%3CLINGO-SUB%20id%3D%22lingo-sub-1686066%22%20slang%3D%22en-US%22%3ESolving%20IoT%20device%20security%20at%20scale%20through%20standards%3C%2FLINGO-SUB%3E%3CLINGO-BODY%20id%3D%22lingo-body-1686066%22%20slang%3D%22en-US%22%3E%3CP%3ECompanies%20building%20Internet%20of%20Things%20(IoT)%20solutions%20today%20are%20likely%20to%20deploy%20IoT%20applications%20that%26nbsp%3Buse%20unsecured%20devices%2C%20mainly%20because%20they%20cannot%20verify%20the%20security%20claims%20from%20device%20manufacturers.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3ESolution%20builders%20could%20create%20secured%20devices%20themselves.%20They%20tend%20not%20to%20because%20they%20either%20lack%20domain%20expertise%2C%20or%20simply%20prefer%20to%20buy%20devices%20off-the-shelf.%26nbsp%3BDevice%20makers%2C%20on%20the%20other%20hand%2C%20possess%20the%20requisite%20expertise%20to%20secure%20devices%20but%20lack%20the%20ability%20to%20convey%20details.%20For%20example%2C%20language%20constructs%20such%20as%20for%20conveying%20computation%2C%20storage%2C%20and%20power%20profiles%20of%20an%20Industrial%20PC%20(IPC)%2C%20are%20simply%20not%20available%20for%20security.%26nbsp%3B%20Device%20makers%20therefore%20see%20no%20motivation%20to%20invest%20in%20securing%20devices%20if%20they%20can%E2%80%99t%20claim%20the%20value%20and%20hence%20the%20current%20stalemate.%20Our%20studies%20and%20observations%20show%20this%20stalemate%20exists%20for%20two%20reasons%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3ELack%20of%20standards%20guiding%20how%20to%20holistically%20engineer%20and%20claim%20device%20security.%3C%2FLI%3E%0A%3CLI%3ELack%20of%20standards%20guiding%20how%20to%20consume%20and%20verify%20device%20security%20claims.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EGiven%20how%20IoT%20globally%20connects%20solutions%2C%20supply%20chains%2C%20and%20interests%20irrespective%20of%20company%2C%20geography%2C%20or%20governmental%20affiliations%2C%20effectively%20solving%20the%20stalemate%20requires%20global%20openness%20as%20well.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20happy%20to%20announce%20the%20%3CSTRONG%3EEdge%20Compute%20Node%20protection%20profile%3C%2FSTRONG%3E%20(ECN%20PP)%2C%20a%20Common%20Criteria%20(ISO%2015408)%20standard%20that%20will%20guide%20how%20to%20engineer%2C%20claim%2C%20evaluate%2C%20and%20consume%20security%20for%20IoT%20devices.%26nbsp%3B%20We%20build%20on%20Common%20Criteria%20for%20transparency%2C%20cross-industry%20practice%2C%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2Fccra%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Eglobal%20recognition%20arrangements%3C%2FA%3E%2C%20and%20global%20availability%20of%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2Flabs%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Elicensed%20laboratories%3C%2FA%3E.%26nbsp%3B%20Edge%20Compute%20Node%20protection%20profile%2C%20officially%20NSCIB-CC-0112146-CR%2C%20is%20in%20%3CA%20href%3D%22https%3A%2F%2Fwww.tuv-nederland.nl%2Fcommon-criteria%2Fongoing-certifications.html%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3Efinal%20step%20of%20certification%3C%2FA%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%20created%20and%20drove%20development%20of%20ECN%20PP%20here%20at%20Microsoft%20but%20our%20efforts%20were%20immensely%20amplified%20by%20the%20following%20partners%20contributing%20diverse%20expertise%20and%20experience%2C%20and%20for%20whom%20we%E2%80%99re%20very%20grateful.%26nbsp%3B%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20align%3D%22center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22kartben_1-1600708019386.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F220258i222D8C8790F41E86%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22kartben_1-1600708019386.png%22%20alt%3D%22Figure%201%3A%20We%20recognize%20these%20collaborators%20with%20gratitude%20for%20amplifying%20our%20efforts%20with%20their%20diverse%20expertise.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%201%3A%20We%20recognize%20these%20collaborators%20with%20gratitude%20for%20amplifying%20our%20efforts%20with%20their%20diverse%20expertise.