SlideShare a Scribd company logo
Sponsored by:
authenticatecon.com
FIDO Alliance
Solving the IOT Onboarding Challenge
Speaker
Month 0X, 2020
© FIDO Alliance 2021
The FIDO Alliance brings together the world’s leading
technology companies to develop and promote the adoption
of a standardized, simpler, and more secure online experience
that installs trust and confidence in a digital world.
2
© FIDO Alliance 2021
Track record of successful collaboration
3
Growing Platform Support
Hello
3 Sets of Specs Released
Increasing Market Adoption
© FIDO Alliance 2021
4
How long does it take
to manually onboard1 10,000
Gateways, Devices, Sensors?
Answer:
Over 2-man years2
1. Assumes out-of-box to securely streaming data to an IoT Platform
2. Kaiser Associates Research and Analysis, IoT study, August 2017

Recommended for you

Securing a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web AuthenticationSecuring a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web Authentication

This document provides instructions for implementing passwordless authentication for a web application using WebAuthn and FIDO2 security keys. It describes setting up a sample Spring Boot web app with traditional username/password authentication and then enhancing it with passwordless authentication. The workshop is split into modules, with this module focusing on implementing the authentication REST endpoints and updating the UI to allow passwordless sign-in. It provides code examples and diagrams to explain how the authentication flow works when a user attempts to sign in using a previously registered security key.

seoul seminar 2019
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise

Passwords are archaic, and a danger to enterprise security. Now the accepted standard for multi-factor authentication (MFA), FIDO Authentication can be deployed in the enterprise for easier and secure access to corporate networks, applications, and workstations. Organizations that adopt FIDO will experience profound improvements in security, helpdesk costs, user experience, and productivity. But where to start? Attend this webinar to learn about considerations for deploying FIDO in the enterprise, including how to gradually rollout FIDO authentication and select the right authenticators and the right server policies for the right user cases. This webinar will provide essential education for any organization that wants to get started on eliminating passwords and securing the simple act of logging on within their company.

2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装

This document summarizes LINE's deployment of FIDO2 authentication for its LINE Pay service. It discusses how passwords are insecure and the root of many breaches. FIDO2 provides a stronger alternative using public/private key attestation and is designed to be privacy-preserving. LINE joined the FIDO Alliance in 2017 and certified its universal server in 2018. It has implemented FIDO2 authentication flows for iOS using Touch ID/Face ID and for Android. Future plans include expanding FIDO2 to more financial services and LINE applications to encourage password-less authentication.

line corporationlinefido2
© FIDO Alliance 2021
The Onboarding Challenge
5
• Wide variety of IOT devices – hardware and Operating Systems
• Most devices headless (i.e. don’t have displays)
• Different connectivity – wired / wireless
• Manual installation adds cost and time to IOT deployments, impacting program ROI
• Manual installation requires trusted and skilled staff
© FIDO Alliance 2021
Onboarding solutions exist today, but don’t fully meet the needs of the industry
• Manual onboarding
• Slow
• insecure,
• Expensive
• Automated ‘zero touch’
• Linked to one cloud/platform
• Only one silicon provider
• Require programming of target platform/cloud/user at manufacture
Onboarding solutions today
6
© FIDO Alliance 2021
The FIDO Alliance launched
the IoT Technical Working
Group (IoT TWG) in June
2019 - members include
leading Cloud Service
Providers, semiconductor
manufacturers, security
specialists and OEMs.
The IoT TWG analyzed
multiple use cases, target
architectures and
specifications to develop as
clear set of requirements.
Intel contributed their
Secure Device Onboard
specification, which served
as the starting point for
FIDO’s IoT work - the TWG
modified and extended the
initial specification to meet
the defined requirements.
FIDO’s Approach to Secure IoT
7
© FIDO Alliance 2021
Aligning FIDO IOT to Use Case and Ecosystem
8
CSP & On-prem
Support
IoT Platform
ISV Suite
Silicon/device
Ecosystem
SI Ready
Connectivity
Support
Use cases where FIDO IOT delivers maximum value
• Industrial and Enterprise devices:
Gateways, servers, sensors, actuators, control systems, medical, etc.
• Multi-ecosystem applications and services:
not tied to specific cloud/platform framework
• Distributor sales:
deliver from stock, specify binding info after sale to customer
• Device resale / redeploy:
reset to factory conditions repeat onboarding process with new credentials

