IoT Armour - Zero Trust Cybersecurity For IoT
IoT Armour - Zero Trust Cybersecurity For IoT
c o m
Blockchain-based digital identity for Locked-down & secured access to Tamper-proof logging of all
connected devices critical IoT systems identity and access
1
w w w . i o t a r m o u r. c o m
Smart homes and Connected cars, Industrial control systems Smart Cities with sensors
offices enabled with a autonomous trucks, w/ cyber-physical and digital mgmt. systems
host of connected and unmanned platforms managing for energy, utilities,
smart devices aerial vehicles, etc critical infrastructure transportation, etc
The IoT market is expected to grow to an install base of 30.7 billion devices by 2020 and 75.4 billion by 2025
2
w w w . i o t a r m o u r. c o m
However, the rapidly Since 2016, researchers have shown how attackers could
growing world of
hijack a vehicle. In 2017, US Homeland Security cyber
sleuths hacked a Boeing 757 as it sat on the runway
perpetually-connected
smart devices presents In 2017, criminals hacked a connected fish tank
security risks
In late 2016, ‘Crash Override’ malware took down the
power grid in Kiev, Ukraine for over an hour before
Christmas
Existing security solutions are unable to keep pace, scale up and address the security challenges facing the emerging IoT world 3
w w w . i o t a r m o u r. c o m
4
w w w . i o t a r m o u r. c o m
REGISTRATION and
ID of new device
AUTHENTICATION
& AUTHORIZATION
of devices
CORE
SYSTEMS
SECURE CHANNELS
for inter-device
communication
SECURED ACCESS
to core systems
Identity & Access
Validation Nodes
SDP
Controller 4. List of authorized
Accepting Hosts determined Cryptographic Encryption
3. Mutual secure comm. to 5. Accept communication from
Controller Initiating Host
Control Channel
Accepting SDP Technology
Host
Data Channel
Consensus-based Control
Developed at the Defense Information Systems Agency (DISA). Used by the DHS & DoD
6
Emerging technology offers opportunities to secure sensor networks, IoT devices and smart infrastructure in bold new ways
w w w . i o t a r m o u r. c o m
7
w w w . i o t a r m o u r. c o m
Cryptographically-secure Invisible & locked down Best-in-class military- Immutable & tamper-
digital identity critical systems grade encryption proof logs
for users, connected devices with micro segmentation for secured access to stored securely on the
and central servers/ services and fine-grain access control connected devices and IoT Blockchain for instant
communication access / analysis
It’s time to reclaim control and secure connected devices and critical IoT infrastructure using emerging technology! 8
w w w . i o t a r m o u r. c o m
+91 9820386446
www.blockarmour.com +65 96536243
[email protected] @blockarmour