Orchestrating and Automating Security for the Internet of Things
Home > Computing and Information Technology > Computer networking and communications > Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT

|
     0     
5
4
3
2
1




International Edition


About the Book

Master powerful techniques and approaches for securing IoT systems of all kinds–current and emerging Internet of Things (IoT) technology adoption is accelerating, but IoT presents complex new security challenges. Fortunately, IoT standards and standardized architectures are emerging to help technical professionals systematically harden their IoT environments. In Orchestrating and Automating Security for the Internet of Things, three Cisco experts show how to safeguard current and future IoT systems by delivering security through new NFV and SDN architectures and related IoT security standards. The authors first review the current state of IoT networks and architectures, identifying key security risks associated with nonstandardized early deployments and showing how early adopters have attempted to respond. Next, they introduce more mature architectures built around NFV and SDN. You’ll discover why these lend themselves well to IoT and IoT security, and master advanced approaches for protecting them. Finally, the authors preview future approaches to improving IoT security and present real-world use case examples. This is an indispensable resource for all technical and security professionals, business security and risk managers, and consultants who are responsible for systems that incorporate or utilize IoT devices, or expect to be responsible for them. · Understand the challenges involved in securing current IoT networks and architectures · Master IoT security fundamentals, standards, and modern best practices · Systematically plan for IoT security · Leverage Software-Defined Networking (SDN) and Network Function Virtualization (NFV) to harden IoT networks · Deploy the advanced IoT platform, and use MANO to manage and orchestrate virtualized network functions · Implement platform security services including identity, authentication, authorization, and accounting · Detect threats and protect data in IoT environments · Secure IoT in the context of remote access and VPNs · Safeguard the IoT platform itself · Explore use cases ranging from smart cities and advanced energy systems to the connected car · Preview evolving concepts that will shape the future of IoT security

