Platform Architecture

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

1.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 1: Introducing Windows Server.
A Java Architecture for the Internet of Things Noel Poore, Architect Pete St. Pierre, Product Manager Java Platform Group, Internet of Things September.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
Health IT RESTful Application Programming Interface (API) Security Considerations Transport & Security Standards Workgroup March 18, 2015.
Matt Steele Senior Program Manager Microsoft Corporation SESSION CODE: SIA326.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
Copyright 2007, Information Builders. Slide 1 WebFOCUS Authentication Mark Nesson, Vashti Ragoonath Information Builders Summit 2008 User Conference June.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
1 School of Computer, National University of Defense Technology A Profile on the Grid Data Engine (GridDaEn) Xiao Nong
Production Data Grids SRB - iRODS Storage Resource Broker Reagan W. Moore
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
DirectProject Reference Implementation 4.0 Greg Director, Distinguished Engineer, Cerner Corp.
NA-MIC National Alliance for Medical Image Computing UCSD: Engineering Core 2 Portal and Grid Infrastructure.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
Security and Privacy for the Smart Grid James Bryce Clark, OASIS Robert Griffin, RSA Hal Lockhart, Oracle.
Secure Mobile Development with NetIQ Access Manager
Security in OPC Unified Architecture (UA) Dick Oyen IndustrialSysDev, Inc.
Best-in-class enterprise backup for the mobile enterprise Prepared for [Insert customer name] [Date}
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Security Working Group
Command Microservice Deep Dive
Meta Data Deep Dive Part 1
Virtual Private Network Access for Remote Networks
Core Data Deep(er) Dive
Security Working Group
Security Working Group
Export Services Deep Dive
Basharat Institute of Higher Education
Palo Alto Networks Certified Network Security Engineer
Principles of Automotive cyber-security
Developing IoT endpoints with mbed Client
Hardware-rooted Trust for Secure Key Management & Transient Trust
Device Service SDK Deep Dive
Security Working Group
OpenLegacy Training Day Four Introduction to Microservices
The Next Generation - UNIFIED
Discussion about Use Case and Architecture in Developer Guide
Security Working Group
Security Working Group
Meta Data Deep Dive Part 1
EdgeX System Management Nov 6th 2017
Secure communication among services
Certificate and Secret Management Services
GDP and SOTA Arthur Taylor May 10th, 2017 | Status and Next Steps
Introduction to Microservices Prepared for
EdgeX System Management Nov 14th 2017
Secret Server proposal
EdgeX Foundry Techical Face - to – Face Orlando, January 16-18, 2018
Weekly Meeting 2018 Jan 24 Security.
CS691 M2009 Semester Project PHILIP HUYNH
IBM Certified WAS 8.5 Administrator
Cisco Real Exam Dumps IT-Dumps
Introduction to z/OS Security Lesson 4: There’s more to it than RACF
CS691 M2009 Semester Project PHILIP HUYNH
Server-to-Client Remote Access and DirectAccess
Goals Introduce the Windows Server 2003 family of operating systems
Connecting, Managing, Observing, and Securing Services
Public Key Infrastructure from the Most Trusted Name in e-Security
SharePoint Online Hybrid – Configure Outbound Search
– Chapter 3 – Device Security (B)
TLS and DLP Behind the green lock.
EdgeX Explorations Tiejun Chen, VMware China R&D, ATC
Designed for powerful live monitoring of larger installations
Intel Active Management Technology
Designing IIS Security (IIS – Internet Information Service)
Features Overview.
IT Management, Simplified
What is needed in the Next Generation Cloud trusted platform?
IoT Security and Privacy
Presentation transcript:

Platform Architecture REQUIRED INTEROPERABILITY FOUNDATION Platform Architecture REPLACEABLE REFERENCE SERVICES “NORTHBOUND” INFRASTRUCTURE AND APPLICATIONS LOOSELY-COUPLED MICROSERVICES FRAMEWORK CHOICE OF PROTOCOL SECURITY EXPORT SERVICES DEVICE + SYSTEM MANAGEMENT ADDITIONAL SERVICES CLIENT REGISTRATION DISTRIBUTION ADDITIONAL SERVICES SUPPORTING SERVICES In the beginning /dev/null ADDITIONAL SERVICES RULES ENGINE SCHEDULING ALERTS & NOTIFICATIONS LOGGING DEPLOYMENT CONTAINER LOCAL MGMT CONSOLE METADATA CORE DATA COMMAND CORE SERVICES REGISTRY & CONFIG ALL MICROSERVICES INTERCOMMUNICATE VIA APIs DEVICE SERVICES (ANY COMBINATION OF STANDARD OR PROPRIETARY PROTOCOLS VIA SDK) REST OPC-UA MODBUS BACNET ZIGBEE BLE MQTT SNMP VIRTUAL ADD’L DEVICE SERVICES SDK “SOUTHBOUND” DEVICES, SENSORS AND ACTUATORS