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWe%E2%80%99re%20excited%20by%20this%20development%20and%20so%20are%20our%20partners%3A%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CBLOCKQUOTE%3E%0A%3CP%3E%3CEM%3E%E2%80%9CProvenRun%E2%80%99s%20mission%20is%20to%20help%20its%20customers%20resolve%20the%20security%20challenges%20linked%20to%20the%20large-scale%20deployment%20of%20connected%20devices.%20We%20are%20very%20proud%20to%20have%20contributed%20our%20expertise%20into%20this%20mission%20to%20enable%20industry%20motions%20that%20help%20ensure%20all%20IoT%20deployments%20are%20secured-by-design%E2%80%9D%2C%26nbsp%3B%20Dominique%20Bolignano%2C%20CEO%20and%20founder%2C%20ProvenRun.%3C%2FEM%3E%3C%2FP%3E%0A%3C%2FBLOCKQUOTE%3E%0A%3CP%3EWhen%20ready%2C%20device%20makers%20and%20solution%20builders%20can%20freely%20access%20ECN%20PP%20from%20the%20Common%20Criteria%20portal%2C%20and%20later%20view%20list%20of%20ECN%20PP%20certified%20devices.%26nbsp%3B%20We%E2%80%99re%20excited%20to%20see%20how%20ECN%20PP%20co-development%20partners%20are%20already%20putting%20it%20into%20use%20as%20we%20illustrate%20one%20real%20example%20at%20the%20end%20of%20this%20article.%20Device%20makers%20of%20products%20like%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fservices%2Fiot-edge%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3EAzure%20IoT%20Edge%3C%2FA%3E%20can%20now%20holistically%20secure%20devices%2C%20objectively%20claim%20security%2C%20and%20be%20assured%20of%20differentiated%20visibility%20on%20Azure%20device%20catalog%20in%20addition%20to%20the%20Common%20Criteria%20portal.%26nbsp%3B%20We%20envision%20other%20IoT%20solution%20providers%20building%20custom%20experiences%20with%20ECN%20PP%20on%20respective%20platforms.%26nbsp%3B%20For%20us%2C%20ECN%20PP%20is%20only%20the%20beginning%20of%20an%20exciting%20journey%20in%20which%20we%20invite%20you%20to%20join%20us%20in%20making%20it%20our%20common%20journey%20towards%20a%20unified%20goal.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1265751753%22%20id%3D%22toc-hId--1265751753%22%3EHow%20we%20see%20security%20in%20IoT%3C%2FH2%3E%0A%3CP%3EOur%20vision%20for%20security%20in%20IoT%20is%20a%20world%20in%20which%20every%20IoT%20ecosystem%20stakeholder%20choices%20and%20actions%20contributes%20to%20overall%20security%20of%20IoT%20where%20consumers%20and%20benefactors%20are%20simply%20secured%20by%20default.%26nbsp%3B%20To%20a%20solution%20builder%20as%20an%20example%2C%20this%20means%20building%20with%20components%20that%20have%20been%20certified%20to%20deliver%20all%20security%20and%20compliance%20requirements%20for%20the%20target%20solution.%26nbsp%3B%26nbsp%3B%20We%20achieve%20this%20vision%20by%20standardizing%20a%20baseline%20and%20then%20evolve%20this%20baseline%20with%20maturity.%26nbsp%3B%20Given%20afore%20described%20stalemate%20between%20the%20IoT%20solution%20builder%20and%20device%20maker%2C%20it%20stands%20to%20reason%20for%20the%20IoT%20device%2C%20and%20not%20the%20security%20subcomponents%2C%20to%20be%20the%20current%20minimum%20baseline.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20align%3D%22center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22kartben_0-1600707826547.png%22%20style%3D%22width%3A%20384px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F220254i15740F23336B6700%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22kartben_0-1600707826547.png%22%20alt%3D%22Figure%202%3A%20The%20IoT%20device%20as%20the%20practical%20minimum%20baseline%20to%20standardize%20on%20security.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%202%3A%20The%20IoT%20device%20as%20the%20practical%20minimum%20baseline%20to%20standardize%20on%20security.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1221761080%22%20id%3D%22toc-hId-1221761080%22%3ESizing%20the%20solution%20right%20%E2%80%93%20device%20security%20promise%3C%2FH2%3E%0A%3CP%3EA%20major%20goal%20in%20security%20is%20to%20%3CSTRONG%3Ebalance%20efficacy%20with%20cost%3C%2FSTRONG%3E%20otherwise%20unintended%20consequences%20result.%26nbsp%3B%26nbsp%3B%20Go%20cheap%20and%20risk%20efficacy%20or%20spend%20too%20much%20and%20risk%20security%20budget%20cuts.