Table of Contents:
Foreword xxvii Introduction xxix Part I Introduction to the Internet of Things (IoT) and IoT Security Chapter 1 Evolution of the Internet of Things (IoT) 1 Defining the Internet of Things 2 Making Technology and Architectural Decisions 5 Is the Internet of Things Really So Vulnerable? 8 Summary 9 References 10 Chapter 2 Planning for IoT Security 11 The Attack Continuum 11 The IoT System and Security Development Lifecycle 13 Phase 1: Initiation 15 Phase 2: Acquisition and Development 15 Phase 3: Implementation 16 Phase 4: Operations and Maintenance 17 Phase 5: Disposition 17 The End-to-End Considerations 17 Segmentation, Risk, and How to Use Both in Planning the Consumer/Provider Communications Matrix 21 Segmentation 21 New Approach 25 Summary 30 References 30 Chapter 3 IoT Security Fundamentals 31 The Building Blocks of IoT 31 The IoT Hierarchy 35 Primary Attack Targets 37 Layered Security Tiers 43 Summary 46 References 47 Chapter 4 IoT and Security Standards and Best Practices 49 Today’s Standard Is No Standard 49 Defining Standards 53 The Challenge with Standardization 56 IoT “Standards” and “Guidance” Landscape 58 Architectural or Reference Standards 59 Industrial/Market Focused 61 Standards for NFV, SDN, and Data Modeling for Services 63 Data Modeling and Services 67 Communication Protocols for IoT 70 Physical and MAC Layers 73 Network Layer 73 Transport Layer 74 Application Layer 74 Specific Security Standards and Guidelines 75 Summary 79 References 80 Chapter 5 Current IoT Architecture Design and Challenges 83 What, Why, and Where? A Summary 85 Approaches to IoT Architecture Design 88 An X-Centric Approach 91 The People-/User-Centric IoT Approach (Internet of People and Social IoT) 98 The Information-Centric IoT Approach 100 The Data-Centric IoT Approach 104 System Viewpoint: A Cloudy Perspective 106 Middleware 118 Lambda Architecture 119 Full IoT Stack/Universal 120 General Approaches 120 Internet of Things Architecture Reference Architecture (IoT-A RA) 120 ITU-T Y.2060 125 IoT World Forum (IoTWF) Reference Model 126 oneM2M Reference Architecture 129 IEEE P2413 IoT Architecture 132 The OpenFog Consortium Reference Architecture 133 Alliance for the Internet of Things Innovation (AIOTI) 138 Cloud Customer Architecture for IoT 140 Open Connectivity Foundation and IoTivity 142 Industrial/Market Focused 144 The Industrial Internet Consortium (IIC) 144 Industry 4.0 148 OPC Unified Architecture (OPC UA) 150 Cisco and Rockwell Automation Converged Plantwide Ethernet 153 Cisco Smart Grid Reference Model: GridBlocks 153 NFV- and SDN-Based Architectures for IoT 154 Approaches to IoT Security Architecture 156 Purdue Model of Control Hierarchy Reference Model 157 Industrial Internet Security Framework (IISF) IIC Reference Architecture 160 Cloud Security Alliance Security Guidance for IoT 165 Open Web Application Security Project (OWASP) 168 Cisco IoT Security Framework 168 The IoT Platform Design of Today 172 Security for IoT Platforms and Solutions 178 Challenges with Today’s Designs: The Future for IoT Platforms 179 Summary 183 References 183 Part II Leveraging Software-Defined Networking (SDN) and Network Function Virtualization (NFV) for IoT Chapter 6 Evolution and Benefits of SDX and NFV Technologies and Their Impact on IoT 185 A Bit of History on SDX and NFV and Their Interplay 185 Software-Defined Networking 188 OpenFlow 192 Open Virtual Switch 195 Vector Packet Processing 198 Programming Protocol-Independent Packet Processors (P4) 201 OpenDaylight 203 Extending the Concept of Software-Defined Networks 212 Network Functions Virtualization 217 Virtual Network Functions and Forwarding Graphs 221 ETSI NFV Management and Orchestration (MANO) 225 The Impact of SDX and NFV in IoT and Fog Computing 235 Summary 248 References 249 Chapter 7 Securing SDN and NFV Environments 251 Security Considerations for the SDN Landscape 251 1: Securing the Controller 252 2: Securing Controller Southbound Communications 256 3: Securing the Infrastructure Planes 260 4: Securing Controller Northbound Communications 263 5: Securing Management and Orchestration 268 6: Securing Applications and Services 270 Security Considerations for the NFV Landscape 272 NFV Threat Landscape 273 Secure Boot 274 Secure Crash 275 Private Keys Within Cloned Images 276 Performance Isolation 278 Tenant/User Authentication, Authorization, and Accounting (AAA) 279 Authenticated Time Service 281 Back Doors with Test and Monitor Functions 281 Multi-administrator Isolation 282 Single Root I/O Virtualization (SRIOV) 283 SRIOV Security Concerns 285 Summary 285 References 285 Chapter 8 The Advanced IoT Platform and MANO 287 Next-Generation IoT Platforms: What the