.</p>
<p>Another vitally important aspect concerns connected services that use centralized <strong>platforms</strong>, or even cloud-based ones, which have been developed by the manufacturers or their partners. These platforms represent a significant threat because they can trigger orders for entire fleets of vehicles, and therefore the impact of any problem is multiplied. Manufacturers will need to put in place sufficiently secure solutions to allow such services; they’ll need to combine their own platforms with those of partners and the APIs on the vehicle, as well as ensuring the required level of confidence in the environment.</p>
<p>Lastly, in the medium-term, <strong>external objects and the surrounding environment</strong> (other vehicles, garages, parking lots, road infrastructure, etc.) will need to communicate and share information. The challenges of ensuring security in real time (in terms of availability, integrity, etc.) will be complex ones.</p>
<p>&nbsp;</p>
<h2>Cybersecurity issues: from the virtual to the real world</h2>
<p>People’s safety, inside and outside vehicles, is a top priority for the automotive industry. We might imagine, then, that the cybersecurity issues raised by connected vehicles will be treated with the same degree of rigor—such that they can guarantee the car’s safety and integrity.</p>
<p>The first issue represents an <strong>organizational challenge</strong> for all stakeholders, especially manufacturers, because the emergence of this new model brings together two opposing worlds: <strong>services</strong> and <strong>engineering</strong>. The first is characterized by agility and speed, and large numbers of short-term projects. The second, with a much longer development cycle, must meet the safety and quality requirements associated with vehicle approval. This dichotomy has impacts on cybersecurity and, in particular, its integration into development projects, as well as the coverage of end-to-end risk. For example, as a result of its position, the backend becomes a nerve center that must be fully protected to avoid any risk of a systemic attack that could have repercussions for the entire fleet. Unfortunately, the true value of this need for security is not currently appreciated, mainly as a result of requirements for very short times to market.</p>
<p>Considering the other issues, it’s clear that the cybersecurity challenges for connected vehicles don’t differ greatly from those in the IS world: identity and access management, detection and response, the security of infrastructures, cryptography, third-party management, patch management, etc. A connected vehicle is a mobile IS, and numerous security standards (ISO2700x, NIST 800, etc.) have already been developed. These set out good practice in various guides and reference documents (SAE J3061, AUTOISAC, NHST, etc.) and the topic will shortly be covered to the ISO/SAE 21434 standard.<br />
However, a number of factors inherent to vehicles and their embedded systems mean that the topic needs to be considered from new and specific angles.</p>
<p>The vehicle’s <strong>mobility and connectivity</strong> make security more complex: security must be guaranteed where there is a limited connection, or no connection, and in the context of a changing environment. Regulatory aspects must not be ignored either, given that the vehicle may have to move between countries.</p>
<p>The world of <strong>on-board systems</strong> also places constraints on hardware—in terms of cost, computing power, and size.</p>
<p>Questions about updating components and services arise too, given that a system must be able to <strong>function at all times</strong> but may also be shut down for long periods.</p>
<p>Lastly, vehicles are designed for a <strong>long life cycle</strong>, which implies thinking about security from the start, especially when it comes to managing identities and accesses. This long life cycle also means considering evolving standards over time, as well as developing a model for updates that guarantees vehicle security in a way that is sustainable and manageable for constructors.</p>
<p>&nbsp;</p>
<p><em>The road ahead is long, and cybersecurity is approaching a crossroads that was not in view a decade ago. It’s vital that all players involved grasp the importance of what’s required and start to put in the effort now, before it’s too late.</em></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/10/saga-13-connected-car/">Saga 1/3: connected car: between cybersecurity and safety</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>L’INTERVIEW D’ICARE TECHNOLOGIES – LA BAGUE INTELLIGENTE SECURISEE</title>
		<link>https://www.riskinsight-wavestone.com/en/2018/08/interview-icare-technologies-bague-intelligente-securisee/</link>
		
		<dc:creator><![CDATA[Gabriel Amirault]]></dc:creator>
		<pubDate>Tue, 07 Aug 2018 16:09:09 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & smart products]]></category>
		<category><![CDATA[Banque]]></category>
		<category><![CDATA[BCSIA]]></category>