IIC Endpoint Security Best Practices and EdgeX EdgeX will begin here

DEVICE + SYSTEM MANAGEMENT ALERTS & NOTIFICATIONS Start with the Basics: Protect Perimeter Ingress TLS (Server Side) API Gateway W/AuthN Ingress Port Blocking EXPORT SERVICES DEVICE + SYSTEM MANAGEMENT ADDITIONAL SERVICES CLIENT REGISTRATION DISTRIBUTION ADDITIONAL SERVICES SUPPORTING SERVICES ADDITIONAL SERVICES RULES ENGINE SCHEDULING ALERTS & NOTIFICATIONS LOGGING DEPLOYMENT CONTAINER LOCAL MGMT CONSOLE METADATA CORE DATA COMMAND CORE SERVICES REGISTRY & CONFIG ALL MICROSERVICES INTERCOMMUNICATE VIA APIs DEVICE SERVICES (ANY COMBINATION OF STANDARD OR PROPRIETARY PROTOCOLS VIA SDK) REST OPC-UA MODBUS BACNET ZIGBEE BLE MQTT SNMP VIRTUAL ADD’L DEVICE SERVICES

Protect Perimeter Ingress: Details and Roadmap Feature California Delhi Edinburgh Beyond API Gateway Single Ingress Point for ALL HTTPS traffic (no HTTP) using Kong X TBD Authentication Simple JWT based authentication (via kong plugin) Oauth based AuthN (Client Credentials, Bearer Token Flow) Identity Management Features (User Lifecycle Management, password change, revoke) Authorization None Via Kong ACL plugin that enables group based AuthZ TLS Server Side Only Primary Cert stored in Vault Mutual Certificates Service to Service Enabled via one of (mutual certs or Token based AuthN) Secure service registration (Considering Consul Connect) IIC Endpoint Security Best Practices Reference: Secure Communications

ALL MICROSERVICES INTERCOMMUNICATE VIA APIs California Security Architecture TLS (Server Side) API Gateway W/ JWT AuthN Ingress Port Blocking 2 3 1 User Store Consul (Service Discovery) 4 PostgresDB ALL MICROSERVICES INTERCOMMUNICATE VIA APIs METADATA CORE DATA COMMAND CORE SERVICES Vault (Secret Store) 5 Vault Init Kong DB Init Kong Init

Secrets/Key Management Feature California Delhi Edinburgh Beyond Vault Init and store primary Kong Cert Non-root token and namespace Initial Services use of Vault for secrets System wide usage of vault for secrets Certificate Management Generate certs for Vault and API gateway X Generate certs for service to service communication Initial Power Up Secrets Design pluggable abstraction Layer for HW based secure storage Deliver abstraction layer Use abstraction layer to encrypt Initial Power up secrets Service to Service Communication Enabled via one of (mutual certs or Token based AuthN) Secure service registration IIC Endpoint Security Best Practices Reference: Secure Communications, Endpoint Identity, Cryptographic Services

Cryptographic Services Feature California Delhi Edinburgh Beyond X.509 v3 Certs RSA: 1024 bits 2048 bits  4096 bits << recommended >> Elliptic Curve secp224r1 NIST P-224 secp256v1 NIST P-256 secp384r1 NIST P-384 << recommended >> secp521r1 NIST P-521 X Vault Encryption AES256 W/ GCM mode using 96-bit nonces for IV File System Encryption TBD TLS Server Side Mutual Certs IIC Endpoint Security Best Practices Reference: Cryptographic Services

Hardware Based Security Feature California Delhi Edinburgh Beyond Secure Boot X Information Sessions with HW Vendors Recommendations and Guidelines Root of Trust Secure Secrets Storage Design pluggable abstraction Layer Deliver pluggable Abstraction layer Add 3rd party plugins IIC Endpoint Security Best Practices Reference: Secure Boot, Root of Trust, Cryptographic Services

Future Security Features Data Protection Identity and Access Operational Security DAR Encrypted Storage Data Protection Policy Administration Local and Remote Security Monitoring Audit Guidelines SW Update Management Attestation Privacy Secure Auto-configuration Operational Security Policy