The Cyber-Digital Battlefield: Part 4
Just as human intelligence works most securely when information is handled on a need-to-know basis, the intelligent edge will be most resilient if a single part of the system can’t take down everything.
Security matters, but protecting against attackers will never be enough to create a resilient system. Secure by design is a methodology for creating computer applications or systems in which all aspects of the software are inherently developed in a way that makes it difficult or impossible for a malicious user to damage, attack, or compromise a system. There is a movement among software developers now to incorporate information security with agile software development — a marriage of DevOps and InfoSec known as DevSecOps.
DevSecOps means shifting security to the left by making it a part of the development process, not something to be tested at the end or buried in a report of suspected vulnerabilities. It starts with an assumption that bad actors will find a way to attack the system, so why not attack it from every angle first to expose the weak points and assess the chaos that could be possible? And then keep exploring. “Looking at your infrastructure and code from the viewpoint of an attacker allows for a better security understanding of the weaknesses and strengths of an application, service, data center, and cloud,” says Ian Allison, an information security veteran who put together a Red Team to attack everything, without restriction, at a major corporation — as long as they stopped short of taking down production. “A real-world attacker couldn’t care less about scope. Attackers don’t discriminate between production and quality assurance and [testing], so neither should we.”
Because attacks are inevitable — and real-life attackers would not stop short of taking down production — developers should seek to minimize, contain, and repair any damage an attacker could do. Defense is often handled by a Blue Team (a term borrowed from the military). To build resilience, systems should be built for continuous development and updatability, not only to patch vulnerabilities and repair damage but also to add functionality and improvements.
For mission-critical systems, this is more than a lofty goal. Shutting down the power grid or a car in motion for a software update is not a viable option. Ultimately, updates should occur with no loss of function, as they did in a recent experiment in which a fighter jet — a large system with many controls running on different platforms on multiple clouds — was updated with new capabilities while it was in flight. “That’s the model we’re aiming for: to update dynamically without undermining security,” explains Thompson.
Of course, that is easier said than done. One of the biggest problems with many edge devices is their lack of updatability. Many industrial and healthcare system controls, for example, were never meant to be connected outside of a closed network and are rife with vulnerabilities. Too many “smart” consumer products were not built with security in mind, including those that were designed to connect to the internet. Engineering systems might have a single password that gives anyone who knows it (disgruntled employees, contractors, spies) the ability to control earth-crushing equipment, in the field or remotely. And many IoT devices must be updated physically, even if they are in isolated locations — or they are simply not updatable at all.
Walled Garden
Limiting access is the oldest form of cybersecurity, and perhaps the most effective. A system that runs on a closed network can be tampered with only by someone who has physical access to the hardware or data stores. But the kind of closed system that many traditional military and enterprise systems relied on for security will not be possible for a distributed intelligent edge system. Moving computing, analysis, and action to the edge presents very different challenges to security than does a traditional enterprise system. Limiting access to systems and protecting hardware as well as data all become more crucial. A walled garden — a system purpose built to work within an enclosed network — lends itself to a more holistic security approach, says Thompson. This is not possible for every application. But it is an approach that should be considered for critical systems.
Encryption
As with all aspects of security, encryption will be an ongoing battle as 5G and the IoT create more dispersed systems, generating greater quantities of data. At the same time, new cognitive and quantum computing capabilities can be weapons for any side with the means to deploy them. “Analysts from the National Institute of Standards and Technology (NIST) believe quantum computing will render current encryption methods useless within 15 years, so it’s not surprising DARPA (Defense Advanced Research Projects Agency) put its focus here,” says Shomo. DARPA has solicited “innovative research” around IoT cryptography through a program called Cryptography for Hyper-scale Architectures in a Robust Internet of Things (CHARIOT). “DARPA initiatives include boosting the human ability to recognize and hunt threats at scale, and more exotic AI advances,” Shomo explains.22
Will long-lived hardware be defensible against advances in computing capabilities? “Being single-use hardware, IoT devices may be deployed long after vendors cease patching vulnerabilities,” points out Shomo. “IoT encryption needs to hold up for decades.”23
Digital-first engineering
“There is a chasm in security standards between military systems and commercial systems,” says Thompson. He believes that market forces alone will not be enough to secure critical infrastructure, because there is remarkably little liability when things go wrong in the private sector. “Security always seems to lag, because new technologies come out before all the ramifications have been really thought through and analyzed,” he says. “But we can’t afford to have another country own our networks.”
20 “The Eclipse Foundation Releases Results from the 2020 IoT Developer Survey,” October 19, 2020
22 Paul Shomo, “DARPA and Academia Jumpstart 5G IoT Security Efforts,” Dark Reading, November 12, 2020
23 Paul Shomo, “DARPA and Academia Jumpstart 5G IoT Security Efforts,” Dark Reading, November 12, 2020
VP, Security Product Sales
Wind River