Recommended for you

2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords

View the 2019 FIDO Seoul Seminar session slides to discover how the future is moving to a passwordless world.

seoul seminar 2019
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations

This paper depicts three possible scenarios for integrating FIDO UAF and public key infrastructure (PKI) in Asian countries, along with recommendations for how the two technologies can work together to bring innovation to the authentication marketplace and to pave the way for deploying better authentication solutions to the public.

public key infrastructurefido alliancefido
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification

The FIDO Certified program is a core activity of the FIDO Alliance that underpins the B2B FIDO ecosystem of interoperable products and services. A growing majority of service providers are specifying FIDO Certified products in their RFPs as they are seeking the benefits of having a standards-based and future-proof foundation for user authentication. Beyond those core benefits, we’re seeing growing use cases and demand for more advanced Certified Authenticators – as well as in FIDO’s biometric component certification program, which is a useful mechanism for assessing how well biometric products perform against industry standard metrics. Are you thinking about developing FIDO products and getting certified? Are you a service provider wondering what FIDO Certified means for you? Are you just wondering what the different certification programs are and how they relate to each other? View the presentation.

© FIDO Alliance 2021
Fast, Scalable Device Provisioning, Onboarding &
Activation
9
Drop ship device to
installation location
Power-up & connect
to Network
Auto-provisions, Onboards
to Cloud
BENEFITS1
• Zero touch onboarding – integrates readily with existing zero touch solutions
• Fast & more secure1 – ~1 minute
• Hardware flexibility – any hardware (from ARM MCU to Intel® Xeon® processors)
• Any cloud – internet & on-premise
• Late binding - of device to cloud greatly reduces number of SKUs vs. other zero touch
offerings
• Open - LF-Edge SDO project up and running, code now on GitHub
9
1. No product or component can be absolutely secure
© FIDO Alliance 2021
Late binding reduces costs & complexity in supply chain – a single device SKU for all customers
Build-to-order
FIDO Device Onboard: Late Binding in Supply Chain
10
Customer 1
Custom SKUs
Custom SKUs
Custom SKUs
FDO Late Binding
Device Identity
Manufacturing Infrastructure
Manufacturing Infrastructure
Binding info
Devices
Customer 2
Devices
Customer n
Devices
Zero Touch without FDO
IoT device software and security customization
happens during manufacturing
Benefits: Simplified build-to-plan manufacturing
infrastructure, fewer SKUs, large lot sizes, enable stocking
distributors, low customization cost
Result: Increased supply chain volume and velocity
IoT Device Supply Chain
Single SKU
Build-to-plan
IoT Device Supply Chain
Customer 1
Devices
Customer 2
Devices
Customer n
Devices
Result: Complicated build-to-order manufacturing
infrastructure, many SKUs, small lot sizes, long lead times,
higher cost
Zero Touch with FDO
IoT device software and security customization
happens at the end of the supply chain
© FIDO Alliance 2021
11
Provisioning with FDO
Device Manufacturer Device Recipient
2
3
Load Ownership
Voucher at
Procurement
Device
6
1011
Build and Ship FDO
IOT
Enabled Devices
1
Register Ownership
to Target Platform
2
Register Device to
Rendezvous Service
3
Devices use FDO to
find owner location
4 Devices
Authenticated and
Provisioned
5
Devices send sensor
data to IoT Platform
6
5
Late Binding
Provisioning
1
Single SKU –
Multiple Target clouds
Registration
Discovery 4
Target Cloud
(Device Management
System) with integrated
FDO Owner
Rendezvous
service
IOT Device power on
10
01
01
11
00
10
01
01
11
00
10
01
01
11
00
Cloud Managed,
IoT data flows
Ownership
Voucher
Device manufacture – supply chain Device deployed
Device power on
© FIDO Alliance 2021
Processor
e.g. Intel, Arm
VARs
Distribution SI
Manufacturing Tool
(includes supply chain
tools)
Client for Arm, Intel,
other processors and
TPM
FDO Owner
(IoT Platform SDK)
Rendezvous server
(runs on Cloud or customer
premise)
FDO – Major Software Components
IOT Device
Reseller tool
IN
T
E
L
®
S
E
C
U
R
E
D
E
V
IC
E
O
N
B
O
A
R
D
FDO
Rendezvous
Server
Target Cloud
(Internet or on-premise)
2
1
5
3
4

