37
Your systems. Working as one. Is Your Data Secure? June 24 – RTI Sponsored Webinar Gordon Hunt, [email protected]

Is Your Data Secure

Embed Size (px)

DESCRIPTION

Is Your Data Secure? Odds are good that your data is extremely important to you. Now consider how one secures that data. Typical approaches address access, authentication, integrity, non-repudiation and confidentiality concerns at the domain and link layers, implicitly securing the data. The challenge and need is to move these security specifications to the data itself, and provide explicit security policies on each element of system-identified data. Why is this level of finesse needed? As you build out your systems, and systems of systems, how do you manage security when individually element of data, the communication links, and domain boundaries have different behaviors? With this level of complexity and risk, it's critical to have awareness at the level that matters – the data level – so you can make the right design and implementation decisions. At this webinar, learn how to achieve an assured and predictable security footprint by minimizing the leak of information or exploitation of data through unintended consequences. Secure DDS offers data-centric configuration policies for content and behaviors. Recognizing that security isn't one-size fits all, a standards-based optional plugin SDK allows developers to create custom security plugins. Connext Secure DDS is the world's first turnkey DDS security solution that conforms to the OMG specification and provides an essential security infrastructure that is data-focused for DDS and legacy systems. Watch On-Demand: http://ecast.opensystemsmedia.com/478

Citation preview

Page 1: Is Your Data Secure

Your systems. Working as one.

Is Your Data Secure?

June 24 – RTI Sponsored WebinarGordon Hunt, [email protected]

Page 2: Is Your Data Secure

Agenda

• What is Data?

• What is Security?

• How to Bring it all Together?

• Why does it Matter?

Page 3: Is Your Data Secure

What is Data?

Data-At-Rest?• Where is it• Single view of the ‘answer’• Heterogeneous views• How do I get to it• State is centralized

Data-In-Motion?• How to send/share it• Shared view of the ‘answer’• Homogeneous views• How we say it• State is distributed

Page 4: Is Your Data Secure

Example: Clinical Decision Support Systems

Workstations, Storage, Historical

HL7/EMR Gateway, Enterprise, 3rd Party

Room

Devices

Care Area

Administration

Page 5: Is Your Data Secure

Example: Where and What is the Data?

Workstations, Storage, Historical

HL7/EMR Gateway, Enterprise, 3rd Party

Room

Care Area

Administration

Location: Room 247B

Data: HomerSimpson

Page 6: Is Your Data Secure

Example: Blue Force Tracker Systems

6

TSG TSG

TSG

JNNKu-Band

ARMYBFT1

BFT1L-Band

VSAT

JCRNOC

L-Band Ground Stations

EPLRSEPLRS

EPLRS EPLRS

ARMY EPLRS

EPLRS EPLRS

USMC

GCSS-J – GCSS-A - DDS

Rea

chb

ack

TSG

TSG

TSG

DISAVPN

JBCPNOC

Page 7: Is Your Data Secure

Messages and Routing versus Actionable Data

• Message-Centric NOC Architecture– Point to Point– State is Implicit– Intermediate messages

are not actionable

• Data-Centric NOC Architecture– Observable databus– State is Explicit– Intermediate state is