%26nbsp%3B%20For%20IoT%20devices%2C%20secured%20silicon%20(aka%20hardware%20security%20module%20or%20simply%20HSM)%20is%20often%20the%20last%20defense%20to%20deliver%20resistance%20against%20tampering%20from%20malicious%20physical%20access.%26nbsp%3B%20Secure%20silicon%20together%20with%20associated%20engineering%20and%20operating%20costs%20is%20also%20the%20biggest%20cost%20driver.%26nbsp%3B%20A%20need%20therefore%20arises%20to%20appropriately%20size%20secure%20silicon%20investments%20for%20the%20IoT%20deployment%20risk%20profile.%26nbsp%3B%26nbsp%3B%20We%20address%20this%20need%20by%20providing%20a%20useful%20tool%20to%20judge%20the%20coverage%20expected%20of%20the%20secure%20silicon%2C%20a%20tool%20we%20call%20%3CEM%3Edevice%20security%20promise%3C%2FEM%3E%2C%20that%20currently%20offer%20%3CEM%3Estandard%20promise%3C%2FEM%3E%2C%20%3CEM%3Esecure%20element%20promise%3C%2FEM%3E%2C%20and%20%3CEM%3Esecure%20enclave%20promise%3C%2FEM%3E%20for%20sizing.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20align%3D%22center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22kartben_2-1600708067050.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F220259i961ACA1A1FF93927%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22kartben_2-1600708067050.png%22%20alt%3D%22Figure%203%3A%20Device%20security%20promise%20for%20IoT%20devices.%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%203%3A%20Device%20security%20promise%20for%20IoT%20devices.%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIf%20you%20wondered%20how%20to%20assess%20the%20IoT%20deployment%20risk%20then%20you%20are%20in%20luck.%26nbsp%3B%20The%20%3CA%20href%3D%22https%3A%2F%2Fwww.iiconsortium.org%2Fsmm.htm%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EIoT%20Security%20Maturity%20Model%3C%2FA%3E%20by%20the%20Industrial%20Internet%20Consortium%20delivers%20excellent%20tools%20and%20guidance%20for%20exactly%20this%20purpose.%20You%20can%20also%20learn%20more%20%3CA%20href%3D%22https%3A%2F%2Fazure.microsoft.com%2Fblog%2Fsecuring-the-intelligent-edge%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ehere%20about%20the%20role%20of%20secure%20silicon%3C%2FA%3E%20in%20securing%20IoT.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EIt%20is%20worthwhile%20to%20note%20%3CEM%3Edevice%20security%20promise%3C%2FEM%3E%20only%20conveys%20the%20scope%20of%20secure%20silicon%20isolation.%26nbsp%3B%20Robustness%20in%20protection%2C%20for%20example%20how%20much%20resistance%20can%20one%20expect%20from%20the%20secure%20silicon%20against%20physical%20and%20environmental%20tampering%2C%20derives%20from%20depth%20in%20secure%20silicon%20security%20engineering%20and%20qualifiable%20through%20standards%20such%20as%20the%20National%20Institute%20of%20Standards%20and%20Technology%E2%80%99s%20(%3CA%20href%3D%22https%3A%2F%2Fwww.nist.gov%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ENIST%3C%2FA%3E)%20Federal%20Information%20Processing%20Standard%20140-2%20(FIPS%20140-2)%20and%20Platform%20Security%20Architecture%20certification%20(%3CA%20href%3D%22https%3A%2F%2Fwww.psacertified.org%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3EPSA%20Certified%E2%84%A2%3C%2FA%3E).%20ECN%20PP%20captures%20and%20reports%20compliances%20to%20standards%20addressing%20robustness%20for%20a%20holistic%20view%20of%20the%20device%20security%20posture.%20%26nbsp%3BThe%20approach%20taken%20by%20ECN%20PP%20is%20equally%20important.%3C%2FP%3E%0A%3CP%3E%3CSTRONG%3E%26nbsp%3B%3C%2FSTRONG%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--585693383%22%20id%3D%22toc-hId--585693383%22%3EMeasurable%20goals%20over%20prescriptions%3C%2FH2%3E%0A%3CP%3EECN%20PP%20defines%20measurable%20security%20goals%20instead%20of%20component%20prescription.%26nbsp%3B%20This%20approach%20invites%20and%20engages%20unique%20talents%20and%20expertise%20of%20device%20makers%20in%20achieving%20these%20goals%20for%20efficacy%20while%20simultaneously%20garnering%20product%20differentiation.%26nbsp%3B%20We%20avoid%20prescriptions%20to%20preclude%20blind%20compliance%20with%20no%20stake%20in%20efficacy%2C%20which%20brings%20us%20back%20to%20the%20problem%20we%20set%20out%20to%20solve.%26nbsp%3B%20The%20result%20is%20a%20modular%20protection%20profile%20that%20presents%20a%20comprehensive%20security%20goals%20grouped%20under%20convenient%20categories%20and%20accommodates%20%3CEM%3Edevice%20security%20promise%3C%2FEM%3E%20customization.