21
数据驱动边缘计算安全 Data Driven Edge Computing Security 吴云坤, 总裁, 360企业安全集团 Yunkun, Wu, President, 360 Enterprise Security

数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

数据驱动边缘计算安全Data Driven Edge Computing Security

吴云坤, 总裁, 360企业安全集团Yunkun, Wu, President, 360 Enterprise Security

Page 2: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

2017物联网安全现状 The Status of IoT Security in 2017

• 未来超过50%的数据需要在网络边缘侧分析、处理与储存!• More than 50% data will be analyzed, processed and storage at the

network Edge

• 商业、消费者和工业之间连接的“事物”数量迅速增长• Number of connected "things“ in commercial, consumer and industries grow

rapidly2015:安装了49亿个物联网端点 4.9B IoT endpoints2020:安装基数增长至204亿 20.4B IoT endpoints

• 物联网安全不是一个“新网络”范式,它需要的是混合方法• IoT security is not a “new network “ paradigm but requires hybrid approaches.

• 工业界和政府活动正在迅速发展和适应 • Industry and government activities are evolving and improving rapidly

• 现实世界的物联网攻击往往击中了主流 • IoT attack hit mainstream

Page 3: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

物联网和边缘计算安全现状:关键且脆弱Status of IoT Edge Computing Security : Critical and Vulnerable

传统防护手段不适用Tradition Protection is no

longer appropriate

资源受限• 计算• 存储

设计时未考虑安全

数量多分布广

环境复杂

安全性差Poor Security Performance

应用在关键领域Critical

Industry

智能交通Smart

transportation

智慧医疗Smart

Healthcare

智慧城市Smart City

智能工厂Smart

Factory

智能电网Smart Grid

• No Design for Security

• Large Quantity• Widely Spread• Complex

Environment

• Limited Hardware Performance(Compute, Storage)

Page 4: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

物联网和边缘计算安全现状:安全事件频发Status of IoT Edge Computing Security : Security incidents occur frequently

• 2015 年 12 月 23 日,乌克兰电力网络受到攻击,导致伊万诺-弗兰科夫斯克州大停电,成为全世界第一起黑客攻击造成电网大规模停电事件

• Ukraine Ivano-Frankivsk State was power off because of the attack of power grid, which was the 1st massive attack to power utilities in the world

• 2016年10月22日, Mirai病毒将数百万路由器、智能摄像头当做“肉鸡”向美国域名服务器管理机构Dyn发动大规模的 DDos (分布式拒绝服务)攻击,致使美国互联网大面积瘫痪。2017年10月,360又发现类似病毒IoT_Reaper,破坏力更大

• On Oct. 22, 2016, the Mirai virus put millions of routers and smart cameras as "broilers" on a massive DDoS attack on the U.S. DNS server Dyn, causing widespread disruptions.

• 2015年6月,360安全专家公开展示了利用某汽车厂商云服务漏洞,可以开启汽车的车门、发动汽车、开启后备箱等操作,后续公布了破解特斯拉等车型的演示案例

• 360 Security experts announced that they can open the doors, start the engine through the vulnerabilities of an automobile vendor’s Cloud Service in June 2015, and soon released the cases of cracking Tesla.

Page 5: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

网络安全新常态New Normal of Network Security

漏洞产业化

军火民用化

应急小时化

安全法制化

重保常态化

攻击复杂化

Vulnerability Industrialization

Civilian use of Munitions

Emergency Response within an Hour

Legalization of Security

Normalization of Critical Safeguard

Attack is becoming Complicated

Page 6: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

四个假设 Four hypotheses

360专项态势感知—永恒之蓝传播态势:中国

假设① 系统一定有未被发现的漏洞The system must have undiscovered vulnerabilities

假设② 一定有已发现但未修补的漏洞There must be discovered but not patched vulnerabilities

假设③ 系统已经被渗透The system has been infiltrated

假设④ 内部人员不可靠Insiders are not reliable

Page 7: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

网络安全能力的叠加演进 Overlay Evolution of Network Security Capabilities

依赖

进化

• 安全体系• 安全域• 安全加固• 补丁管理• 应用内建

• 传统安全• 收缩攻击面• 消耗攻击资

源• 迟滞攻击

• 安全分析• 追踪溯源• 响应处置• 人的参与

• 信息收集• 情报生产• 分析验证• 情报猎捕

• 法律手段• 反制措施• 自我防卫

架构安全 被动防御 积极防御 威胁情报 进攻反制强身健体Strengthen the Body

纵深防御Defense in

Depth

检测响应Detection

& Response

掌握敌情Know the

Intelligence

先发制人Preemptive

降低平均检测时间(MTTD)/ 平均响应时间(MTTR)Reduce the Mean Time to Detect(MTTD), Reduce the Mean Time to Response(MTTR)