		<category><![CDATA[CIAM]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IoT & consumer goods]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=11164/</guid>

					<description><![CDATA[<p>Dans le cadre des Banking CyberSecurity Innovation Awards, ICARE Technologie a reçu le prix spécial France pour sa bague intelligente. Celle-ci, couplée à une application smartphone, permet au porteur de la programmer pour remplacer l’intégralité du portefeuille et du porte-clefs....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/interview-icare-technologies-bague-intelligente-securisee/">L’INTERVIEW D’ICARE TECHNOLOGIES – LA BAGUE INTELLIGENTE SECURISEE</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Dans le cadre des Banking CyberSecurity Innovation Awards, <strong>ICARE Technologie</strong> a reçu le <strong>prix spécial France</strong> pour sa bague intelligente. Celle-ci, couplée à une application smartphone, permet au porteur de la programmer pour remplacer l’intégralité du portefeuille et du porte-clefs. Voici l’interview de son représentant, Georges Bote qui détaille pour nous comment sa solution contribue à la cybersécurité de la banque de demain.</em></p>
<h2>Comment l&#8217;idée vous est-elle venue ?</h2>
<p><strong>Georges Bote (ICARE Technologies)</strong> raconte que l&#8217;idée est venue au fondateur, Jérémy Neyrou <em>« il y a 6 ans de cela, en perdant mes clés de voiture sur une plage Corse complètement déconnectée de tout réseau, après avoir parcouru près d&#8217;une dizaine de kilomètres en plein soleil d&#8217;été à pied »</em>, il imagine un « <em>objet à la fois intuitif et autonome qui permettrait d&#8217;embarquer [le] trousseau de clés et [les] moyens de paiement</em> ». C&#8217;est ainsi qu&#8217;est née Aeklys, « <em>cette bague intelligente qui permet d&#8217;embarquer jusqu&#8217;à 28 fonctionnalités différentes</em> ».</p>
<h2>Quel est le plus grand risque de sécurité pour les banques et pour ses clients selon vous ? Comment répondez-vous à la menace qui pèse sur les banques ?</h2>
<p><strong>Georges Bote (ICARE Technologies)</strong> s&#8217;accorde également à dire que « <em>la fraude à la fois bancaire et sur l&#8217;identité des personnes reste le grand risque pour les banques et leurs clients</em> ». C&#8217;est pourquoi la bague connectée proposée par ICARE Technologies embarque un mécanisme de désactivation en cas de perte ou de vol, protégeant ainsi son propriétaire contre l&#8217;usurpation de ses moyens de paiement sans qu&#8217;il ne doive faire opposition d&#8217;une quelconque manière que ce soit.</p>
<h2>L&#8217;enjeu pour les RSSI aujourd&#8217;hui est de parvenir à concilier la facilité d&#8217;implémentation, la simplicité d&#8217;utilisation des solutions de sécurité avec une technologie sécurisée. Comment convaincre un RSSI de la pertinence de votre solution et de la sécurité du produit ? Quels sont les différenciateurs qui vous démarquent sur le marché ?</h2>
<p><strong>ICARE Technologies</strong> explique que la pertinence de la sécurité de sa solution « <em>réside dans notre technique et différentes certifications bancaires. Notre secure element dispose d&#8217;un niveau EAL6+ certifié par l&#8217;ANSSI, ce qui nous permet de travailler dans le domaine militaire en plus d&#8217;avoir un chiffrement en AES 256 bits </em>».</p>
<h2>Quelles sont les synergies entre votre innovation et les solutions de sécurité bancaires existantes à l&#8217;heure actuelle ?</h2>
<p>La force du produit d&#8217;<strong>ICARE Technologies</strong> réside dans son innovation et en sa sécurité : « <em>de plus, il caractérise une nouvelle forme de liberté et de sécurité qui est fortement attractive pour les clients potentiels. L’intérêt est donc d’en faire devenir un objet « à la mode » de manière à orienter la connotation sociale de la bague comme une tendance</em> ».</p>
<p>Les synergies existent et la technologie est actuellement en phase de test avec des partenaires bancaires et industriels pour travailler notamment sur la sécurisation de valises informatiques. Georges Bote annonce <strong>« </strong><em>la préparation d&#8217;un 2ème tour de table et de belles surprises pour notre Go To Market qui sera prévu le 1er trimestre 2019 </em>».</p>
<p>Pour en savoir plus : <a href="https://fr.icaretechnologies.com/">https://fr.icaretechnologies.com/</a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2018/08/interview-icare-technologies-bague-intelligente-securisee/">L’INTERVIEW D’ICARE TECHNOLOGIES – LA BAGUE INTELLIGENTE SECURISEE</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Objets connectés : les 4 dimensions de la sécurité</title>
		<link>https://www.riskinsight-wavestone.com/en/2016/11/objets-connectes-4-dimensions-de-securite/</link>
		
		<dc:creator><![CDATA[Chadi Hantouche]]></dc:creator>
		<pubDate>Wed, 30 Nov 2016 09:42:59 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & smart products]]></category>
		<category><![CDATA[CARA]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IoT & consumer goods]]></category>
		<category><![CDATA[transformation numérique]]></category>