Recommended for you

FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft

Presented at FIDO Authentication Seminar – Tokyo By: Anthony Nadalin, Chief Security Architect, Microsoft; Co-Chair, FIDO2 Technology Working Group

microsoftfido2standards
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance

The Second Payment Services Directive (PSD2) and the associated Regulatory Technical Standards (RTS) on strong customer authentication and secure communication impose stringent requirements on multi-factor authentication and on the security of implementations. Payment Service Providers will want to know whether the authentication solutions they put in place conform to the RTS both in terms of functionality and security. The FIDO Alliance standards are based on multi-factor authentication and are a strong fit for PSD2 compliance. The FIDO Alliance’s certification program provides an independent evaluation of functional compliance to the standards as well as of the achieved level of security of FIDO authenticators. Featuring industry experts, this presentation explores how FIDO can resolve key issues, including: • How the FIDO standards conform to the RTS • How FIDO’s certification program guarantees this conformity • How FIDO’s certification program provides for the mandatory security evaluation imposed by the RTS

fido alliancefidofido authentication
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification

A look at FIDO Certification program, including functional, authenticator and biometric; the value of certification for relaying parties and vendors, and how to get started.

fido alliancefidofido certified
© FIDO Alliance 2021
FDO/SDO: LF-Edge project & Open Source
13
The LF Edge Project is an open source implementation
of the FDO onboarding specification as a reference/gold
implementation.
https://www.lfedge.org/projects/securedeviceonboard/
 Status
• LF Edge accepted Secure Device Onboard as a Phase 1 (At Large) project
• Project now active on LF-Edge web site.
• Code now Open Source https://github.com/secure-device-onboard
• Protocol testing release of FDO RD01; production release of FDO 1.0 2H21
© FIDO Alliance 2021
Continue to build industry awareness and tracktion with members, liaison
partners, and industry outreach (OEMs, ODMs etc.).
Launch FDO certification programs later this year.
• Functional certification testing
• Security certification testing
Continue work on v.next based on implementation feedback and to
address additional requirements
Next Steps
14
© FIDO Alliance 2021
• FIDO has an established security certification program for existing FIDO
authenticator specifications (UAF, U2F, FIDO 2.0/Webauthn)
• Levels that correspond to achievable security assurance
• L1 – based on vendor questionnaire
• SW authenticators, e.g. from an app store
• L2 – design documentation submitted by vendor and assessed by 3rd-party certification lab
• Authenticators developed in a trusted SW environment
• L3 – sample device submitted to 3rd-party lab for verification of design and additional
penetration testing
• Authenticators instantiated in a secure element
Certification and Security
15
© FIDO Alliance 2021
• Multiple security certification levels also appropriate for IoT devices, given large
scope of achievable levels of security assurance
• Simple devices with
• Limited crypto capabilities
• No isolation of HW/SW required for security functionality
• More complex devices
• Advanced crypto capabilities (comparable to smartphones or PC’s)
• Isolation of security-impacting SW
• Special purpose HW for all secure operations related to onboarding
Certification (cont.)
16

Recommended for you

The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System

Eleanor Weaver and Simon Fellows presented on Darktrace, an artificial intelligence cybersecurity company that provides self-learning cyber defense systems. Darktrace's systems can passively learn normal operations without maintenance and detect threats across OT, IT, and IoT networks. The systems are protocol and technology agnostic, providing full visibility without needing to understand individual network configurations or protocols. Traditional security approaches like baselining lack context to distinguish normal operations from attacks and cannot detect existing compromises. Darktrace uses case studies to demonstrate how its systems have detected complex ransomware infections and external reconnaissance efforts on critical infrastructure networks.

machine learningaicyberai
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations

The document discusses modern authentication and Nok Nok Labs' role in pioneering this area. It notes that Nok Nok Labs invented modern authentication, founded and led the FIDO Alliance, and has deployed authentication solutions for major markets. The document promotes the benefits of leveraging modern authentication, such as improved customer experience, higher retention and satisfaction, and reduced fraud and costs. It argues that authentication, security, and privacy will be vital for society with the rise of cloud services, IoT, and other technologies.

