23
Protecting the Connected Car Martin Borrett IBM Distinguished Engineer CTO IBM Security Europe

Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

Protecting the Connected Car

Martin Borrett IBM Distinguished Engineer

CTO IBM Security Europe

Page 2: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

2 IBM Security

Paradigm shift in crime

Page 3: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

3 IBM Security

Cyber criminals use BUSINESS INTELLIGENCE

Page 4: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

4 IBM Security

Automobile Evolution

For more than 100 years the automotive industry has created competitive advantage

mainly through engineering excellence.

4

Engineering (supply driven) Digital (demand driven)

Page 5: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

5 IBM Security

A Complete Digital In-Vehicle Experience

Customers expect the same digital

experience they are familiar with from

their smartphones.

Vehicles and smartphones are

converging and the integration of both

worlds increases the complexity and

importance of a strong security posture.

Page 6: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

6 IBM Security

Cyber attacks are impacting the automotive industry

How To Hack

Your Car

Gentlemen, Start

Hacking Your

Engines

DARPA Grand

Challenge

DRIVING; Altering

Your Engine With

New Chip

RFID Chips in Car

Keys and Gas Pump

DARPA Grand

Challenge

Linux Bluetooth

hackers hijack car

audio

Hacking the Hybrid

Vehicle

Hackers can take

over car navigation

system

DARPA Urban

Challenge

Security and Privacy

Vulnerabilities of

In-Car Wireless Networks

Experimental Security

Analysis of a Modern

Automobile

Hacker disables more

than 100 cars remotely

Google Self-Driving

Car

Can Your Car be

Hacked?

Comprehensive

Analyses of

Automotive Attack

Letter to GM

Digital Carjackers Show Off

Attacks

Jury Finds Toyota Liable in

Fatal Wreck

Adventures in Automotive

Networks

Your Vehicle Manipulated

Remotely

Hack Mini Cooper

A Survey of Remote Automotive Attack

Surfaces

Auto Alliance Initiates New

CyberSecurity Forum

Most Hackable Cars

How to Hack a Car

The Robot Car May Just Be

Programmed to Hit You

Open Garages

Legislation to Protect

Drivers Security and

Privacy Vulnerabilities

Markey Report Security

and Privacy

Hackers Can Take

Control of Cars 3,000

Miles Away

Hackers remotely

kill a Jeep on the

highway – with me

in it – Wired

Page 7: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

7 IBM Security

Threat to connected Vehicles

Cyber threat for connected vehicles just started. Number of attacks and intensity will

dramatically increase over the next years, comparable to other IT environment.

• Comparable to business IT

connected vehicles are

threatened by cybercrime

• Other than standard IT only few

researchers and hackers are

currently interested in vehicles

(see chart)

• Adoption rate of higher

sophisticated attackers is

predicted short term

Adversary

National

Monetary

Espionage

Revenge

Curiosity Researchers…

Insiders…

Organized Crime...

Competitors…

Nation-state Actors…

Motive

Page 8: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

8 IBM Security

IT Security Issue Root Causes

Vehicle innovation was driven by engineering for more than 100 years. Today more than

80% of innovation is driven by IT. Vehicles became data centers on wheels.

• More than 100 ECUs (Electronic Control Units) from different suppliers

operating together

• Up to 100 million lines of code incl. related vulnerabilities

• Multiple wireless network interfaces used in parallel for communication

• Standard IT mechanisms for update or patching not available

• Vehicles lack of security mechanisms

• Standard IT technology (smartphone, USB-device…)

linked or integrated into vehicle

Page 9: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

9 IBM Security

Impact of Vehicle Trends

Digitization is the major driver for future innovations with significant impact

on security requirements.

Connected Vehicles become a central part of the digital life

Car2X communication will lead the path from driving assistance

to autonomous driving

Software updates will become generic in the lifecycle of the vehicle

Protection of data privacy needs to be compliant with local law

In vehicle data is valuable for car makers and require

special protection against espionage

The automotive industry is in a transition phase to

become digital companies

Page 10: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

10 IBM Security

• Security via obfuscation is more threat than solution for entire

vehicle life-cycle

• Security by design, vulnerability management

and patching are required

• Standardized Security elements need to be added to vehicles

and backend system

• Vehicles do require trusted environment as basis for security

elements added

• Compliance becomes more important for future vehicle

innovations, providing evidence is mandatory

• Security is never 100%. Intention must be to mitigate risk to

become “affordable”

Connected Vehicle Security Principles

The fundamental security principles for the information system have

to be applied to vehicles.

OEM - Backend

Connected Vehicle

Page 11: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

11 IBM Security

• Trusted Identity of all involved entities

• Secure Data Storage within vehicle

• Access Control and Management

• Communication Encryption

• Intrusion Detection and Prevention System

• Security Intelligence

• Security Operation Center

Connected Vehicle Security Elements

IBM / G&D security architecture consists of security levels of protection, working in an

integrated fashion, to achieve end to end vehicle security.

Page 12: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

12 IBM Security

Connected Vehicle Security Elements

First security level deals with identity. Each entity involved in interaction needs

to be able to identify itself and prove identity.

• First security level, in vehicle and backend system

• Identify itself and prove own identity

• Based on key management mechanisms

• Important for compliance reasons too

• Entities to identify itself up to end to end vehicle security

architecture, potentially vehicle, ECU, backend system, driver,

diagnostic system, mechanic, 3rd party etc.

Page 13: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

13 IBM Security

Connected Vehicle Security Elements

Second security level deals with data. Defined software, security keys, vehicle or driver

data needs to be stored and processed securely.