		<guid isPermaLink="false">https://www.riskinsight-wavestone.com/?p=9323</guid>

					<description><![CDATA[<p>Comme toute révolution technologique, la transformation numérique impacte de nombreux domaines de l’économie : la domotique, la sécurité physique, la mobilité, la santé, etc. L’Internet des Objets (IoT en anglais) joue un rôle important dans cette ten­dance, avec l’émergence de nombreux...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/11/objets-connectes-4-dimensions-de-securite/">Objets connectés : les 4 dimensions de la sécurité</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Comme toute révolution technologique, la transformation numérique impacte de nombreux domaines de l’économie : la domotique, la sécurité physique, la mobilité, la santé, etc. L’Internet des Objets (IoT en anglais) joue un rôle important dans cette ten­dance, avec l’émergence de nombreux objets connectés. Les chiffres sont en effet significatifs : de nombreux analystes considèrent qu’il y aura entre 20 et 200 milliards d’objets connectés d’ici 2020.  </em></p>
<p>&nbsp;</p>
<h2> <strong>AU COEUR DE LA TRANSFORMATION NUMÉRIQUE</strong></h2>
<p>Aucune industrie ne peut aujourd’hui ignorer cette tendance et les entreprises voient un intérêt grandissant à s’emparer de ce qu’elles perçoivent comme une véritable opportunité.</p>
<p>Alors que des start-ups conçoivent chaque jour des dispositifs intelligents, des partenariats se mettent en place entre les vendeurs et les industries traditionnelles – tels les secteurs de l’assurance, automobile, administratif, bancaire – afin d’offrir de nouveaux services aux consommateurs grâce à divers éléments connectés.</p>
<p>&nbsp;</p>
<h2><strong>UNE SURFACE D’ATTAQUE DE PLUS EN PLUS EN PLUS VASTE POUR LES CYBERCRIMINELS</strong></h2>
<p>L’essor de cet Internet des Objets n’est pas sans danger, d’autant plus que les risques, qui étaient surtout virtuels, s’étendent au domaine du physique.</p>
<p>Une <a href="http://www8.hp.com/us/en/hp-news/press-release.html?id=1744676#.WD6bZ_nhA2w">étude frappante</a> a été menée par HP Fortify en 2014, mettant en avant un constat sans appel : en testant la sécurité des 10 des objets connectés les plus en vogue du moment, une moyenne de 25 vulnérabilités par objet a été trouvée. La plupart d’entre elles sont liées à des problèmes de sécurité basiques, tels que la <strong>mauvaise gestion de la confidentialité des données et des droits d’accès</strong>, <strong>l’absence de chiffrement des flux</strong>, <strong>une interface d’adminis­tration Web non sécurisée</strong>, ou encore <strong>une protection générale inadaptée</strong>. <a href="http://www8.hp.com/us/en/hp-news/press-release.html?id=2037386#.WD6boPnhA2w">La suite de cette étude en 2015</a> a également montré que les 10 smartwatchs et les 10 systèmes de sécurité pour les particuliers les plus vendus présentaient tous des vulnérabilités majeures concernant la confidentialité des données de l&#8217;utilisateur.</p>
<p>Ce manque de durcissement augmente le risque de vulnérabilités pouvant affecter toute sorte d’objets : des réfrigérateurs aux toilettes connectées, en passant par les <a href="https://www.riskinsight-wavestone.com/en/2017/06/cyber-crash-tests-security-solution-driverless-cars/">voi­tures </a>et les serrures. L&#8217;actualité des derniers mois en est la preuve avec par exemple l&#8217;<a href="http://searchsecurity.techtarget.com/news/450401962/Details-emerging-on-Dyn-DNS-DDoS-attack-Mirai-IoT-botnet">attaque DDoS sur le DNS Dyn</a> avec le botnet Mirai en octobre 2016 ou <a href="https://www.wired.com/2016/09/security-news-week-hackers-take-control-moving-teslas-brakes/">la prise de contrôle à distance d&#8217;une Tesla</a> par une équipe de hackers chinois en septembre 2016.</p>
<p>&nbsp;</p>
<h2><strong>DANS QUELLE CATÉGORIE DE RISQUES VOUS SITUEZ-VOUS ?</strong></h2>
<p>En ce qui concernent les entreprises, les risques dépendent de la posture adoptée. Dans le cas des objets connectés, quatre cas sont possibles. Les différentes postures ont été réunies sous l’acronyme « <strong>CARA </strong>» (pour <strong>Concevoir</strong>, <strong>Acquérir</strong>, <strong>Recommander</strong>, <strong>Accueillir</strong>) comme le montre le tableau ci-dessous. Une fois la posture identifiée, il convient de spécifier les risques génériques et les recommandations associées.</p>
<p><img loading="lazy" decoding="async" class="wp-image-9324 aligncenter" src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/11/CARA1.png" alt="CARA1" width="459" height="496" srcset="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/11/CARA1.png 720w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/11/CARA1-177x191.png 177w, https://www.riskinsight-wavestone.com/wp-content/uploads/2016/11/CARA1-36x39.png 36w" sizes="auto, (max-width: 459px) 100vw, 459px" /></p>
<p>Afin d’évaluer le risque, le cabinet Wavestone a développé un outil spécifique, la matrice « <strong>heat map</strong> ». Elle prend en compte deux dimensions : le niveau de risque et la posture.</p>
<p>&nbsp;</p>
<h2><strong>UN OUTIL D’ÉVALUATION EFFICACE : LA MATRICE « HEAT MAP »</strong></h2>