Dependency Evolution

Page 8: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

通过Internet或者无线网络攻击Attack through Internet or

Wireless Network

可以通过本地无线网络或者物理篡改进行攻击

Attack through Local Wireless Network or

Physical Temper

风险聚集Risks Accumulation

防护能力较弱Poor Protection Capabilities

传感器 Sensors加速器 Acceleraters

物 Things

集成控制器Integrated Controller

企业Enterprises

通过本地无线网络或者用户、终端进行攻击

Attack through Local Wireless Network, Users or Endpoints

边缘Edge IoT平台Platform

物联网和边缘计算安全现状:攻击路径分析Status of IoT Edge Computing Security : Attack path Analysis

Page 9: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

风险聚集Risks Accumulation

传感器 Sensors加速器 Acceleraters

物 Things

集成控制器Integrated Controller

企业Enterprises边缘Edge IoT平台Platform

物联网和边缘计算安全现状:防护措施Status of IoT Edge Computing Security : Protection Methods

建立安全运营中心 SOC构建安全监测和响应能力 Detection

and Response Capabilities

终端准入 Access Control持续监测 Continuous Detection设备自身安全 Device Security

轻量级加密 Lightweight Encription

企业级安全解决方案威胁情报和态势感知Threat Intelligence and Situation

Awareness动态监测与持续响应

Dynamic Detection and Continuous Response

Page 10: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

• 外部数据• 本地数据

Drive is the means Security is the Target

数据驱动安全创新理念 Data Driven Security Innovation Concept

数据驱动安全也适用于边缘计算安全Data driven security is also applicable to edge computing security

Data is the Foundation

Page 11: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

安全运营平台 SOC大数据安全分析

Big-Data Security Analyze

应急响应中心 ERC创新的安全服务

Innovated Security Services

态势感知系统Situation Awareness

System

威胁情报中心Threat Intelligence

Center

数据

Data

情报

Intelligence

数据驱动的边缘计算协同联动防御体系Data driven edge computing collaborative linkage defense system

边缘计算安全领域 Edge Computing Security

Page 12: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

数据驱动安全2.0Data Driven Security 2.0

Operating MechanismMan-machine Collaboration

Technical mechanismProduct Collaboration

Capacity Mechanism Data Collaboration

Security

Operatio

n

Security Training

Security Training

Page 13: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

人是安全问题的根源,也是安全运营的核心People are the root of Security problems, and are also the core of Security operation

安全问题

的根源The root of security

problems

安全运营

的核心The core of security

operation

安全本质是人与人的对抗The essence of security is the confrontation between people

黑客

APT组织

内部员工

外包人员

安全运维人员

安全分析人员

安全咨询人员

攻防研究人员

hackers

APT organization

Internal employees

Outsourcing personnel

Safety operation and maintenance personnel

Security analyst

Security consultant

Offensive and defensive researchers

Page 14: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

72小时应急响应中人的作用The role of human in 72 hour emergency response

• 1500+安全应急响应人员• 安全工程师上门紧急响应

• 1700+客户机构的现场支持• 监管机构、部委、金融机构、大型央企

• 2000+客户机构的电话支持

• 5000+工具U盘或光盘

• 9个版本安全预警通告

• 7个安全修复指南文档• 操作指南、事件百问、开机手册等

• 6个安全软件修补工具• 补丁、扫描、修复、解密多类别工具

• 人均睡眠时间<4小时

Page 15: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

面临的挑战:两个失效定律The Challenge: two Laws of Failure

数据驱动的产品协同

Data Driven Product collaboration

技术机制

人为核心的安全运营

Human Centered Security

Operation

运营机制

大协同Great synergy

没有人员参与运营的技术机制一定会失效

没有技术手段保障的运营机制一定会失效

• 安全能力的不足• Deficiency of security capability

• 安全人才的缺乏• Lack of security personnel

• 检测分析手段的缺乏• Lack of detection and analysis methods• 响应处置的高效闭环• Efficient closed loop for response processing

Page 16: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

安全大数据是构建安全能力平台的基础Security Big Data is the Foundation of Building Security Capability Platform

360云端安全能力平台

威胁情报中心Threat Intelligence Center

安全运营中心Safe operation center

云查杀平台Cloud killing platform

应急响应中心Emergency response center

网站云监测Website cloud monitoring

网站云防御Website cloud defense

Page 17: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

数据驱动的创新安全运营服务Data Driven Innovative Security Operations Services

360云端安全能力平台360 cloud security capability platform

安全赋能

Page 18: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

汇聚互联网安全攻防人才的力量Gather the power of Internet security attack and defense personnel

补天漏洞响应平台企业

政府白帽

解决网络安全隐患培养网络安全人才

全社会

漏洞安全 协同白帽

提高安全防护能力

引导青少年正向成长

公益 开放 协同

永久保护漏洞信息

36082已注册白帽子数量

Solve network security risks and cultivate cyber security talent

Page 19: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

网络安全人才培养与实训Network security personnel training and training

多维的教学内容

丰富的专业教材

先进的安全设备

前沿的安全技术

开放的综合实训

多维的育人体系

完整的知识架构

准确的职业解析

实用的技能训练

优质的就业推荐

多维的合作方式

专业与实验室建设

安全师资培训

合作科研团队

技能认证与竞赛

360安全创新中心360 Security Innovation Center

大数据协同安全国家工程实验室National Engineering Laboratory for

cooperative safety of big data

校企合作 – 360网络空间安全学院School enterprise cooperation - 360 Network Security Institute

★强大的品牌影响 Strong brand influence

★领先的安全能力Leading security capability

★成熟的安全产品Mature security products

★完善的认证体系Perfect certification system

Page 20: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

万物智联, 是安全的尺度

Wisdom Alliance, people are safe standards

Page 21: 数据驱动边缘计算安全 Data Driven Edge Computing Security · 2017-12-05 · Status of IoT Edge Computing Security : Security incidents occur frequently • 2015 年 12 月

谢 谢 Thank You