fido alliancefidofido authentication
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell

- The document summarizes a presentation given by Brett McDowell, Executive Director of the FIDO Alliance, about updates to the FIDO Alliance and passwordless authentication standards. - It highlights growing issues with passwords like high costs of password resets for organizations and high rates of password-related data breaches and phishing attacks. - The FIDO Alliance is working to solve the password problem through open authentication standards based on public key cryptography that eliminate the reliance on shared secrets and enable strong, phishing-resistant multi-factor authentication with a single gesture. - New developments include FIDO specifications becoming ITU and W3C standards, a growing number of FIDO2 certified products

fido alliancefidofido2
© FIDO Alliance 2021
• FIDO is developing interoperability and security certification programs
• Anticipated rollout before end of year, 2021
• FIDO security certification will be assessed against regional regulatory
requirements
• Existing FIDO security certification leverages ‘companion’ programs
• e.g Common Criteria Protection Profiles
• FIDO will expects to leverage existing IoT security certification programs as
potential companion programs
Certification (cont.)
17
© FIDO Alliance 2021
• FDO addresses the challenge of secure device onboarding – a key to the growth
of the IoT.
• The FIDO Alliance has a successful track record of bringing standards to market.
• The FIDO Alliance IoT WG has delivered an industry specification (FDO) based
on the joint efforts of Cloud, Semiconductor and Security leaders.
• LF Edge has made an open source version available: see https://secure-device-
onboard.github.io/docs-fidoiot/latest/
• Certification programs are progressing well
• Interested companies can review the FDO specification and evaluate the
software today!
Summary
18
Thank you.
Sponsored by:

More Related Content

What's hot

Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
Rob Dudley
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
FIDO Alliance
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
FIDO Alliance
 
Securing a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web AuthenticationSecuring a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web Authentication
FIDO Alliance
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
FIDO Alliance
 
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
FIDO Alliance
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
FIDO Alliance
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO Alliance
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification
FIDO Alliance
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
FIDO Alliance
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO Alliance
 
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
FIDO Alliance
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
Justin Hayward
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
FIDO Alliance
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
FIDO Alliance
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
FIDO Alliance
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
FIDO Alliance
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
FIDO Alliance
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
OWASP Delhi
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
FIDO Alliance
 

What's hot (20)

Go passwordless with fido2
Go passwordless with fido2Go passwordless with fido2
Go passwordless with fido2
 
FIDO Authentication Technical Overview
FIDO Authentication Technical OverviewFIDO Authentication Technical Overview
FIDO Authentication Technical Overview
 
The Value of FIDO Certification
The Value of FIDO CertificationThe Value of FIDO Certification
The Value of FIDO Certification
 
Securing a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web AuthenticationSecuring a Web App with Passwordless Web Authentication
Securing a Web App with Passwordless Web Authentication
 
Webinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the EnterpriseWebinar: Considerations for Deploying FIDO in the Enterprise
Webinar: Considerations for Deploying FIDO in the Enterprise
 
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
2019 FIDO Tokyo Seminar - LINE PayへのFIDO2実装
 
2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords2019 FIDO Seoul Seminar - Moving Beyond Passwords
2019 FIDO Seoul Seminar - Moving Beyond Passwords
 
FIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and RecommendationsFIDO UAF and PKI in Asia: A Case Study and Recommendations
FIDO UAF and PKI in Asia: A Case Study and Recommendations
 
Ask FIDO About Anything: Certification
Ask FIDO About Anything: CertificationAsk FIDO About Anything: Certification
Ask FIDO About Anything: Certification
 
FIDO2 & Microsoft
FIDO2 & MicrosoftFIDO2 & Microsoft
FIDO2 & Microsoft
 
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication ComplianceFIDO & PSD2 – Achieving Strong Customer Authentication Compliance
FIDO & PSD2 – Achieving Strong Customer Authentication Compliance
 
FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification FIDO Certified Program: The Value of Certification
FIDO Certified Program: The Value of Certification
 
The Industrial Immune System
The Industrial Immune SystemThe Industrial Immune System
The Industrial Immune System
 