<p>Le schéma ci-dessous présente l’exemple concret de l’utilisation d’objets connectés pour le secteur bancaire et ses divers ser­vices. Ce contexte présente des contraintes particulières. D’un côté la réalisation d’une transaction financière est plus risquée que la consultation du solde bancaire. Mais d’un autre côté, la personnalisation des fonctions de sécurité sur un appareil appartenant à un employé ou à un client est bien plus compliqué que le durcissement d’un produit choisi par l’entreprise et qui a été acquis à un fournisseur, ou même développé en interne.</p>
<figure id="post-9324 media-9324" class="align-none">
<figure id="post-9325 media-9325" class="align-none"><img loading="lazy" decoding="async" class="aligncenter wp-image-9325 " src="https://www.riskinsight-wavestone.com/wp-content/uploads/2016/11/CARA2.png" alt="CARA2" width="702" height="271" /></figure>
</figure>
<p>Cette matrice permet de réaliser une <strong>cartographie des risques</strong> qui requièrent la plus grande attention.</p>
<p>&nbsp;</p>
<h2><strong>DES DISPOSITIFS DE SÉCURITÉ HABITUELS : DE NOUVEAUX MODES D’IMPLÉMENTATION</strong></h2>
<p>Une fois la cartographie des risques établie, il faut s’intéresser aux réponses que l’on peut y apporter. Une référence intéressante à ce propos est celle de l’<a href="https://www.owasp.org/index.php/OWASP_Inter%ADnet_of_Things_Project">initiative « IoT Project » de l’OWASP</a> (Open Web Application Security Project – organisation à but non lucratif) qui propose notamment une liste de recommandations de sécurité intéressantes et compréhensibles.</p>
<p>La première chose à noter à propos de ce guide est qu’il est divisé en 3 catégories selon les cibles d’audience visées : fabri­cants, développeurs, consommateurs. Cette structure a du sens dans la mesure où <strong>la sécurité est partagée entre ceux qui conçoivent les composants </strong>(matériel ou logiciel), <strong>et ceux qui les utilisent</strong>.</p>
<p>Par ailleurs, les dispositifs de sécurité doivent être <strong>complets – renforçant non pas les seuls objets connectés, mais aussi toute la sur­face d’une attaque </strong>(physique, matériel, logiciel, base de données, local ou à distance, etc.). À cet égard, les mesures de sécurité proposées sont surtout construites sur les bonnes pratiques de l’industrie de la sécurité.</p>
<p>L’Internet des Objets apporte un réel changement dans la mise en œuvre des dispositifs de sécurité.</p>
<p>En effet, plusieurs contraintes liées aux objets connectés sont à prendre en compte :</p>
<ul>
<li><strong>Ergonomie</strong> : la taille et le design influenceront les mesures de sécurité acceptables par les utilisateurs – par exemple, la taille de l’écran pour taper un mot de passe.</li>
<li><strong>Puissance</strong> : les petits objets embarqués actuels ont une puissance de calcul limitée. Plusieurs opérations ne peuvent être réalisées en même temps dans un laps de temps raisonnable. Par exemple, Apple a conseillé aux développeurs de ne pas implémenter des fonctionnalités nécessitant de long temps d’exécution sur l’Apple Watch.</li>
<li><strong>Connectivité</strong> : l’Internet des Objets utilise généralement du Bluetooth ou des protocoles NFC, deux technologies ayant une portée et un débit limité, ce qui ne permet pas toujours d’embarquer un niveau de sécurité suffisant.</li>
<li><strong>Durée de vie de la batterie</strong> : les algo­rithmes cryptographiques (comme du chiffrement / déchiffrement asymé­trique en temps réel) peuvent affecter durement la consommation énergé­tique, même s’ils permettent de pro­curer un meilleur niveau de protection.</li>
<li><strong>Gestion des mises à jour</strong> : il est indis­pensable de mettre à jour le système, sans interférer avec l’utilisation de l’objet. Cela est particulièrement frap­pant dans le cas des voitures connec­tées que l’on ne peut pas conduire lorsque le logiciel est en train de se mettre à jour. Cela peut prendre plus de 45 minutes.</li>
</ul>
<p>&nbsp;</p>
<p>Au-delà de la sécurité, la confidentialité est également indispensable pour les consommateurs ainsi qu’une exigence pour les autorités. L’implémentation pourrait être complexe, mais plusieurs initiatives pour la confidentialité des objets connectés ont émergé ces dernières années.</p>
<p>Parmi ces initiatives, le projet <a href="https://www.preserve-project.eu/">PRESERVE </a>est un exemple intéressant. Il offre à l’industrie automobile un nouveau moyen d’utiliser les PKI et les certificats numériques pour les voitures et les routes connectées. Le projet utilise des « pseudonymes » modifiés régulièrement afin de garantir que le conducteur reste anonyme tout en assurant que les communications entre les véhicules et l’infrastructure routière sont authentiques et sécurisées.</p>
<p>Nous sommes entrés dans une ère où sécurité et confidentialité des données sont devenues des critères essentiels dans le choix des consommateurs. <strong>Cette évolution ne peut plus être ignorée par les acteurs concernés, qu’ils conçoivent, acquièrent, recommandent ou accueillent des objets connectés</strong>.</p>
