Industrial Internet Security Framework v 1.0 | Page 75

Security Framework 8: Protecting Endpoints A common data integrity technique to detect alteration is the digital signature. The digital signature uses a secret or a private key to generate cryptographic signatures that record what the actual data was at the time of signing. This enables anyone to validate the integrity of the signed data at any point in the future, but requires more runtime processing effort to implement the cryptographic functions. Ideally, the signing key is kept in protected storage such as an HRoT, and the signing operation is performed in a TEE such as a TPM. Applying digital signatures provides stronger integrity than hashing. In addition, since any party can validate the data, common security operations, such as software and firmware updates, can validate the integrity of the update prior to applying it. Also, configuration files and log files on the endpoint can be verified to ensure their integrity at any point in the future. 8.9 ENDPOINT MONITORING AND ANALYSIS Monitoring mechanisms should also be protected. Endpoint monitoring concerns itself with detection of possible tampering with or compromise of devices, which would result in incorrect reporting of events. Monitoring of the endpoint security status may be performed internally on the endpoint or may be performed externally to the endpoint. Monitoring of least-capable edge devices will most likely be executed from another endpoint in the operational domain. 8.10 ENDPOINT CONFIGURATION AND MANAGEMENT The endpoint must provide secure and controlled changes to the endpoint components, though in some rare cases no security is desired. All updates and changes should be signed, their payload encrypted and actions logged for subsequent auditing and recovery of the endpoint. These services should be provided non-intrusively to the operational functionality and have a separate logical connectivity to system-level configuration management and control. 8.11 CRYPTOGRAPHY TECHNIQUES FOR ENDPOINT PROTECTION Cryptography is the discipline that embodies principles, means, and mechanisms for the transformation of data in order to hide its information content, prevent its undetected modification and prevent its unauthorized use. Cryptography is used to perform a number of security operations at the endpoint. Providing an in-depth description of cryptographic techniques and algorithms is out of scope of this document. The following information clarifies some concepts and is included for completeness. Endpoints must always use standard cryptographic algorithms. These algorithms should be implemented utilizing safe-coding practices, and whenever possible, with libraries that are updated and maintained regularly. Creating cryptographic algorithms without a public evaluation should be avoided. In addition, keys must be random, not predictable, and of sufficient length to preclude brute force or exhaustive searches of the available key space. Two classes of random-number generators (RNG) are commonly used: deterministic and non-deterministic. Deterministic RNG (also called Pseudorandom Number Generators) use a secret starting value, called a seed, to initialize the generation algorithm, while non-deterministic RNG depend on some unpredictable IIC:PUB:G4:V1.0:PB:20160926 - 75 -