Research Says 287 Next-Generation IoT Platform Overview 291 Platform Architecture 294 Platform Building Blocks 295 Platform Intended Outcomes: Delivering Capabilities as an Autonomous End-to-End Service 303 Example Use Case Walkthrough 308 Event-Based Video and Security Use Case 309 Summary 321 References 321 Part III Security Services: For the Platform, by the Platform Chapter 9 Identity, Authentication, Authorization, and Accounting 323 Introduction to Identity and Access Management for the IoT 324 Device Provisioning and Access Control Building Blocks 326 Naming Conventions to Establish “Uniqueness” 327 Secure Bootstrap 328 Immutable Identity 328 Bootstrapping Remote Secure Key Infrastructures 329 Device Registration and Profile Provisioning 330 Provisioning Example Using AWS IoT 331 Provisioning Example Using Cisco Systems Identity Services Engine 334 Access Control 336 Identifying Devices 336 Endpoint Profiling 337 Profiling Using ISE 337 Device Sensor 340 Methods to Gain Identity from Constrained Devices 345 Energy Limitations 346 Strategy for Using Power for Communication 347 Leveraging Standard IoT Protocols to Identify Constrained Devices 348 Authentication Methods 351 Certificates 351 Trust Stores 355 Revocation Support 356 SSL Pinning 357 Passwords 357 Limitations for Constrained Devices 358 Biometrics 359 AAA and RADIUS 361 A/V Pairs 362 802.1X 363 MAC Address Bypass 365 Flexible Authentication 366 Dynamic Authorization Privileges 367 Cisco Identity Services Engine and TrustSec 368 RADIUS Change of Authorization 368 Access Control Lists 374 TrustSec and Security Group Tags 376 TrustSec Enablement 379 SGACL 384 Manufacturer Usage Description 390 Finding a Policy 390 Policy Types 390 The MUD Model 392 AWS Policy-based Authorization with IAM 394 Amazon Cognito 395 AWS Use of IAM 395 Policy-based Authorization 395 Accounting 397 How Does Accounting Relate to Security? 398 Using a Guideline to Create an Accounting Framework 398 Meeting User Accounting Requirements 400 Scaling IoT Identity and Access Management with Federation Approaches 402 IoT IAM Requirements 403 OAuth 2.0 and OpenID Connect 1.0 404 OAuth 2.0 404 OpenID Connect 1.0 405 OAuth2.0 and OpenID Connect Example for IoT 405 Cloud to Cloud 406 Native Applications to the Cloud 408 Device to Device 409 Evolving Concepts: Need for Identity Relationship Management 411 Summary 414 References 415 Chapter 10 Threat Defense 417 Centralized and Distributed Deployment Options for Security Services 418 Centralized 418 Distributed 420 Hybrid 422 Fundamental Network Firewall Technologies 422 ASAv 423 NGFWv 423 Network Address Translation 424 Overlapping 425 Overloading or Port Address Translation 425 Packet Filtering 426 Industrial Protocols and the Need for Deeper Packet Inspection 428 Common Industrial Protocol 428 Lack of Security 429 Potential Solutions: Not Good Enough 430 Alternative Solution: Deep Packet Inspection 430 Sanity Check 431 User Definable 432 Applying the Filter 432 Application Visibility and Control 433 Industrial Communication Protocol Example 435 MODBUS Application Filter Example 436 Intrusion Detection System and Intrusion Prevention System 437 IPS 438 Pattern Matching 438 Protocol Analysis 439 IDS/IPS Weakness 439 Advanced Persistent Threats and Behavioral Analysis 440 Behavior Analysis Solutions 441 Protocols Used to Gain Additional Visibility 442 Network as a Sensor 444 Pairing with Contextual Information and Adaptive Network Control 446 Encrypted Traffic Analytics 450 Malware Protection and Global Threat Intelligence 455 Cisco Advanced Malware Protection and TALOS 456 DNS-Based Security 462 Umbrella (DNS Security + Intelligent Proxy) 463 Centralized Security Services Deployment Example Using NSO, ESC, and OpenStack 466 ETSI MANO Components in the Use Case 468 VMs (Services) Being Instantiated in the Use Case 469 Use Case Explanation 469 Distributed Security Services Deployment Example Using Cisco Network Function Virtualization Infrastructure Software (NFVIS) 486 Solution Components 487 NFVIS 488 Orchestration 490 vBranch Function Pack 490 Summary 495 References 495 Chapter 11 Data Protection in IoT 499 Data Lifecycle in IoT 507 Data at Rest 518 Data Warehouses 521 Data Lakes 522 Data in Use 524 Data on the Move 527 Protecting Data in IoT 531 Data Plane Protection in IoT 531 Protecting Management Plane Data in IoT 565 Protecting Control Plane Data 566 Considerations When Planning for Data Protection 567 Summary 573 References 574 Chapter 12 Remote Access and Virtual Private Networks (VPN) 575 Virtual Private Network Primer 575 Focus for This Chapter 576 Site-to-Site IPsec VPN 576 IPsec Overview 577 IKEv1 Phase 1 579 IKEv1 Phase 2 582 Internet Key Exchange