<p>&nbsp;</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2016/11/objets-connectes-4-dimensions-de-securite/">Objets connectés : les 4 dimensions de la sécurité</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Quantified self : jusqu’où aller pour mieux se connaître ?</title>
		<link>https://www.riskinsight-wavestone.com/en/2015/01/quantified-self-jusquou-aller-pour-mieux-se-connaitre/</link>
		
		<dc:creator><![CDATA[JuLiEDuclOs]]></dc:creator>
		<pubDate>Mon, 12 Jan 2015 07:54:44 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[Digital Compliance]]></category>
		<category><![CDATA[Digital privacy]]></category>
		<category><![CDATA[e-santé]]></category>
		<category><![CDATA[IoT]]></category>
		<guid isPermaLink="false">http://www.solucom-insight.fr/?p=6890</guid>

					<description><![CDATA[<p>Le mouvement du quantified self, ou phénomène de quantification de soi, permet de &#8220;se sentir mieux&#8221; en mesurant différentes actions liées au mode de vie d’un individu. Allant de la mesure du nombre de pas par jour, à la qualité...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/01/quantified-self-jusquou-aller-pour-mieux-se-connaitre/">Quantified self : jusqu’où aller pour mieux se connaître ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p style="text-align: left;" align="center">Le mouvement du <i>quantified self</i>, ou phénomène de quantification de soi, permet de &#8220;se sentir mieux&#8221; en mesurant différentes actions liées au mode de vie d’un individu. Allant de la mesure du nombre de pas par jour, à la qualité du sommeil, en passant par l’humeur, le <i>quantified self</i> se développe considérablement depuis sa création en 2007. Ce développement est intimement lié aux nouveaux usages des objets connectés (applications mobiles, balances ou bracelets connectés, etc.). Quels en sont les enjeux ? Quelles questions suscite-t-il ?</p>
<h2>Entre 50 et 70 milliards d’objets connectés dans le monde à horizon 2020</h2>
<p>La plupart de ces objets connectés seront portés sur les individus (<i>wearables</i>) ou utilisés quotidiennement. Parmi ceux qui sont au cœur de l’actualité de l’<a href="http://www.clubic.com/salon-informatique-tic/ces/" target="_blank" rel="noopener noreferrer">International CES 2015</a>, on peut citer le cuissard connecté de Cityzen Sciences ou la brosse à dents connectée pour enfants Vigilant Rainbow. Ces objets produisent automatiquement des données concernant notre corps et notre mode de vie qui, considérées individuellement, peuvent sembler anodines. Mais la finalité assumée par les services de <i>quantified self</i> est le recoupement des données collectées qui peut mener à un certain nombre de corrélations et définir des tendances générales sur la santé des personnes.</p>
<h2>Donnée de santé ou donnée de bien-être ?</h2>
<p>Les données produites par des objets connectés peuvent être distinguées en deux catégories : les<strong> données de santé</strong> et les <strong>données de bien-être</strong>. La frontière entre ces deux types de données est à ce jour encore floue du fait de l’absence de définition précise de la donnée de santé. Ceci rend difficile l’application d’une réglementation à ces données issues d’objets connectés.</p>
<p>Les données de santé à caractère personnel, <i>« recueillies ou produites à l’occasion des activités de prévention, de diagnostic ou de soins »</i> <a href="http://www.legifrance.gouv.fr/affichCodeArticle.do;?idArticle=LEGIARTI000021941353&amp;cidTexte=LEGITEXT000006072665" target="_blank" rel="noopener noreferrer">( Art. L. 1111-8 du Code de la Santé Publique )</a> sont soumises à un certain nombre de réglementations, notamment concernant leur hébergement. Les hébergeurs de données de santé doivent assurer un niveau de protection maximal face à ces données, considérées comme sensibles. Mais que dire des données recueillies par un bracelet connecté ou une application mobile ? Doivent-elles être soumises à cette réglementation puisqu’elles portent plutôt sur le mode de vie des utilisateurs ? Ce sont les questions que se pose aujourd’hui la <a href="http://www.cnil.fr/" target="_blank" rel="noopener noreferrer">Commission Nationale de l’Informatique et des Libertés (CNIL)</a> qui se penche sur l’utilisation et la sécurisation de ces données.</p>
<h2>La CNIL redoute les dérives du <i>quantified self</i></h2>
<p>La CNIL redoute que les données collectées par des objets connectés ne soient utilisées à titre commercial. L’encadrement de la protection et de l’utilisation de ces données est aujourd’hui nécessaire pour éviter les dérives. Les 16 et 17 septembre 2014, <a href="http://www.cnil.fr/es/linstitution/actualite/article/article/communique-g29-avis-sur-linternet-des-objets/" target="_blank" rel="noopener noreferrer">les autorités de l’Union Européenne de protection des données ont adopté un avis sur l’Internet des objets.</a> Il propose des recommandations pratiques aux acteurs (fabricants d’appareils, développeurs d’applications, plateformes sociales, etc.) pour se conformer au cadre réglementaire européen sur le traitement des données collectées par des « objets intelligents ». Les recommandations mentionnent à la fois les obligations des acteurs, les droits des utilisateurs et les mesures de sécurité à mettre en œuvre. En particulier, recueillir le consentement des utilisateurs et leur permettre de rester maîtres du partage de leurs données, sont des actions qui rassurent leurs utilisateurs clients. En suivant ces recommandations des autorités européennes, les acteurs peuvent disposer d’un avantage concurrentiel.</p>
