Architecting a Secure IoT Solution

 

The goal of every IoT solution is to create an infrastructure that will enable ease of use, flexibility, automated patching, and security. Security should be built into the fabric of each layer of your design.

Ask Yourself

To begin to think in terms of Secure IoT Solution, identify the ansfers to the following question with respect to the solution you are building:

  • Depending on Device Type:
    • What types of devices are you deploying at the edge?
      • Structural automation devices, such as cameras, sprinkler systems, or thermostats.
      • Industrial IoT devices, such as sensors to detect oil spills, mechanical failures, temperature readings, or GPS tracking.
      • Medical devices or wearable health monitoring devices.
      • Tags used to monitor and track items used for patient care or vials of medicine in a freezer.
    • How to update firmware and software?

    • How will you list the device physical locations and how you will track and update existing and newly deployed devices?

    • How will you understand and track how the devices behave, and How will you audit their behavior to identify when they deviate from their normal behavioral patterns?
  • Depending upon the Security issue your device can face:
    • What type of Security incidents can happen to you devices?

    • Do you need to care about Physical security breach of the device?

    • How will your soultion tackle situation in which bad actors have got access to internal system of your device?

    • What can go wrong in your overall solution if the security credentials are exposed? Do you have plan to revoke access?

  • Dealing with a Compromised Device:
    • Can a bad actor access your environment from within if the a device is compromised?

    • What will you do when a device is compromised?

    • Is it a device you have physical access to, or is it a remote sensor on a shipping container?

    • How will you know when the device starts to behave in an unexpected manner?

    • Will you have an analytics mechanism to detect and notify of unexpected behaviors?

    • Do you have a quarantine process to take the device offline?

  • Dealing with Business Impact of the Security Breach:
    • What is the customer and business impact if you experience a security breach?

    • How many customers would be impacted by each type of breach?

    • To what degree would the customers be impacted based on the device type?
      • A personal fitness device that stops tracking a person’s steps is a nuisance.
      • A hacked smart house door-lock, where the owner can’t get inside at 2:00 AM, creates a security risk.
      • A person with diabetes who has their insulin pump compromised and their Personal Health Information (PHI) exposed to the internet could mean that the company is breaking both compliance, federal law, or both.
    • What can be done to reduce recovery time?

Designing a Secure Solution

  • AWS Well-Architected Framework helps identify the pros and cons of decisions while building systems on AWS. With this, you can incorporate architectural best practices for designing and operating reliable, secure, efficient, and cost-saving systems in the cloud. It provides a way for you to consistently measure your architectures against best practices and identify areas for improvement.
  • The framework is based on five pillars: Operational excellence, Security, Reliability, Performance efficiency, and Cost optimization.
  • When architecting technology solutions, informed trade-offs are made between the pillars based upon your business context.
  • When a breach occurs, a well-designed architecture must have a well-tested response plan and a team that is prepared to act.
  • Reference:

Layers of IoT Solution

  • Edge Layer:
    • Consists of the physical devices, the embedded operating systems, and the device firmware.
  • Provisioning Layer:
    • Consists of the Public Key Infrastructure (PKI) used to create unique identities for devices
    • The process by which firmware is first installed on devices.
    • The application workflow that provides configuration data to the device.
  • Communication Layer:
    • Handles the connectivity, message routing among and between devices and the Cloud.
    • The communication layer lets you establish how IoT messages are sent and received by devices, and how devices represent and store their physical state in the Cloud.
  • Data Ingestion Layer:
    • Collecting and Aggregating sensor data from devices while decoupling the flow of data from the communication between devices.
  • Analytics Layer:
    • Processes and performs analytics on IoT data.
  • Application Layer:
    • Ease with which data generated by IoT devices can be consumed by other relevant cloud native capabilities/applications.
    • The Device Management applications is to create scalable ways to operate your devices after they are deployed in the field.