Transcript
            
            
              This transcript was autogenerated. To make changes, submit a PR.
            
            
            
            
              Hello everyone.
            
            
            
              My name is Oriaki Victor Nsakai.
            
            
            
              I'm a design engineer by profession.
            
            
            
              today I'll be talking about, securing embedded systems in
            
            
            
              IoT, a practical DevOps approach.
            
            
            
              Now let's dive right into it.
            
            
            
              firstly, I'm going to talk about, I'm going to talk about
            
            
            
              what is IoT on embedded systems.
            
            
            
              then I'm going to talk about security challenges with them.
            
            
            
              Then we'll move on to the role of DevOps in securing embedded systems.
            
            
            
              And we'll talk about securing the development, life cycle.
            
            
            
              And so we'll talk about, securing post deployment IoT devices,
            
            
            
              balancing innovation, securely.
            
            
            
              And lastly, we'll talk about the best practices for securing these, embedded
            
            
            
              devices, practical take home, take homes.
            
            
            
              Now, what are these embedded, devices?
            
            
            
              Now, these embedded devices, they are like the brain behind what modern
            
            
            
              robotics and IoT applications do.
            
            
            
              they work silently to perform specific tasks within larger systems.
            
            
            
              they are like the brain, behind this, this modern technology, these smart systems.
            
            
            
              Yeah, they find applications in, in headscale sector, in the
            
            
            
              manufacturing sector, even critical infrastructures like the railway
            
            
            
              systems, power grids, smart grids.
            
            
            
              this IoT, device is expected to grow to over 25 billion users by the year 2020.
            
            
            
              Now, we've talked about embedded, so now let's talk about IoT.
            
            
            
              IoT refers to a network of interconnected physical devices embedded with sensors,
            
            
            
              software, and other technologies that enable them to collect, exchange,
            
            
            
              and add on data over the internet.
            
            
            
              basically, this is IOT, system, they collect data, they exchange the data, and
            
            
            
              they add on this data over the Internet.
            
            
            
              for example, in the healthcare sector, these IOT, embedded devices could be used
            
            
            
              to, monitor and track a patient's health.
            
            
            
              in my patient sector, it could be used to, to manipulate robots, to be used for the
            
            
            
              supply chain to check the movement of, the movement of, goods from one, production
            
            
            
              cycle or production, desk to nest.
            
            
            
              because we use, it can be applied, be used in our homes to control thermostats.
            
            
            
              control some devices in our home.
            
            
            
              So these devices are widely used in various industries.
            
            
            
              Now, what are the security challenges with these devices?
            
            
            
              we have, different levels, from the hardware level risk we have, where
            
            
            
              attackers can be exploited, by trying to physically tamper with these devices.
            
            
            
              for example, an IOT embedded camera can be, an IOT embedded
            
            
            
              camera can be, tampered with.
            
            
            
              a circuit could be plugged into it and, sensitive data could be
            
            
            
              exploited or gained from this, device.
            
            
            
              Also, we have the firmware and software vulnerabilities,
            
            
            
              things like updated firmware.
            
            
            
              software, weak encryption, if not properly, secured, or if not properly,
            
            
            
              if not regularly updated, it's going to be exploited by these cyber attackers.
            
            
            
              also we have the communication protocol weaknesses.
            
            
            
              These IoT embedded devices, they rely heavily on, communication protocols
            
            
            
              like the Wi Fi and Bluetooth.
            
            
            
              So if not properly secured.
            
            
            
              It could be, intercepted by this cyber attackers.
            
            
            
              Now, what's the role from DevOps in security and business systems?
            
            
            
              Now we're talking about security and we want to talk about how
            
            
            
              DevOps could be used to secure these devices on these systems.
            
            
            
              So DevOps is, a combination of, a combination of development and
            
            
            
              operations through automation.
            
            
            
              so with DevOps, we can ensure software is prepared and,
            
            
            
              deliver efficiently and securely.
            
            
            
              Also applying these DevOps principles to embedded systems can help improve
            
            
            
              security, agility, and automation.
            
            
            
              Now let's talk about benefits.
            
            
            
              So some of the benefits include the real time detection of
            
            
            
              security vulnerabilities.
            
            
            
              So with DevOps, we could continuously monitor these systems.
            
            
            
              So vulnerabilities have been exploited.
            
            
            
              Also, we have automated security testing to ensure security validation
            
            
            
              is part of the CICD pipeline.
            
            
            
              so an example could be, we could use automated testing tools to,
            
            
            
              automated testing tools in DevOps.
            
            
            
              Pipelines to simulate, attacks on these IOT devices to find
            
            
            
              vulnerabilities even before deployment.
            
            
            
              So, lastly, the another benefit of this, this another benefit of
            
            
            
              DevOps in, in securing embedded systems is faster issue resolution.
            
            
            
              So this, because it's an automated process, it's, it responds
            
            
            
              fast and it detects, this.
            
            
            
              vulnerability flows, on time through this automated processes.
            
            
            
              Now securing the development life cycle.
            
            
            
              Now we need to, we need to secure these devices from the design stage, not
            
            
            
              after deployment or during maintenance.
            
            
            
              So we could use, We could use, communications that are
            
            
            
              encrypted, like the TLS protocol.
            
            
            
              We could also use, secure booting methods, to ensure that, only trusted
            
            
            
              software, ensure these devices start with only trusted, software.
            