<p>Les objets connectés sont de plus en plus « proches » de notre corps pour nous permettre de mieux nous connaître, par des mesures continues et automatiques. Nous arrivons aujourd’hui à une nouvelle conception de l’individu, fait d’un corps et de données. La question aujourd’hui est de savoir jusqu’où ira cette volonté de connaissance de soi et si nous serons dépendants de ces objets connectés qui nous entourent au quotidien ou réactifs face aux risques qu’ils impliquent.</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2015/01/quantified-self-jusquou-aller-pour-mieux-se-connaitre/">Quantified self : jusqu’où aller pour mieux se connaître ?</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Assurance : 4 clés pour relever le défi des objets connectés</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/11/assurance-4-cles-pour-relever-le-defi-des-objets-connectes/</link>
		
		<dc:creator><![CDATA[Patrick Durand]]></dc:creator>
		<pubDate>Mon, 17 Nov 2014 08:00:02 +0000</pubDate>
				<category><![CDATA[Métiers - Assurance]]></category>
		<category><![CDATA[assurance]]></category>
		<category><![CDATA[Internet of things]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[objets connectés]]></category>
		<category><![CDATA[transformation numérique]]></category>
		<guid isPermaLink="false">http://www.solucom-insight.fr/?p=6041</guid>

					<description><![CDATA[<p>Les géants du web investissent massivement dans tous les domaines des objets connectés (Google Car, thermostat Nest, Apple Watch&#8230;). Les grands industriels (constructeurs automobiles, opérateurs télécoms, énergéticiens, équipementiers) multiplient les initiatives. Des start-ups se créent quotidiennement et rivalisent de créativité....</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/11/assurance-4-cles-pour-relever-le-defi-des-objets-connectes/">Assurance : 4 clés pour relever le défi des objets connectés</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><em>Les géants du web investissent massivement dans tous les domaines des objets connectés (Google Car, thermostat Nest, Apple Watch&#8230;). Les grands industriels (constructeurs automobiles, opérateurs télécoms, énergéticiens, équipementiers) multiplient les initiatives. Des start-ups se créent quotidiennement et rivalisent de créativité. Enfin, les pouvoirs publics s’emparent du sujet et soutiennent de nouvelles expérimentations. Les assureurs doivent s’insérer dans ce mouvement s’ils ne veulent pas se voir cantonnés au mieux à un rôle d’indemnisation, sans relation avec les clients finaux. Mais ils ne pourront relever ce défi qu’à 4 conditions :</em></p>
<h2>Capitaliser sur leurs forces et leur légitimité pour proposer des offres à forte valeur ajoutée</h2>
<p><b> </b>Pour gagner leur place dans ce marché en construction et convaincre les consommateurs, les assureurs doivent proposer de nouveaux produits offrant une proposition de valeur forte et différenciante, fondés sur une tarification personnalisée, un univers de services proposant un accompagnement complet et une nouvelle expérience client. Ils y parviendront en capitalisant sur leur légitimité, en automobile et en MRH d’abord.</p>
<p>Dans le domaine plus complexe de la santé, ils doivent saisir l’opportunité offerte de jouer un rôle central dans la prévention, les parcours de soin et le maintien à domicile des personnes dépendantes. Leur légitimité sur le sujet reste cependant à construire. Elle s’imposera via de nouveaux partenariats (avec les pouvoirs publics, les professionnels de santé, des partenaires technologiques innovants) et, là encore, en capitalisant sur leurs offres existantes (programmes de prévention, téléassistance…).</p>
<h2>Gagner la confiance des consommateurs</h2>
<p>« Connecté, donc plus de vie privée&#8230; » : un exemple de réaction qui traduit le sentiment général vis à vis des objets connectés. Les inquiétudes suscitées auprès du grand public par l’usage des données personnelles collectées par les objets connectés constituent un des freins majeurs à leur développement. Comment convaincre les clients de passer outre cette méfiance, de s’équiper d’objets connectés et, surtout, de confier ces données à leur assureur ? En les rassurant sur leurs usages : les données sont utilisées dans leur intérêt (améliorer leur qualité de vie, leur proposer des tarifs plus avantageux…) et en toute sécurité (données anonymisées, chiffrées, supprimées rapidement…). Autrement dit, pour lever ces inquiétudes, les assureurs devront proposer à leurs clients un véritable contrat de confiance. Il définira clairement l’usage qui sera fait des données collectées, les modalités d’accès et le droit à leur effacement, tout en garantissant leur sécurité.</p>
