Matt Landrock, CEO, Cryptomathic
What can we expect from embedded systems? Internet of Things.... Things: PCs, Phones, Smartmeters,dishwashers, cars, apps.
Often want to validate code running on the "thing" and enable the thing to carry out basic cryptographic functions. Understanding that "things" in the IoT can mean pretty much anything security-wise (from high-end to low-end). if security adds too much inconvenience or cost, it will be skipped or skimped.
HSMs are under-utilized in the IoT space. Crypto APIs tend to be complicated, auditing individual projects is expensive and key management is often over-looked.
If we think about crypto as a service, then we only have one place to deploy the HSMs, and can get it right. In one deployment, the customer went from securing 3 applications with HSMs to over 180 with this model.
Need to make sure that all applications that need cryptography can receive service, but at the same time only provide service to legitimate users
Cryptomathic has built a crypto service gateway (CSG). CSG shares HSMs between applications, helping us get away from silos. this improves utilization of very expensive resources. In this configuration, HSMs can be added and removed, while the service still stays up.
CSG has a crypto firewall that only allows specified commands and by approved card holders, as defined by the security team. The product also focuses on making audit easy. It's in one place and easy to read.
They have created a Crypto query language (CQL), like "DO CODESIGN FROM Dev WITH DATA 01234". This makes it easier for developers to use, encouraging them to use cryptography.
It is possible here to give crypto keys an expiry. The CSG provides all key management and handles key usage policy.
Use key labels, so they ar eeasy to find using CQL. They are implicit.
Overall, there are many more devices coming online and the easier we can make it for developers to do security, the more likely it is to happen.
Customize network configuration in a Golden Image - Many of our customers use golden images of Solaris with fully installed and configured applications to deploy their production systems. They create a gol...