Protocol Version 2 584 Benefits of IKEv2 over IKEv1 586 Software-Defined Networking-Based IPsec Flow Protection IETF Draft 588 IPsec Databases 589 Use Case: IKE/IPsec Within the NSF 589 Interface Requirements 590 Applying SDN-Based IPsec to IoT 592 Leveraging SDN for Dynamic Decryption (Using IKE for Control Channels and IPsec for Data Channels) 592 Software-Based Extranet Using Orchestration and NFV 594 Traditional Approach 594 Automating Extranet Using Orchestration Techniques and NFV 595 Software-Based Extranet Use Case 597 Remote Access VPN 598 SSL-Based Remote Access VPN 598 Reverse Proxy 599 Clientless and Thin Client VPN 599 Client Based: Cisco AnyConnect Secure Mobility Client 611 Modules 612 Using AnyConnect in Manufacturing: Use Case Example 617 Summary 622 References 622 Chapter 13 Securing the Platform Itself 625 (A) Visualization Dashboards and Multitenancy 627 (B) Back-End Platform 631 Scenario 1: A New Endpoint Needs to Be Connected to the Network 639 Scenario 2: A User Wants to Deploy a New Service Across the Fog, Network, and Data Center Infrastructure 639 Scenario 3: Creating New Data Topics and Enabling Data Sharing Across Tenants 641 Docker Security 653 Kubernetes Security and Best Practices 656 (C) Communications and Networking 658 (D) Fog Nodes 660 (E) End Devices or “Things” 666 Summary 667 References 667 Part IV Use Cases and Emerging Standards and Technologies Chapter 14 Smart Cities 669 Use Cases Introduction 669 The Evolving Technology Landscape for IoT 670 The Next-Generation IoT Platform for Delivering Use Cases Across Verticals: A Summary 672 Smart Cities 676 Smart Cities Overview 678 The IoT and Secure Orchestration Opportunity in Cities 688 Security in Smart Cities 693 Smart Cities Example Use Cases 696 Use Case Automation Overview and High-Level Architecture 701 Power Monitoring and Control Use Case: Secure Lifecycle Management of Applications in the Fog Nodes 702 Access Control and Sensor Telemetry of City Cabinets: Simple and Complex Sensor Onboarding 705 Event-Based Video: Secure Data Pipeline and Information Exchange 709 Public Service Connectivity on Demand: Secure User Access and Behavioral Analysis 714 Emergency Fleet Integration 718 Automated Deployment of the Use Cases 721 Summary 725 References 727 Chapter 15 Industrial Environments: Oil and Gas 729 Industry Overview 733 The IoT and Secure Automation Opportunity in Oil and Gas 735 The Upstream Environment 738 Overview, Technologies, and Architectures 739 Digitization and New Business Needs 742 Challenges 743 The Midstream Environment 744 Overview, Technologies, and Architectures 744 Digitization and New Business Needs 747 Challenges 748 The Downstream and Processing Environments 749 Overview, Technologies, and Architectures 749 Digitization and New Business Needs 752 Challenges 753 Security in Oil and Gas 754 Oil and Gas Security and Automation Use Cases: Equipment Health Monitoring and Engineering Access 763 Use Case Overview 763 Use Case Description 765 Deploying the Use Case 767 Preconfiguration Checklist 773 Automated Deployment of the Use Cases 777 Securing the Use Case 778 Power of SGT as a CoA 781 Auto-Quarantine Versus Manual Quarantine 782 Leveraging Orchestrated Service Assurance to Monitor KPIs 783 Evolving Architectures to Meet New Use Case Requirements 788 Summary 792 References 794 Chapter 16 The Connected Car 797 Connected Car Overview 800 The IoT and Secure Automation Opportunity for Connected Cars 809 The Evolving Car Architecture 824 Security for Connected Cars 830 Connected Car Vulnerabilities and Security Considerations 838 Connected Car Security and Automation Use Case 849 Use Case Overview 852 Use Case Automation Overview 854 Secure Access/Secure Platform: Boundary Firewall for OTA Secure Updates 855 Secure Network: Segmentation, Zones, and Interzone Communication 857 Secure Content: Intrusion Detection and Prevention 858 Secure Intelligence: Secure Internet Access from the Vehicle 861 The Future: Personalized Experience Based on Identity 862 Federal Sigma VAMA: Emergency Fleet Solution 863 Automated Deployment of the Use Case 867 Summary 871 References 871 Chapter 17 Evolving Concepts That Will Shape the Security Service Future 873 A Smarter, Coordinated Approach to IoT Security 876 Blockchain Overview 880 Blockchain for IoT Security 888 Machine Learning and Artificial Intelligence Overview 890 Machine Learning 893 Deep Learning 894 Natural Language Processing and Understanding 895 Neural Networks 896 Computer Vision 898 Affective Computing 898 Cognitive Computing 898 Contextual Awareness 899 Machine Learning and Artificial Intelligence for IoT Security 899 Summary 900 References 901 9781587145032 TOC 4/25/2018