• Second security level, in vehicle

• Trusted anchor to securely operate from

• Stores security software and keys, able to secure vehicle or

driver data too

• Extension might be future vehicle operation log

• Prerequisite is to clearly identify data that requires

to be secured

Page 14: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

14 IBM Security

Connected Vehicle Security Elements

Third security level deals with access rights. Closely linked to the identity,

not every entity is allowed to request, operate or change all.

• Third security level, in vehicle and backend

• Links identity to permissions

• Not every identity will have similar permissions

• Important for compliance reasons too

• Prerequisite is to clearly identify vehicle functions that require

dedicated permissions; these vehicle functions will be

monitored even more closely by further security levels

Page 15: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

15 IBM Security

Connected Vehicle Security Elements

Fourth security level deals with encrypted communication. According data model

defined for vehicle part of communication need to be encrypted.

• Fourth security level

• Securely links vehicle to ecosystem

• At least part of communication needs to be encrypted;

encryption mechanism should be applicable to different wired

and wireless connections

• Prerequisite is analog secure data storage to classify and

identify data to be encrypted

Page 16: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

16 IBM Security

Connected Vehicle Security Elements

Fifth security level aims to detect and react on anomalies within vehicle.

An Intrusion Detection and Prevention System fulfils this task.

• Fifth security level

• Rule based Intrusion Detection and Prevention (IDPS)

System watching out for anomalies

• Rules can either only monitor communication on dedicated

networks and alert in case of violation, or even prevent

dedicated activities

• Prerequisite is to have the IPDS system getting access to

required vehicle networks

Page 17: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

17 IBM Security

Connected Vehicle Security Elements

Sixth security level deals with security analytics and intelligence. Vehicle

status information received in backend can be correlated.

• Sixth security level

• Content based security analytics function that is able to

supervise vehicles security status

• Supervision of vehicle status and behavior is key element to look

for the unknown; at no time all vulnerabilities and related attacks

can be foreseen during design and production of a vehicle

• Prerequisite is to collect vehicle status and communication data

according continuously improved use cases

Page 18: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

18 IBM Security

Connected Vehicle Security Elements

Seventh and final security level operates, continuously adopts and improves Security,

the living part behind all Connected Vehicle Security.

• Seventh security level

• Connected Vehicle Security Operation

• Manages and continuously improves vehicle security

according to business strategy

• Analyses and reacts on anomalies in cooperation with

functional departments

• Defines and adopts rules running in the vehicle, optimizes

security analytics use cases

Page 19: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

19 IBM Security

The architecture is designed to support Automotive OEMs and Tier-1s, from end-point (in-vehicle) devices to backend infrastructure

Access Control

OEM Backend

Encrypted

Communication

Trusted Identity

Secure Data Storage

Intrusion Detection

and Prevention

Identity

Management

Access Management

Security Intelligence

Security Operation

Center

Connected Vehicle

Page 20: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

20 IBM Security

IBM IoT for Automotive Platform

Page 21: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

21 IBM Security

Security work packages to start with might be

• Reach: end to end view (Backend, Connection, Vehicle)

- starting point might be internet connectivity

• Levels: infrastructure, data, application (functionality of vehicle)

- work items might be harden infrastructure, create/apply data model…

• Elements: identity and access management, communication encryption,

secure storage, IDPS, analytics, operation

• Activity: Monitoring of end to end infrastructure and communication, triage

and/or response in case of anomalies

- proposal is to start with monitoring, use collected data for hardening and

continuously improving monitoring use cases

How to get started

Depending on already existing IT security considerations within recommendation is to

define end to end IT security reference architecture (including variances) for future

connected vehicles incl. backend.

Page 22: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

22 IBM Security

IBM Institute for Business Value PoV Paper

http://www-935.ibm.com/services/us/gbs/thoughtleadership/automotivesecurity/

Page 23: Protecting the Connected Car - IoT Security Foundation...Letter to GM Digital Carjackers Show Off Attacks Jury Finds Toyota Liable in ... Depending on already existing IT security

ibm.com/security

securityintelligence.com

xforce.ibmcloud.com

@ibmsecurity

youtube/user/ibmsecuritysolutions

© Copyright IBM Corporation 2016. All rights reserved. The information contained in these materials is provided for informational purposes only, and is provided AS IS without warranty of any kind, express

or implied. IBM shall not be responsible for any damages arising out of the use of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of,

creating any warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement governing the use of IBM software. References in these

materials to IBM products, programs, or services do not imply that they will be available in all countries in which IBM operates. Product release dates and / or capabilities referenced in these materials may

change at any time at IBM’s sole discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any way. IBM, the IBM logo, and

other IBM products and services are trademarks of the International Business Machines Corporation, in the United States, other countries or both. Other company, product, or service names may be trademarks

or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response to improper access from within and outside your enterprise.

Improper access can result in information being altered, destroyed, misappropriated or misused or can result in damage to or misuse of your systems, including for use in attacks on others. No IT system or

product should be considered completely secure and no single product, service or security measure can be completely effective in preventing improper use or access. IBM systems, products and services are

designed to be part of a lawful, comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems, products or services to be most effective.

IBM DOES NOT WARRANT THAT ANYSYSTEMS, PRODUCTS OR SERVICES ARE IMMUNE FROM, OR WILL MAKE YOUR ENTERPRISE IMMUNE FROM, THE MALICIOUS OR ILLEGAL CONDUCT

OF ANY PARTY.

FOLLOW US ON:

THANK YOU