actionable

ComtechSide A

ComtechSide B

CUI Network Gateway Satcom 1

CUI Network Gateway Satcom 2

SE

C

Re

gio

n

Se

rve

r 3

SE

C

NO

C

Cn

tlr

SE

CM

yS

QL

Se

rve

r

SE

C

NT

P

SE

C

CD

I

CU

I R

eg

ion

S

erv

er

1

CU

I N

OC

C

ntr

lr

CU

IM

yS

QL

Se

rve

r

CU

I C

DI

CU

I N

DS

CU

I N

AS

Network Switch Network Switch

NIP

R

NT

P

NIP

R

CD

I

SE

CC

2R

D

DS

CUI NOC Secret NOC

Rad

iant

Merc

ury

CUI ASA 5510

ComtechLBAND

NIPRNET

SEC Router

SEC Isolation Router

CUI Isolation Router

CUI Isolation Router

BF

T1

NE

H

Cisco 2924XL

SEC Legacy Gateway

SEC JCR Gateway

SECSatcom Gateway

SIPRNET

SE

C

ND

SS

EC

N

AS

Cisco 2924XL

CU

I A

ux

Tra

ns

CU

I N

TP

SE

C

Au

x

Tra

ns

CU

I M

TS

-E

S

CU

I R

eg

ion

S

erv

er

2

SE

C

Re

gio

n

Se

rve

r 4

1

2

3 4

5 6 7

8

9

10

11

12

Dell PowerEdge 815

RTI DDS

SEC Enclave

RadiantMercury

CP Conduit G

SIPRNet

CP Conduit H

Cross Domain Conduit J

SA Process

C2 Process

SDSA Process

KGV-72 x 4CUI

SA Process

C2 Process

SDSA Process

SA Process

C2 Process

SDSA Process

JCR NOC

NOC SA Display Conduit K

SA Process

C2 Process

SDSA Process

Type 1 Conduit I

SA Process

C2 Process

SDSA Process

SIPRNet

PersistenceServer

SDSA/C2 Routing

ConfigurationManagement

Logging

Health Monitoring

DataStore

NOC Addressed C2 Display

ASCOPE ASCOPEDatastore

Page 8: Is Your Data Secure

Results of Making Data Actionable

• BeforeI. Custom implementation for

the ArmyII. Centralized, monolithic and

tightly coupledIII. Under development for 8 yearsIV. 500,000 SLoCV. Required 21 quad-core serversVI. Supported 10,000 sustained

tracksVII. Suffered reliability and uptime

challenges

• AfterI. Standards based, COTS and

Open ArchitectureII. De-centralized, modular and de-

coupledIII. PoC completed in 1 week, full

system in 1 yearIV. 50,000 SLoCV. Only requires a single core

systemVI. Supports 500,000 sustained

tracksVII. Inherently supports full

redundancy

8

Page 9: Is Your Data Secure

Where is the Data?

Point-to-point, sockets, RPC, RMIData and its state is in the applicationsEach application maintains its view

Centralized, DB, ESBsData and its state is in the DatabaseManaged interactions with data and state

Decentralized, Data CentricData and its state is in the busStateless clients/servicesData needs explicit properties to manage its behavior

BrokerESB

DBMS

Page 10: Is Your Data Secure

Where is the Data?Centralized Analytics and Control

• Limits scalability and performance– Capacity of individual links and switch ports– CPU and resource limits on servers

• Diminished robustness– Tied to server maintenance and failures– Single point of “vulnerability”

• Lessens capabilities and utility– Single centralized “brain”– No autonomy or Intelligence at the edge.

• Brittle security. All intelligence is “in a box”

Centralized ESB, Database,or Message Broker

Page 11: Is Your Data Secure

Where is the Data?Distributed Analytics & Control

• Analyze orders of magnitude more data• Lower latency control for faster response• Highly resilient, no single point of failure• Fine-grained access control and security• More capable and flexible Intelligence at the edge

Decentralized, fully Distributed DDS DataBus

Page 12: Is Your Data Secure

What is Security?• Authentication:

– The bank knows who you are; you must show ID.

• Access Control: – The bank only lets those on an access list into your box.

• Confidentiality: – You are alone in the room Nobody can see the contents of the box.

• Integrity: – The box is sealed. If anybody touches it you will know.

• Non repudiation: – You sign when you come in and out so you can’t claim that you

weren’t there.

• Availability: – The bank is always open.

Page 13: Is Your Data Secure

How to Implement Security?Security Related Infrastructure

• Intrusion Detection and Actions• Malware Detection and Prevention• Secure Boot & Trusted Platforms• Secure Comms and Data Links• Key and Identity Mgmt.• Cryptologic Functions• …

Very Domain specific – may need all of these

e.g.

Page 14: Is Your Data Secure

Where is Security?Multiple Security Boundaries• Boundary Security

• Transport-Level – Network (layer 3) security– Session (layer 4/5) security– Endpoint-based access

• Fine-grained Data-Centric Security– Queue/table-based access– Decentralized or centralized?Ultimately you need to implement all of them

Page 15: Is Your Data Secure

RPC over DDS

2014DDSSecurity

2014Web-EnabledDDS

2013

15

DDSImplementation

App

DDSImplementation

App

DDSImplementation

DDS Spec

2004

DDSInteroperablity

2006

UML DDS Profile

2008

DDS forLw CCM

2009

DDS X-Types

2010 2012

DDS-STD-C++DDS-JAVA5

How to Bring it all Together?The Interoperability Standard:

App

Network / TCP / UDP / IP / SharedMem / …

Page 16: Is Your Data Secure

Data Identityin the Global Data Space• Domain:

– The world you are talking about

• Topic: – A group of similar objects

• Similar structure (“type”)• Similar way they change over time (“Quality of Service”)

• Instance: – An individual object in the topic group of similar objects

• Like the “key” fields in a database table

• Domain Participant: – A connection to the Domain in order to source/observe observations

• Data Writer: – The source of observations about a set of data objects (Topic)

• Data Reader:– Observer of a set of data-objects

• Sample:– An update of an instance

Domain

Topic “A”

Topic “B”Logical

Physical

Page 17: Is Your Data Secure

Data Behaviorin the Global Data Space

• Aside from the actual data to be delivered, users often need to specify HOW to send it …