            
            
              Also, we could use, the trusted platform modules to protect hardware integrity.
            
            
            
              All right.
            
            
            
              We could secure this, design to get the design of this embedded systems
            
            
            
              during the development lifecycle is by ensuring security is validated
            
            
            
              at every stage of the process.
            
            
            
              So from the design to the deployments to demand, you want your methodology.
            
            
            
              Maintainers, excuse me, even during maintainers we could, we could secure
            
            
            
              this, the design of these systems.
            
            
            
              Now, even after, after the design phase of this embedded system, we
            
            
            
              also need to continuously monitor them for unusual activities.
            
            
            
              So we could use, things like the log and alert systems, thereby,
            
            
            
              permitted, automated alerts for potential security breaches.
            
            
            
              So whenever there is a breach we are alerted.
            
            
            
              Also we could use a patch management method whereby we are whereby there's
            
            
            
              regular firmware software updates to patch these vulnerabilities.
            
            
            
              Also this can be done remotely.
            
            
            
              It doesn't necessarily need to be to involve a human or
            
            
            
              have a physical intervention.
            
            
            
              I want to talk about, balancing the vision of security.
            
            
            
              So while there's an increase in the use of these devices, like I said, they
            
            
            
              are applied in various industries from the healthcare sector to manufacturing
            
            
            
              sector to critical infrastructures.
            
            
            
              we need to also increase the security of these devices.
            
            
            
              like I said, there's an estimated growth of these devices to, to increase to
            
            
            
              over 25 billion users by the year 2030.
            
            
            
              So ensuring these devices are safe is very important.
            
            
            
              So why is it important we secure these devices?
            
            
            
              So firstly, when we, when we, put, when we include security features in the design
            
            
            
              of this, Embedded IoT devices from the design phase to the deployment phase.
            
            
            
              Even during maintenance, we want to continuously ensure
            
            
            
              these devices are safe.
            
            
            
              They tend to be more trusted and adopted by the users.
            
            
            
              nobody wants to be exploited.
            
            
            
              So when these devices are safe, we have more people wanting to use them, wanting
            
            
            
              to buy them, wanting to adopt them.
            
            
            
              This also further, leads to, open opportunities to new
            
            
            
              applications and markets.
            
            
            
              So there's an increase in marketability of these, devices because they
            
            
            
              are safe and they're trusted.
            
            
            
              They are not easily exploited by cyber attackers.
            
            
            
              So by this, we've also increased the scalability of these, devices.
            
            
            
              Now, what are the best practices for securing these embedded IoT systems?
            
            
            
              firstly, we need to ensure this, security is, embedded at each stage
            
            
            
              of this development life cycle from the design phase to the deployment to
            
            
            
              post deployment to maintenance stage.
            
            
            
              So we need to continuously conduct regular threat modeling and risk
            
            
            
              assessments at every given time of this development stage, the development cycle.
            
            
            
              Also, we should ensure we use, secure communication protocols the HTTPS
            
            
            
              and TLS, other secure protocols.
            
            
            
              Then, we should try and integrate security testing into our CI CD pipeline
            
            
            
              for faster vulnerability detection.
            
            
            
              like we said, DevOps responds fast.
            
            
            
              It detects, Threats and vulnerabilities early, so we should try and, while
            
            
            
              implementing this DevOps approach to securing this embedded IoT system,
            
            
            
              we should try and integrate security testing into our CID pipelines for
            
            
            
              faster vulnerability detection.
            
            
            
              lastly, we should develop clear actionable protocols for responding
            
            
            
              to this, to security incidents.
            
            
            
              So by also doing this, practice, we could secure our embedded IoT systems.
            
            
            
              Now, what are the key takeaways for designers, for systems
            
            
            
              engineers, for, DevOps, engineers as well, or professionals?
            
            
            
              So the first one is we should embed security early.
            
            
            
              So from the design phase to development phase, we should Try and embed the
            
            
            
              security early to mitigate this risk.
            
            
            
              Also, we should implement continuous integration and continuous delivery,
            
            
            
              practices for hardware security.
            
            
            
              Then we could use, the regular monitor and patch devices, after
            
            
            
              deployment to maintain security.
            
            
            
              So even after we've done that.
            
            
            
              After the deployment, we should also regularly monitor our partial
            
            
            
              devices for vulnerabilities.
            
            
            
              Then, lastly, we should continuously adopt these, security, strategies,
            
            
            
              continuously try and, come up with ideas, innovative ideas to drive
            
            
            
              greater use, user trust of this event.
            
            
            
              Like I said, while there's an increase in the use of these devices, we
            
            
            
              need to, increase the, We need to increase the trust of you to increase
            
            
            
              security, thereby gaining greater user trust and diverse scalability.
            
            
            
              So as I conclude today, why there is an increase in the use of
            
            
            
              this IoT and embedded systems.
            
            
            
              We need to, try and use the DevOps approach to, increase our security
            
            
            
              as DevOps tends to, tends to automate its response to attacks.
            
            
            
              I've also run over this early.
            
            
            
              It's something with a response fast, by applying this DevOps approach, we thereby,
            
            
            
              prioritize security and build trust.
            
            
            
              We also drive scalability and ensure a safer future for everyone.
            
            
            
              Thank you.