<p>En définitive, quatre axes doivent être privilégiés par les assureurs dans ce domaine : construire une offre transparente, prendre en compte le respect de la vie privée dès l’élaboration de l’offre, se mettre en conformité avec la législation et notamment la loi Informatique et Libertés, et enfin sensibiliser les utilisateurs aux mesures de sécurité indispensables à la protection de leurs données.</p>
<h2>Créer ou s’inscrire dans de nouveaux écosystèmes</h2>
<p>Si l’assureur est légitime sur son marché et qu’il a une proposition de valeur forte, une intégration de la chaîne de valeur peut être légitime. Cette stratégie lui permettra de garder la maîtrise de son offre et des gains qu’elle génère. En revanche, si la légitimité de l’assureur reste à asseoir et si sa proposition de valeur repose essentiellement sur des services venant compléter ceux déjà portés par un objet connecté, alors l’assureur choisira la stratégie inverse : mettre en avant l’objet, capitaliser sur la marque de son fabriquant, quitte à moins maîtriser la chaîne de valeur.</p>
<p>Quoi qu’il en soit, sur ce marché encore en construction, les assureurs devront multiplier les initiatives et les partenariats avant que des standards technologiques et commerciaux n’émergent. Créer ou s’intégrer à de nouveaux écosystèmes, avec des acteurs différents des partenaires habituels des assureurs (start-ups innovantes, industriels, collectivités locales, spécialistes de la relation client…) et reposant sur de nouveaux types de partenariats, constituera une des clés du succès.</p>
<h2>Adapter leurs méthodes de travail et leurs systèmes d’information</h2>
<p>La révolution des objets connectés sera aussi une révolution interne aux organisations. Elle implique notamment de modifier les méthodes de création et de lancement d’offres, via des équipes plus agiles, associant experts marketing, juridiques, techniques et de la sécurité ; changer les techniques actuarielles pour prendre en compte de nouvelles données, plus nombreuses, moins structurées ; adapter les circuits de distribution pour pouvoir proposer des objets physiques et toucher de nouveaux publics ; adapter les systèmes d’information pour pouvoir collecter, stocker et traiter les données issues des objets connectés et en garantir la sécurité. Autant de challenges à relever pour ne pas se laisser distancer et prendre une place de choix sur ce marché.</p>
<p><i>Pour approfondir le sujet, </i><a href="http://www.solucom.fr/publication/assurance-comment-negocier-le-virage-des-objets-connectes/"><i>découvrez notre synthèse Solucom : « Assurance : comment négocier le virage des objets connectés ? »</i></a></p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/11/assurance-4-cles-pour-relever-le-defi-des-objets-connectes/">Assurance : 4 clés pour relever le défi des objets connectés</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Des objets et des hommes</title>
		<link>https://www.riskinsight-wavestone.com/en/2014/01/des-objets-et-des-hommes/</link>
		
		<dc:creator><![CDATA[Bertrand Carlier]]></dc:creator>
		<pubDate>Thu, 09 Jan 2014 12:32:49 +0000</pubDate>
				<category><![CDATA[Cybersecurity & Digital Trust]]></category>
		<category><![CDATA[IoT & smart products]]></category>
		<category><![CDATA[Métiers - Marketing et relation client]]></category>
		<category><![CDATA[gestion des identités]]></category>
		<category><![CDATA[IAM]]></category>
		<category><![CDATA[identity & access management]]></category>
		<category><![CDATA[IoT]]></category>
		<category><![CDATA[IoT & consumer goods]]></category>
		<category><![CDATA[système d'information]]></category>
		<guid isPermaLink="false">http://www.solucominsight.fr/?p=4840</guid>

					<description><![CDATA[<p>Nous assistons en ce moment même à un virage majeur dans la gestion des identités. Traditionnellement, les identités gérées par l’entreprise étaient des utilisateurs internes du SI de l’entreprise : employés et prestataires. Quelques centaines ou milliers d’utilisateurs dont il fallait...</p>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/01/des-objets-et-des-hommes/">Des objets et des hommes</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Nous assistons en ce moment même à un virage majeur dans la gestion des identités. Traditionnellement, les identités gérées par l’entreprise étaient des utilisateurs internes du SI de l’entreprise : employés et prestataires. Quelques centaines ou milliers d’utilisateurs dont il fallait maîtriser le cycle de vie et les comptes dans le système d’information.</p>
<p>Et puis sont venus les partenaires externes et leurs employés. Dans le cas d’usage classique, un constructeur d’avion doit pouvoir collaborer avec l’ensemble de ses sous-traitants : il faut leur permettre l’accès aux applications, gérer ou faire gérer leurs comptes et leurs droits. La fédération des identités ainsi que ses standards et protocoles ont permis de répondre à cette problématique. La gestion des identités si elle devait prévoir de nouveaux processus n’a été que faiblement impactée (la volumétrie restait d’un ordre de grandeur comparable, les utilisateurs restaient des humains maîtrisés, etc.)</p>