… reliably (or “send and forget”)… how much data (all data , last 5 samples, every 2 secs)… how long before data is regarded as ‘stale’ and is discarded… how many publishers of the same data is allowed… how to ‘failover’ if an existing publisher stops sending data… how to detect “dead” applications… …

• These options are controlled by formally-defined Quality of Service (QoS)

Page 18: Is Your Data Secure

Deadline

Reliability

HistoryLiveliness

Time Based Filter

Content Filtering

Durability

Ownership

Partition

Presentation

LifespanDestination Order

Resource Limits

Latency Budget

Flow Control

User, Group,

Topic Data

Batching

Transports

Multi-Channel

Async Publisher

DDS Quality of Service

Page 19: Is Your Data Secure

Deadline

Reliability(optional)

HistoryLiveliness

Time Based Filter

Content Filtering

Durability

Ownership

Partition

Presentation

LifespanDestination Order

Resource Limits

Latency Budget

Flow Control

User, Group,

Topic Data

Batching(optional)

Transports

Multi-Channel

Async Publisher

Use Case: Streaming Data

Page 20: Is Your Data Secure

Deadline

Reliability

HistoryLiveliness

Time Based Filter

Content Filtering

Durability

Ownership

Partition

Presentation

LifespanDestination Order

Resource Limits

Latency Budget

Flow Control

User, Group,

Topic Data

Batching

Transports

Multi-Channel

Async Publisher

Use Case: Alarms / Events

Page 21: Is Your Data Secure

Deadline

Reliability

History

Liveliness

Time Based Filter

Content Filtering

Durability

Ownership

Partition

Presentation

Lifespan

Destination Order

Resource Limits

Latency Budget

Flow Control

User, Group,

Topic Data

Batching

Transports

Multi-Channel

Async Publisher

Use Case: Large Data

Page 22: Is Your Data Secure

Deadline

Reliability

HistoryLiveliness

Time Based Filter

Content Filtering

Durability

Ownership

Partition

Presentation

LifespanDestination Order

Resource Limits

Latency Budget

Flow Control

User, Group,

Topic Data

Batching

Transports

Multi-Channel

Async Publisher

Use Case: Last Value Cache

Page 23: Is Your Data Secure

Data Security in the Global Data Space

• Access control per Topic– And all that that implies

• Read versus-write permissions– But enable fully distributed enforcement

• Source-specific permissions and tagging– Fine-grained specificity of policies

TopicsDomain

Topic “B” Topic “A”

Topic “C”

Page 24: Is Your Data Secure

Data Securityin the Global Data Space• Authentication:

– The Domain knows who you are, you must show ID

• Access Control: – Only those on the Topics’ access list are allowed (r/w)

• Confidentiality: – Data payload and meta-data individually encrypted.

• Integrity: – Data samples include destination specific signatures/MACs.

• Non repudiation: – Specified behavior and associated quality of service for

acknowledgements

• Availability: – DDS managed and specified behavior, rich fault/failure management

Page 25: Is Your Data Secure

Data SecurityHow is it Done?

• Security Model– What to Protect

• Security Plugin APIs– How/where to protect– Interchangeability of the plugins

• DDS RTPS Wire Protocol– Data encapsulation and

discovery interoperability

• Default Builtin Plugins– Out-of-box implementation– Interoperable implementations

OMG DDS Security Specification

RTI Connext™ DDS Implementation

Page 26: Is Your Data Secure

Data SecurityThreats in the Global Data Space1. Unauthorized subscription2. Unauthorized publication3. Tampering and replay 4. Unauthorized access to data by infrastructure services

Alice: Allowed to publish topic ‘T’Bob: Allowed to subscribe to topic ‘T’Eve: Non-authorized eavesdropper Trudy: IntruderMallory: Malicious insiderTrent: Trusted infrastructure service

AliceBob

EveTrudy

TrentMallory

Page 27: Is Your Data Secure

Data SecurityUsing Secure DDS (per OMG spec)• Start with a Domain Configuration

– Signed document that sets policies for the Domain

• Specifies– What Topics are discovered using

Secure Discovery– Encrypt or Sign for Secure Discovery– What Topics have controlled access– Encrypt or Sign for each secure Topic

• User data and payload• Metadata and routing information

– What to do with unauthenticated access requests

Page 28: Is Your Data Secure

Data SecurityUsing Secure DDS per OMG specification• For each Participant

– Its an identified point of access– Enables fully distributed

authentication– Enables local access enforcement

• Specifies– What Domain IDs it can join– What Topics it can read/write– What Topics it can relay– What Partitions it can join– What Tags are associated with the

Readers and Writers

Page 29: Is Your Data Secure

What’s Happening Inside DDS?

Create Domain

Participant Authenticate

DP?

Create Endpoints

Discover remote

Endpoints

Send/Receive data

Discover remote DP

AuthenticateDP?