Best Sellers


Product Details
  • ISBN-13: 9781587145032
  • Publisher: Pearson Education (US)
  • Publisher Imprint: Cisco Press
  • Height: 235 mm
  • No of Pages: 1008
  • Spine Width: 52 mm
  • Weight: 1726 gr
  • ISBN-10: 1587145030
  • Publisher Date: 30 Jul 2018
  • Binding: Paperback
  • Language: English
  • Returnable: Y
  • Sub Title: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
  • Width: 190 mm


Similar Products

Add Photo
Add Photo

Customer Reviews

REVIEWS      0     
Click Here To Be The First to Review this Product
Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
Pearson Education (US) -
Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT
Writing guidlines
We want to publish your review, so please:
  • keep your review on the product. Review's that defame author's character will be rejected.
  • Keep your review focused on the product.
  • Avoid writing about customer service. contact us instead if you have issue requiring immediate attention.
  • Refrain from mentioning competitors or the specific price you paid for the product.
  • Do not include any personally identifiable information, such as full names.

Orchestrating and Automating Security for the Internet of Things: Delivering Advanced Security Capabilities from Edge to Cloud for IoT

Required fields are marked with *

Review Title*
Review
    Add Photo Add up to 6 photos
    Would you recommend this product to a friend?
    Tag this Book Read more
    Does your review contain spoilers?
    What type of reader best describes you?
    I agree to the terms & conditions
    You may receive emails regarding this submission. Any emails will include the ability to opt-out of future communications.

    CUSTOMER RATINGS AND REVIEWS AND QUESTIONS AND ANSWERS TERMS OF USE

    These Terms of Use govern your conduct associated with the Customer Ratings and Reviews and/or Questions and Answers service offered by Bookswagon (the "CRR Service").


    By submitting any content to Bookswagon, you guarantee that:
    • You are the sole author and owner of the intellectual property rights in the content;
    • All "moral rights" that you may have in such content have been voluntarily waived by you;
    • All content that you post is accurate;
    • You are at least 13 years old;
    • Use of the content you supply does not violate these Terms of Use and will not cause injury to any person or entity.
    You further agree that you may not submit any content:
    • That is known by you to be false, inaccurate or misleading;
    • That infringes any third party's copyright, patent, trademark, trade secret or other proprietary rights or rights of publicity or privacy;
    • That violates any law, statute, ordinance or regulation (including, but not limited to, those governing, consumer protection, unfair competition, anti-discrimination or false advertising);
    • That is, or may reasonably be considered to be, defamatory, libelous, hateful, racially or religiously biased or offensive, unlawfully threatening or unlawfully harassing to any individual, partnership or corporation;
    • For which you were compensated or granted any consideration by any unapproved third party;
    • That includes any information that references other websites, addresses, email addresses, contact information or phone numbers;
    • That contains any computer viruses, worms or other potentially damaging computer programs or files.
    You agree to indemnify and hold Bookswagon (and its officers, directors, agents, subsidiaries, joint ventures, employees and third-party service providers, including but not limited to Bazaarvoice, Inc.), harmless from all claims, demands, and damages (actual and consequential) of every kind and nature, known and unknown including reasonable attorneys' fees, arising out of a breach of your representations and warranties set forth above, or your violation of any law or the rights of a third party.


    For any content that you submit, you grant Bookswagon a perpetual, irrevocable, royalty-free, transferable right and license to use, copy, modify, delete in its entirety, adapt, publish, translate, create derivative works from and/or sell, transfer, and/or distribute such content and/or incorporate such content into any form, medium or technology throughout the world without compensation to you. Additionally,  Bookswagon may transfer or share any personal information that you submit with its third-party service providers, including but not limited to Bazaarvoice, Inc. in accordance with  Privacy Policy


    All content that you submit may be used at Bookswagon's sole discretion. Bookswagon reserves the right to change, condense, withhold publication, remove or delete any content on Bookswagon's website that Bookswagon deems, in its sole discretion, to violate the content guidelines or any other provision of these Terms of Use.  Bookswagon does not guarantee that you will have any recourse through Bookswagon to edit or delete any content you have submitted. Ratings and written comments are generally posted within two to four business days. However, Bookswagon reserves the right to remove or to refuse to post any submission to the extent authorized by law. You acknowledge that you, not Bookswagon, are responsible for the contents of your submission. None of the content that you submit shall be subject to any obligation of confidence on the part of Bookswagon, its agents, subsidiaries, affiliates, partners or third party service providers (including but not limited to Bazaarvoice, Inc.)and their respective directors, officers and employees.

    Accept

    New Arrivals

    Inspired by your browsing history


    Your review has been submitted!

    You've already reviewed this product!