Deploying FIDO Authentication - Business Considerations
Deploying FIDO Authentication  - Business ConsiderationsDeploying FIDO Authentication  - Business Considerations
Deploying FIDO Authentication - Business Considerations
 
2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell2018 12-07 tokyo-seminar Brett McDowell
2018 12-07 tokyo-seminar Brett McDowell
 
FIDO and Adaptive Authentication
FIDO and Adaptive AuthenticationFIDO and Adaptive Authentication
FIDO and Adaptive Authentication
 
FIDO Privacy Principles and Approach
FIDO Privacy Principles and ApproachFIDO Privacy Principles and Approach
FIDO Privacy Principles and Approach
 
FIDO Alliance Today: Status and News
FIDO Alliance Today: Status and NewsFIDO Alliance Today: Status and News
FIDO Alliance Today: Status and News
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
 
Webinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO AuthenticationWebinar: Securing IoT with FIDO Authentication
Webinar: Securing IoT with FIDO Authentication
 

Similar to Solving the IoT Challenge

Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
FIDO Alliance
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
FIDO Alliance
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
Dell EMC World
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
Marco Dal Pino
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
Onward Security
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
Source Code Control Limited
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
FitzgeraldSungkyungP
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot system
Marco Dal Pino
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
Eurotech
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
sierradeveloper
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
FIDO Alliance
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
Laird Connectivity
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
FIDO Alliance
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
Microsoft
 
IOT Software Development Company.pdf
IOT Software Development Company.pdfIOT Software Development Company.pdf
IOT Software Development Company.pdf
Nishaadequateinfosof
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
Onward Security
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
Eurotech
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
Eurotech
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
TechWell
 

Similar to Solving the IoT Challenge (20)

Introducing FIDO Device Onboard (FDO)
Introducing  FIDO Device Onboard (FDO)Introducing  FIDO Device Onboard (FDO)
Introducing FIDO Device Onboard (FDO)
 
FIDO Masterclass
FIDO MasterclassFIDO Masterclass
FIDO Masterclass
 
MT82 IoT Security Starts at Edge
MT82  IoT Security Starts at EdgeMT82  IoT Security Starts at Edge
MT82 IoT Security Starts at Edge
 
Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)Build an azure connected io t device in 45 minutes (or less)
Build an azure connected io t device in 45 minutes (or less)
 
国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析国际物联网安全标准与认证大解析
国际物联网安全标准与认证大解析
 
Supply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoTSupply Chain Security and Compliance for Embedded Devices & IoT
Supply Chain Security and Compliance for Embedded Devices & IoT
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Intel_IoT_gateway.pdf
Intel_IoT_gateway.pdfIntel_IoT_gateway.pdf
Intel_IoT_gateway.pdf
 
IoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot systemIoTSummit: Design and architect always disconnected iot system
IoTSummit: Design and architect always disconnected iot system
 
How to bootstrap your IoT project
How to bootstrap  your IoT projectHow to bootstrap  your IoT project
How to bootstrap your IoT project
 
Rapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wirelessRapid industrial grade IoT prototyping with sierra wireless
Rapid industrial grade IoT prototyping with sierra wireless
 
Market Study on Mobile Authentication
Market Study on Mobile AuthenticationMarket Study on Mobile Authentication
Market Study on Mobile Authentication
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 
Enterprise Mobility (Admin)
Enterprise Mobility (Admin)Enterprise Mobility (Admin)
Enterprise Mobility (Admin)
 
IOT Software Development Company.pdf
IOT Software Development Company.pdfIOT Software Development Company.pdf
IOT Software Development Company.pdf
 
The Present and Future of IoT Cybersecurity
The Present and Future of IoT CybersecurityThe Present and Future of IoT Cybersecurity
The Present and Future of IoT Cybersecurity
 
Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation Developing Interoperable Components for an Open IoT Foundation
Developing Interoperable Components for an Open IoT Foundation
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Securing your IoT Implementations
Securing your IoT ImplementationsSecuring your IoT Implementations
Securing your IoT Implementations
 

More from FIDO Alliance

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
FIDO Alliance
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
FIDO Alliance
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptx
FIDO Alliance
 
Workshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxWorkshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptx
FIDO Alliance
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
FIDO Alliance
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
FIDO Alliance
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
FIDO Alliance
 

More from FIDO Alliance (7)

Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptxMaking FIDO Deployments Accessible to Users with Disabilities_slides.pptx
Making FIDO Deployments Accessible to Users with Disabilities_slides.pptx
 
Welcome and FIDO Update.pptx
Welcome and FIDO Update.pptxWelcome and FIDO Update.pptx
Welcome and FIDO Update.pptx
 
CISA - More Than A Password.pptx
CISA - More Than A Password.pptxCISA - More Than A Password.pptx
CISA - More Than A Password.pptx
 
Workshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptxWorkshop-Demo Breakdown.pptx
Workshop-Demo Breakdown.pptx
 
IBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptxIBM - Hey FIDO, Meet Passkey!.pptx
IBM - Hey FIDO, Meet Passkey!.pptx
 
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
OTIS - Our Journey to Passwordless: Secure Authn & Frictionless User Experien...
 
The State of Strong Authentication
The State of Strong AuthenticationThe State of Strong Authentication
The State of Strong Authentication
 

Recently uploaded

The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
Larry Smarr
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
ArgaBisma
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
Safe Software
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
rajancomputerfbd
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Bert Blevins
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
Emerging Tech
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Chris Swan
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
RaminGhanbari2
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
ScyllaDB
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
Bert Blevins
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
KAMAL CHOUDHARY
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
BookNet Canada
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
Neo4j
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
Aurora Consulting
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
Liveplex
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
Lidia A.
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
jackson110191
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
Tatiana Al-Chueyr
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
ScyllaDB
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
Yevgen Sysoyev
 

Recently uploaded (20)

The Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU CampusesThe Increasing Use of the National Research Platform by the CSU Campuses
The Increasing Use of the National Research Platform by the CSU Campuses
 
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdfWhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
WhatsApp Image 2024-03-27 at 08.19.52_bfd93109.pdf
 
Coordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar SlidesCoordinate Systems in FME 101 - Webinar Slides
Coordinate Systems in FME 101 - Webinar Slides
 
Choose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presenceChoose our Linux Web Hosting for a seamless and successful online presence
Choose our Linux Web Hosting for a seamless and successful online presence
 
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...
 
Implementations of Fused Deposition Modeling in real world
Implementations of Fused Deposition Modeling  in real worldImplementations of Fused Deposition Modeling  in real world
Implementations of Fused Deposition Modeling in real world
 
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
Fluttercon 2024: Showing that you care about security - OpenSSF Scorecards fo...
 
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyyActive Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
Active Inference is a veryyyyyyyyyyyyyyyyyyyyyyyy
 
Mitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing SystemsMitigating the Impact of State Management in Cloud Stream Processing Systems
Mitigating the Impact of State Management in Cloud Stream Processing Systems
 
Password Rotation in 2024 is still Relevant
Password Rotation in 2024 is still RelevantPassword Rotation in 2024 is still Relevant
Password Rotation in 2024 is still Relevant
 
Recent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS InfrastructureRecent Advancements in the NIST-JARVIS Infrastructure
Recent Advancements in the NIST-JARVIS Infrastructure
 
Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...Transcript: Details of description part II: Describing images in practice - T...
Transcript: Details of description part II: Describing images in practice - T...
 
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdfBT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
BT & Neo4j: Knowledge Graphs for Critical Enterprise Systems.pptx.pdf
 
Quality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of TimeQuality Patents: Patents That Stand the Test of Time
Quality Patents: Patents That Stand the Test of Time
 
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALLBLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
BLOCKCHAIN FOR DUMMIES: GUIDEBOOK FOR ALL
 
WPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide DeckWPRiders Company Presentation Slide Deck
WPRiders Company Presentation Slide Deck
 
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfINDIAN AIR FORCE FIGHTER PLANES LIST.pdf
INDIAN AIR FORCE FIGHTER PLANES LIST.pdf
 
Best Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdfBest Practices for Effectively Running dbt in Airflow.pdf
Best Practices for Effectively Running dbt in Airflow.pdf
 
Measuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at TwitterMeasuring the Impact of Network Latency at Twitter
Measuring the Impact of Network Latency at Twitter
 
DealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 editionDealBook of Ukraine: 2024 edition
DealBook of Ukraine: 2024 edition
 

Solving the IoT Challenge

  • 1. Sponsored by: authenticatecon.com FIDO Alliance Solving the IOT Onboarding Challenge Speaker Month 0X, 2020
  • 2. © FIDO Alliance 2021 The FIDO Alliance brings together the world’s leading technology companies to develop and promote the adoption of a standardized, simpler, and more secure online experience that installs trust and confidence in a digital world. 2
  • 3. © FIDO Alliance 2021 Track record of successful collaboration 3 Growing Platform Support Hello 3 Sets of Specs Released Increasing Market Adoption
  • 4. © FIDO Alliance 2021 4 How long does it take to manually onboard1 10,000 Gateways, Devices, Sensors? Answer: Over 2-man years2 1. Assumes out-of-box to securely streaming data to an IoT Platform 2. Kaiser Associates Research and Analysis, IoT study, August 2017
  • 5. © FIDO Alliance 2021 The Onboarding Challenge 5 • Wide variety of IOT devices – hardware and Operating Systems • Most devices headless (i.e. don’t have displays) • Different connectivity – wired / wireless • Manual installation adds cost and time to IOT deployments, impacting program ROI • Manual installation requires trusted and skilled staff
  • 6. © FIDO Alliance 2021 Onboarding solutions exist today, but don’t fully meet the needs of the industry • Manual onboarding • Slow • insecure, • Expensive • Automated ‘zero touch’ • Linked to one cloud/platform • Only one silicon provider • Require programming of target platform/cloud/user at manufacture Onboarding solutions today 6
  • 7. © FIDO Alliance 2021 The FIDO Alliance launched the IoT Technical Working Group (IoT TWG) in June 2019 - members include leading Cloud Service Providers, semiconductor manufacturers, security specialists and OEMs. The IoT TWG analyzed multiple use cases, target architectures and specifications to develop as clear set of requirements. Intel contributed their Secure Device Onboard specification, which served as the starting point for FIDO’s IoT work - the TWG modified and extended the initial specification to meet the defined requirements. FIDO’s Approach to Secure IoT 7
  • 8. © FIDO Alliance 2021 Aligning FIDO IOT to Use Case and Ecosystem 8 CSP & On-prem Support IoT Platform ISV Suite Silicon/device Ecosystem SI Ready Connectivity Support Use cases where FIDO IOT delivers maximum value • Industrial and Enterprise devices: Gateways, servers, sensors, actuators, control systems, medical, etc. • Multi-ecosystem applications and services: not tied to specific cloud/platform framework • Distributor sales: deliver from stock, specify binding info after sale to customer • Device resale / redeploy: reset to factory conditions repeat onboarding process with new credentials
  • 9. © FIDO Alliance 2021 Fast, Scalable Device Provisioning, Onboarding & Activation 9 Drop ship device to installation location Power-up & connect to Network Auto-provisions, Onboards to Cloud BENEFITS1 • Zero touch onboarding – integrates readily with existing zero touch solutions • Fast & more secure1 – ~1 minute • Hardware flexibility – any hardware (from ARM MCU to Intel® Xeon® processors) • Any cloud – internet & on-premise • Late binding - of device to cloud greatly reduces number of SKUs vs. other zero touch offerings • Open - LF-Edge SDO project up and running, code now on GitHub 9 1. No product or component can be absolutely secure
  • 10. © FIDO Alliance 2021 Late binding reduces costs & complexity in supply chain – a single device SKU for all customers Build-to-order FIDO Device Onboard: Late Binding in Supply Chain 10 Customer 1 Custom SKUs Custom SKUs Custom SKUs FDO Late Binding Device Identity Manufacturing Infrastructure Manufacturing Infrastructure Binding info Devices Customer 2 Devices Customer n Devices Zero Touch without FDO IoT device software and security customization happens during manufacturing Benefits: Simplified build-to-plan manufacturing infrastructure, fewer SKUs, large lot sizes, enable stocking distributors, low customization cost Result: Increased supply chain volume and velocity IoT Device Supply Chain Single SKU Build-to-plan IoT Device Supply Chain Customer 1 Devices Customer 2 Devices Customer n Devices Result: Complicated build-to-order manufacturing infrastructure, many SKUs, small lot sizes, long lead times, higher cost Zero Touch with FDO IoT device software and security customization happens at the end of the supply chain