Yes

Domain Participant Create Fails

No

Access OK?Endpoint

Create FailsNo

AuthenticateRemote DP?

Ignore Remote DP

No

Yes

Access OK?Ignore remote

endpoint

Message security

DP = Domain ParticipantEndpoint = Reader / Writer

No

Page 30: Is Your Data Secure

What’s Happening on the Wire?

• RTPS Protocol Supports– Rigorous identity, source and

destination indication – Sequence numbers for state

recreation– Content awareness for

efficient delivery– Timestamps for data and state

integrity – Efficient use of transports– Proxy & routing support– Reliability & synchronization

handshaking

…encode_serialized_data()encode_datawriter_submessage()encode_datareader_submessage()encode_rtps_message()…

Page 31: Is Your Data Secure

Why does it Matter?Connext DDS Secure Benefits• Decentralized

– High performance– No single point of failure

• Runs over any transport– Including low bandwidth, unreliable– Multicast for scalability, low latency

• Select encryption or message authentication

– Only encrypt private data– Up to 100x faster

• Customizable plugin architecture• Data Distribution Service (DDS) compliant• Works with unmodified existing apps

Connext DDSlibrary

Authentication

Access Control

Encryption

Data Tagging

Logging

Application

Any Transport(e.g., TCP, UDP, multicast,

shared memory, )

Page 32: Is Your Data Secure

Control Station

DNP3 MasterDevice

Transmission Substation

DNP3 Slave

Device

Why does it Matter?RTI and PNNL Grid Security Retrofit

RTI Routing Service

ComProcessor

RTI Routing Service

Gateway

DNP3 Slave

Device

DNP3 overRS232/485

DNP3 overEthernet DNP3 over DDS

RTI Routing Service

Gateway

DDSLAN

DDSLAN

RTI Routing Service

ComProcessor

IPRouter

IPRouter

DDS over WAN

DDS

over UDP/WAN

Effective DNP3 connection

Details at http://blogs.rti.com

Page 33: Is Your Data Secure

Control Station

DNP3 MasterDevice

Transmission Substation

DNP3 Slave

Device

Why does it Matter?RTI and PNNL Grid Security Retrofit

DNP3 Slave

Device

DNP3 overRS232/485

DNP3 overEthernet DNP3 over DDS

RTI Routing Service

Gateway

IPRouter

IPRouter

DDS over WAN

Secure DDS

over UDP

Effective DNP3 connection

Details at http://blogs.rti.com

RTI Routing Service

Gateway

RTI Routing Service

ComProcessor

RTI Routing Service

Gateway

RTI Routing Service

ComProcessor

Page 34: Is Your Data Secure

Control Station

DNP3 MasterDevice

Transmission Substation

DNP3 Slave

Device

Why does it Matter?RTI and PNNL Grid Security Retrofit

DNP3 Slave

Device

DNP3 overRS232/485

DNP3 overEthernet DNP3 over DDS

RTI Routing Service

Gateway

IPRouter

IPRouter

DDS over WAN

Secure DDS

over UDP

Attack Detector

Display

ScadaConverter

AnomalyDetector

Effective DNP3 connection

Details at http://blogs.rti.com

RTI Routing Service

Gateway

RTI Routing Service

ComProcessor

RTI Routing Service

Gateway

RTI Routing Service

ComProcessor

Page 35: Is Your Data Secure

Why does it Matter?

Secure, flexible, scalable, and performant system integration.

• Decoupled access to data via the Global Data Space– This does not mean loss of access control to the information and data– It means that the Data Space must have an associated security model

• DDS can use standard PKI and cryptographic techniques to enforce the security policies

• DDS can use domain-specific system technologies and capabilities to address security

The key is to use a data-centric security model

Page 36: Is Your Data Secure

DDS Secure

Connext DDS Professional

RTI Connext™: A Next Generation Infrastructure

DDS-RTPS Wire Interoperability Protocol

DDS & JMS Libraries

Routing Service

Database Integration

Connext DDS Micro

Connext DDS Cert

Administration

Monitoring

Microsoft Excel

Recording

Replay

Wireshark

Persistence

Logging

Prototyper

General PurposeReal-Time Apps

Remote Apps

Disparate Apps

Adapter

RDBMS Small Footprint Apps

Safety critical Applications

DDS-RTPS Wire Interoperability Protocol

Page 37: Is Your Data Secure

Next Steps & Questions

• Evaluation Available Today• Contact

[email protected] Or your local Account Manager

www.rti.com

community.rti.com

www.facebook.com/RTIsoftware

www.slideshare.net/RealTimeInnovations

www.twitter.com/RealTimeInnov

blogs.rti.com

www.youtube.com/realtimeinnovations

www.omg.org

dds.omg.org