close

Endpoint Security Wellington

An article by Dr Theodoros Stergiou, CEng, CPMM,  Security Solutions Product Manager, Intracom Telecom

In Intracom Telecom, we have been interested in M2M and IoT security and particularly in providing solutions ensuring the protection of M2M infrastructures end-to-end. This is a post addressing some aspects of M2M security and the analysis followed depicting our position is therefore not meant to be exhaustive.

Introduction

Machine to machine (or M2M) is a broad term referring to the underlying technologies, platforms and protocols that allow wireless and wired systems to communicate with each other. According to Gartner, “Machine-to-machine (M2M) communications are used for automated data transmission and measurement between mechanical or electronic devices.”

An integral part of Internet of Things (IoT), M2M finds a wide range of applications across diverse industries, including but not limited to healthcare, automotive, smart cities, smart grids, logistics and traffic management. It is a concept that allows the automated transmission of data, measurement and control of devices, whilst going beyond the one-to-one connectivity paradigm. Essentially, M2M is considered as an enhancement of telemetry combined with wireless sensors, the Internet and personal computers and appliances.

The importance of M2M is such that ITU and the European Telecommunications Standards Institute (ETSI) have formed working groups to address all aspects of this concept. ETSI in particular has issued several standards addressing service requirements, APIs, use cases, management objects and information security threats.

Conceptually, the M2M architecture is comprised of the M2M device (or sensor), the radio, wireless or wired network, the Internet, access router and M2M backend system. As is apparent, M2M is based on existing architectures and technologies that realize the full potential of IoT and ensure interoperability. Finally one importance aspect to note is that IPv6 adoption is one of the most essential factors that will ensure the proliferation of M2M and its use in a widespread manner.

However, as is also the case with current technologies, information security plays a significant role for M2M communications, given their use in supporting critical infrastructure, often at the national level. M2M risks can be summarized as follows (list is not exhaustive):

  • Lack of user authentication
  • Weak device security with Internet access
  • Modem security
  • Unprotected wireless links
  • Lack of privacy preservation
  • Fraud
  • Critical infrastructure exposure
  • Lack of cloud security
  • Application backend server security

Information Security Controls

Intracom Telecom has quickly recognized the benefits of M2M to organizations and governmental agencies, as well as the issues that must be addressed in order to ensure a secure and safe M2M environment.

In this extent, Intracom Telecom’s solutions span across the whole ladder of the M2M environment as is depicted in the following figure.

More specifically, Intracom Telecom can assist organizations in securely realizing the M2M potential though the following portfolio.

M2M device/sensor security solutions

  • Device/sensor tamper resistance, encryption mechanisms, device authentication
  • Field operations and mobile workforce security
  • Field device security

Particularly for M2M device/sensor security, Intracom Telecom is actively monitoring the ETSI and oneM2M consortium to recommend and enhance standards surrounding their specification, as these devices are subjects to threats that cannot be remediated by using common network security controls.

Network security solutions

  • Wireless and wired networks security
  • System security
  • D / DoS protection
  • Security management and monitoring
  • Operations management
  • Security operations, proactive response
  • Security incident handling

Data security solutions

  • Data encryption
  • Leakage prevention
  • Privacy preservation
  • Enforcement of applicable legislation

Application security solutions

  • Application security
  • Web and email security
  • Web application firewall
  • Fraud prevention

User security solutions

  • Administrative access management
  • Network admission control
  • End user management
  • BYOD policy and enterprise mobility management
  • Recording and monitoring
  • Endpoint protection suite

Business security solutions

  • ISO 27001 certification
  • Corporate risk management
  • Business security consulting

Cloud Security solutions

Backend M2M systems can be housed in the cloud, further benefiting organizations in deploying their required infrastructure. Intracom Telecom, a global telecommunication systems vendor and a system integrator, with 35 years experience and strong presence in the EMEA region, is the first system integrator to have designed, built and operate an ISO 27001:2013 certified Public Cloud in the South-East Europe. Intracom Telecom’s public cloud can be used to securely house the necessary M2M communications components, whilst assuring privacy preservation, availability, service robustness and business expansion.

Use Case – Combating M2M real-world threats

In recent years, a number of successful attacks against M2M infrastructures have taken place. Examples include SIMs stolen from South Africa’s traffic lights, fraud in Spain’s smart metering system, exposure of Dutch water pumps, and so on (Source: Gemalto, 3rd ETSI Security workshop, France, 2013).

In reference to the Spain’s smart metering fraud case, the following approach is proposed in order to ascertain that critical data are not tampered with and that confidentiality of transmitted information is preserved. These controls can be applied by a system integrator, such as Intracom Telecom, which has the knowledge of the M2M system end-to-end:

  • Governance framework and focused security strategy that will drive the implementation of the necessary security program, including the relevant policies, standards, procedures and security architecture.
  • Security controls protecting the M2M smart metering devices, such as tamper resistant measures, power outage sensors, SIM and CPU circumvention sensors, device authentication and access controls, device encryption (modem, SIM, etc), connectivity redundancy and so on.
  • Protection measures covering data in transit, including end-to-end VPNs, data integrity, data validation, non-repudiation, etc.
  • Controls ascertaining that the backend M2M servers are secured, such as hosting the relevant infrastructure in a secure cloud, datacentre security, administrative access management, next generation firewalls, web application protection, security monitoring and operations, integrity checks, data leakage prevention, mobile & endpoint security, application encryption, network segmentation and so on.
  • Validation of protocol specifications to ascertain that any possible problems in the communication of the M2M system elements is quickly identified and remediated at the appropriate level.

Summary

M2M and IoT are important areas of communication, with business growing every day. However, these architectures merit appropriate information security controls to ensure that businesses realize the full potential of M2M communications without endangering their operations as well as customer data. Intracom Telecom, realizing the great potential of M2M is able to assist organizations in securely fulfilling their targets and achieve growth.


endpoint security disable     endpoint security business

TAGS

CATEGORIES