  • 11. © FIDO Alliance 2021 11 Provisioning with FDO Device Manufacturer Device Recipient 2 3 Load Ownership Voucher at Procurement Device 6 1011 Build and Ship FDO IOT Enabled Devices 1 Register Ownership to Target Platform 2 Register Device to Rendezvous Service 3 Devices use FDO to find owner location 4 Devices Authenticated and Provisioned 5 Devices send sensor data to IoT Platform 6 5 Late Binding Provisioning 1 Single SKU – Multiple Target clouds Registration Discovery 4 Target Cloud (Device Management System) with integrated FDO Owner Rendezvous service IOT Device power on 10 01 01 11 00 10 01 01 11 00 10 01 01 11 00 Cloud Managed, IoT data flows Ownership Voucher Device manufacture – supply chain Device deployed Device power on
  • 12. © FIDO Alliance 2021 Processor e.g. Intel, Arm VARs Distribution SI Manufacturing Tool (includes supply chain tools) Client for Arm, Intel, other processors and TPM FDO Owner (IoT Platform SDK) Rendezvous server (runs on Cloud or customer premise) FDO – Major Software Components IOT Device Reseller tool IN T E L ® S E C U R E D E V IC E O N B O A R D FDO Rendezvous Server Target Cloud (Internet or on-premise) 2 1 5 3 4
  • 13. © FIDO Alliance 2021 FDO/SDO: LF-Edge project & Open Source 13 The LF Edge Project is an open source implementation of the FDO onboarding specification as a reference/gold implementation. https://www.lfedge.org/projects/securedeviceonboard/  Status • LF Edge accepted Secure Device Onboard as a Phase 1 (At Large) project • Project now active on LF-Edge web site. • Code now Open Source https://github.com/secure-device-onboard • Protocol testing release of FDO RD01; production release of FDO 1.0 2H21
  • 14. © FIDO Alliance 2021 Continue to build industry awareness and tracktion with members, liaison partners, and industry outreach (OEMs, ODMs etc.). Launch FDO certification programs later this year. • Functional certification testing • Security certification testing Continue work on v.next based on implementation feedback and to address additional requirements Next Steps 14
  • 15. © FIDO Alliance 2021 • FIDO has an established security certification program for existing FIDO authenticator specifications (UAF, U2F, FIDO 2.0/Webauthn) • Levels that correspond to achievable security assurance • L1 – based on vendor questionnaire • SW authenticators, e.g. from an app store • L2 – design documentation submitted by vendor and assessed by 3rd-party certification lab • Authenticators developed in a trusted SW environment • L3 – sample device submitted to 3rd-party lab for verification of design and additional penetration testing • Authenticators instantiated in a secure element Certification and Security 15
  • 16. © FIDO Alliance 2021 • Multiple security certification levels also appropriate for IoT devices, given large scope of achievable levels of security assurance • Simple devices with • Limited crypto capabilities • No isolation of HW/SW required for security functionality • More complex devices • Advanced crypto capabilities (comparable to smartphones or PC’s) • Isolation of security-impacting SW • Special purpose HW for all secure operations related to onboarding Certification (cont.) 16
  • 17. © FIDO Alliance 2021 • FIDO is developing interoperability and security certification programs • Anticipated rollout before end of year, 2021 • FIDO security certification will be assessed against regional regulatory requirements • Existing FIDO security certification leverages ‘companion’ programs • e.g Common Criteria Protection Profiles • FIDO will expects to leverage existing IoT security certification programs as potential companion programs Certification (cont.) 17
  • 18. © FIDO Alliance 2021 • FDO addresses the challenge of secure device onboarding – a key to the growth of the IoT. • The FIDO Alliance has a successful track record of bringing standards to market. • The FIDO Alliance IoT WG has delivered an industry specification (FDO) based on the joint efforts of Cloud, Semiconductor and Security leaders. • LF Edge has made an open source version available: see https://secure-device- onboard.github.io/docs-fidoiot/latest/ • Certification programs are progressing well • Interested companies can review the FDO specification and evaluate the software today! Summary 18