<p>Aujourd’hui, un premier palier doit être franchi pour gérer une volumétrie beaucoup plus forte et des utilisateurs d’un nouveau type : les clients. Des centaines de milliers voire des millions d’identités. Il faut maintenant gérer l’identité d’un client et pouvoir l’authentifier et l’autoriser sur les applications mises à sa disposition. Il faut savoir l‘authentifier simplement de son point de vue (e.g. via un réseau social) et faire le lien avec son compte traditionnel dans le CRM pour gérer la relation. Les opérateurs télécoms et les banques et leurs bases clients sont devenues le nouveau cas d’usage classique : les accès aux applications via Internet et terminaux mobiles sont dans l’air du temps.</p>
<p>Au-delà de ce changement d’échelle, les caractéristiques de ces identités de clients sont différentes des traditionnelles identités de l’entreprise : le nombre d’applications accédées et de rôles est plus faible. Par ailleurs, plus question de devoir gérer des cas particuliers, tous les clients sont logés à la même enseigne et ce pour le plus grand bénéfice des projets IAM qui vont enfin voir se réduire fortement leur complexité fonctionnelle.</p>
<p>Enfin, un deuxième palier s’annonce déjà : la gestion des identités des objets connectés. Le CES 2014 qui s’achève ces jours-ci nous en offre de multiples illustrations : brosses à dent, cocottes minutes, lits, ampoules, etc. Tous les objets du quotidien sont désormais connectés. Par ailleurs, la complexité et les facultés de ces objets nous environnant sont telles aujourd’hui que de nouvelles approches sont nécessaires.</p>
<p><span style="font-size: 13px;">Les premiers objets connectés étaient de simples capteurs : température, pression, cellules infrarouge, compteurs, etc. Généralement non connectés directement à Internet, ils émettaient de l’information dans un protocole spécifique à destination d’une passerelle qui elle avait pour rôle de centraliser les données et de les transmettre via Internet à un serveur de traitement.</span></p>
<h2>Nouveaux usages et nouveaux besoins</h2>
<p>L’identification de ces objets est alors très sommaire, allant de la simple déclaration d’adresse MAC jusqu’à l’utilisation d’une clé de chiffrement des échanges pour les installations les plus sophistiquées.</p>
<p><img loading="lazy" decoding="async" class="wp-image-4845 alignright" title="des objets et des hommes" src="http://www.solucominsight.fr/wp-content/uploads/2014/01/des-objets-et-des-hommes.png" alt="" width="343" height="241" /></p>
<p>Les objets connectés sont maintenant non seulement émetteurs de données de plus en plus complexes mais également destinataires de commandes et d’action à réaliser, de correctifs et patches de sécurité, etc.</p>
<p>Dernier cas d’usage classique à la mode : la voiture connectée informe directement le constructeur ou le concessionnaire qu’un sous-composant est en mauvaise santé ou qu’une révision est nécessaire.</p>
<p>Ces objets doivent pouvoir être joints depuis n’importe où (et ne plus être masqués par une passerelle) et par ailleurs, les capacités d’attaques cybercriminelles ayant fortement augmentés ces dernières années, la sécurité des échanges et l’authentification préalable des objets est devenu un prérequis. Et nous voilà donc avec des milliers d’objets disposant d’une identité !</p>
<div>
<h2>Challenges</h2>
<p>Nous sommes maintenant face à des millions d’identités pour ne pas dire des milliards d’identités à gérer. Et soyons honnêtes un instant : pas un seul système de gestion des identités traditionnel ne sait traiter une telle volumétrie. C’est bien une toute nouvelle façon d’approcher la problématique de l’identité qui s’impose :</p>
<ul>
<li>Le cycle de vie de ces identités inclus désormais des notions comme la revente, le prêt, le partage entre plusieurs utilisateurs, etc. Il faut donc adapter leur modèle de relations avec leur environnement : utilisateur(s), entreprise, autres objets connectés, etc.</li>
<li>La sécurité passe par des moyens d’authentification à l’état de l’art mais également par des mécanismes de mise à jour robustes. Et il ne s’agit pas simplement de bien protéger l’objet lui-même, il faut également sécuriser les services qui les pilotent. Vous ne voudriez pas que votre brosse à dents change subitement et de manière incontrôlée sa vitesse de rotation n’est-ce pas ?</li>
</ul>
<p>Les outils de gestion d’identités traditionnels vont donc devoir évoluer très rapidement pour s’adapter à ces nouvelles identités, maîtriser leur imposante volumétrie et traiter des cas d’usage très innovants.</p>
</div>
<p>Cet article <a href="https://www.riskinsight-wavestone.com/en/2014/01/des-objets-et-des-hommes/">Des objets et des hommes</a> est apparu en premier sur <a href="https://www.riskinsight-wavestone.com/en/">RiskInsight</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
