Slide 1

Slide 1 text

Internet of Sieves: Data Loss Prevention in the Age of IoT Zach Lanier, Principal Research Consultant Atredis Partners LiveWorx 2017 Kelly Lum Flatiron Health

Slide 2

Slide 2 text

First - RIP Sir Roger Moore (1927 - 2017)

Slide 3

Slide 3 text

About Us Zach Lanier ● Security Staff Engineer at Flatiron Health ● Heads the data security program, working across the organization to architect secure systems and business practices ● Professor of Application Security at NYU Tandon School of Engineering ● Formerly: reverse engineering, pentesting, code auditing in government and finance ● Built out the Tumblr “blogs over HTTPS” initiative ● Principal Research Consultant at Atredis Partners ● Conducts highly technical security assessment, research, reverse engineering, and attack simulation engagements ● Old-hat network, web, app, mobile, embedded, IoT, etc. security research / pentester type ● Co-founder, BuildItSecure.ly (a [sadly now defunct] IoT security research collaboration) ● Co-author, “Android Hacker’s Handbook” (Wiley, April 2014) Kelly Lum

Slide 4

Slide 4 text

Agenda

Slide 5

Slide 5 text

Agenda ● DLP Overview ● Attack Surfaces ● Issues ● Solutions and Recommendations ● Conclusions ● Q&A

Slide 6

Slide 6 text

No content

Slide 7

Slide 7 text

DLP Overview

Slide 8

Slide 8 text

Data Loss Prevention ● Aims to ensure users / employees don't accidentally or deliberately leak sensitive data ○ “Keeps honest people from doing dumb things” ● Used to be a hot-button topic ● Panacea to solve all data leakage woes ● Data breaches and “files falling off the back of a digital truck” spurred DLP

Slide 9

Slide 9 text

Typical DLP Architecture

Slide 10

Slide 10 text

Typical DLP Architecture

Slide 11

Slide 11 text

Typical DLP Workflow (Example: Trend Micro)

Slide 12

Slide 12 text

Attack Surfaces

Slide 13

Slide 13 text

DLP Attack Surface ● Admin panel ○ Typical OWASP Top 10 issues ● Client <-> server communications ○ Not adequately encrypted ○ Flawed/ missing authorization ● Parsing errors ○ File parsing ○ Network traffic analysis ● HTTPS MitM ○ Often buggy and weakens encryption protocols used

Slide 14

Slide 14 text

IoT Attack Surface ● Administration ○ Web panel: Typical OWASP Top 10 issues ○ Poorly secured APIs/interfaces ● Client <-> server communications ○ Not adequately encrypted ○ Flawed/ missing authorization ● Device firmware ○ Often not properly hardened ○ Hard to update / log / audit ● “Networkability” ○ Do you have to punch a hole in your firewall for the device to work?

Slide 15

Slide 15 text

Issues

Slide 16

Slide 16 text

IoT Ecosystem

Slide 17

Slide 17 text

Endpoint Presence/Visibility ● Mix of proprietary and commodity/open source operating systems and supporting software ● System resource limitations ○ Storage ○ CPU ○ Memory ○ Power ● OEM/Vendor support for third-party code may be lackluster ○ Could be for security reasons (e.g. code signing, controlled ecosystem, etc.) ■ "Walled garden" sadfsadfsadf Magic DLP Agent Code How do you get this... Running on these?

Slide 18

Slide 18 text

Network/Protocol Support Examples: ● Infrastructure: 6LowPAN, IPv4/IPv6, RPL ● Identification: EPC, uCode, IPv6, URIs ● Comms / Transport: WiFi, Bluetooth, LPWAN ● Discovery: Physical Web, mDNS, DNS-SD ● Data Protocols: MQTT, CoAP, AMQP, Websocket, Node ● Device Management: TR-069, OMA-DM ● Semantic: JSON-LD, Web Thing Model ● Multi-layer Frameworks: Alljoyn, IoTivity, Weave, HomeKit Source: Postscapes Source: Prismtech

Slide 19

Slide 19 text

Network/Protocol Example Scenario ● An IoT device gets compromised (attack vector is irrelevant) ● Attacker observes that ports 1883/tcp (MQTT) and 8883/tcp (MQTT over SSL) are allowed outbound ● They use MQTT as a mechanism for exfiltrating whatever they observe on the network (files, credentials, etc.) to, say, AWS... ● How would you detect/stop this?

Slide 20

Slide 20 text

Multiple Components ● IoT device itself ○ Again, lack of endpoint inspection ● Mobile devices/applications ○ Compromised / lost / unpatched devices ○ Direct comms to the device ○ Comms through insecure service/ middleware ● Cloud services ○ Out of control of consumer ○ Limited (if any) introspection ● Supporting devices (e.g. hubs and bridges) ○ Outdated firmware

Slide 21

Slide 21 text

Solutions and Recommendations

Slide 22

Slide 22 text

Endpoint/Device ● Ease of patching ○ Automated patching is hard implement ○ Manual patching is expensive for the user ● Secure defaults ○ E.g. robust authentication, protection of data-in-motion and at-rest, etc. ● Logging and auditing options

Slide 23

Slide 23 text

Network ● Behavioral traffic analytics ○ "Does this device typically talk to these hosts/networks?" ■ Could be augmented with AI/ML ○ Terminating SSL/TLS will likely break many connections/devices that follow "best practice(s)" ● Really the only layer where DLP/inspection can be applied to IoT right now

Slide 24

Slide 24 text

Network-layer Solutions ● Network Intrusion Detection Systems could be adapted for DLP-esque purposes ○ Snort ○ Bro IDS ○ Suricata ■ Some efforts related to IoT exist, but not necessarily DLP-centric ● e.g. https://github.com/decanio/suricata-IoT/ (though seems to be unmaintained) ● Senrio Insight (commercial) ○ Enumerates, categorizes, and monitors device behavior on the network ● Pwnie Express' IoT offering (commercial)

Slide 25

Slide 25 text

Platform/Service ● DLP for SaaS/cloud already exists ○ But is fairly nascent and may not necessarily apply to services for IoT ○ Numerous commercial vendors, but also Google Cloud DLP API + AWS-integrated DLP offerings ■ Be mindful of permissions/authorizations

Slide 26

Slide 26 text

Conclusion

Slide 27

Slide 27 text

Conclusion ● Vendors/OEMs ○ Provide interfaces for device instrumentation/security monitoring (where possible) ● Developers ○ Take advantage of security and monitoring features of the target platform(s) -- if they're there ■ Lean on vendors for this! ● Customers ○ Segment IoT and ICS devices and monitor those networks accordingly ○ Education is not enough ○ Avoid “security fatigue” ○ Ask/ research educated questions about security before purchasing

Slide 28

Slide 28 text

Questions? [email protected] https://twitter.com/quine [email protected] https://twitter.com/aloria