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%20align%3D%22center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22kartben_3-1600708115767.png%22%20style%3D%22width%3A%20400px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F220260i2202B3B7B4C8D29C%2Fimage-size%2Fmedium%3Fv%3D1.0%26amp%3Bpx%3D400%22%20title%3D%22kartben_3-1600708115767.png%22%20alt%3D%22Figure%204%3A%20ECN%20PP%20modularly%20structured%20for%20device%20security%20promise%20customization%22%20%2F%3E%3CSPAN%20class%3D%22lia-inline-image-caption%22%20onclick%3D%22event.preventDefault()%3B%22%3EFigure%204%3A%20ECN%20PP%20modularly%20structured%20for%20device%20security%20promise%20customization%3C%2FSPAN%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId-1901819450%22%20id%3D%22toc-hId-1901819450%22%3E%26nbsp%3B%3C%2FH2%3E%0A%3CH2%20id%3D%22toc-hId-94364987%22%20id%3D%22toc-hId-94364987%22%3ETaking%20device%20security%20certification%20to%20the%20next%20level%20with%20programmatic%20real-time%20attestations%3C%2FH2%3E%0A%3CP%3EECN%20PP%20on%20its%20own%20provides%20the%20tools%20that%20help%20enable%20secured%20IoT%20deployments%20through%20standards%20for%20collaboration%20and%20global%20transparency%2C%20but%20we%20envision%20using%20it%20to%20build%20more.%26nbsp%3B%20To%20start%20with%2C%20while%20Common%20Criterial%20portal%20shall%20remain%20authoritative%20listing%20for%20security%20ECN%20PP%20compliant%20devices%2C%20device%20makers%20with%20ECN%20PP%20compliant%20devices%20certified%20for%20Azure%20will%20merit%20product%20targeted%20recognition%20within%20our%20IoT%20device%20catalog.%26nbsp%3B%20We%E2%80%99re%20excited%20for%20this%20ability%20to%20recognize%20our%20device%20partner%20commitment%20to%20security.%26nbsp%3B%20We%E2%80%99re%20equally%20excited%20about%20our%20current%20engagements%20to%20build%20on%20ECN%20PP%20and%20deliver%20programmatic%20real-time%20device%20security%20attestations.%3C%2FP%3E%0A%3CP%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22kartben_0-1600710678038.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F220275iF8B7D6FFC18555EB%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22kartben_0-1600710678038.png%22%20alt%3D%22kartben_0-1600710678038.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EBeyond%20visibility%20into%20overall%20deployment%20security%20posture%2C%20programmatic%20workflows%20with%20real-time%20security%20attestations%20will%20empower%20solution%20builders%20to%20target%20workloads%20only%20to%20devices%20that%20meet%20certain%20security%20posture%20for%20example%2C%20they%20can%20target%20workloads%20with%20confidential%20or%20privacy%20content%20only%20to%20%3CEM%3Esecure%20enclave%20promise%3C%2FEM%3E%20devices.%26nbsp%3B%20Another%20pleasant%20upshot%20are%20the%20signals%20these%20workflows%20will%20generate%20to%20device%20makers%20for%20the%20types%20of%20devices%20in%20demand%20based%20on%20%3CEM%3Edevice%20security%20promise%3C%2FEM%3E.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CP%3EWhile%20this%20work%20is%20just%20being%20announced%2C%20we%20already%20see%20strong%20interest%20and%20real%20engagements%20such%20as%20follows%3A%3C%2FP%3E%0A%3CP%20class%3D%22lia-align-center%22%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-inline%22%20image-alt%3D%22kartben_0-1600710744202.png%22%20style%3D%22width%3A%20999px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F220277iFB54B253BDC042C1%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22kartben_0-1600710744202.png%22%20alt%3D%22kartben_0-1600710744202.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FP%3E%0A%3CP%3EThis%20is%20an%20example%20of%20a%20device%20maker%2C%20Scalys%2C%20following%20ECN%20guidance%20to%20select%20Arm%20TrustZone%C2%AE%20based%20NXP%20Layerscape%C2%AE%20LS1012A%20to%20build%20a%20robust%20secure%20enclave%20promise%20device%2C%20and%20engaging%20UL%20to%20setup%20for%20certification.%20A%20solution%20builder%20will%20discover%20Scalys%20certified%20device%20from%20Common%20Criteria%20portal%2C%20and%20build%20solution%20they%20can%20later%20attest%20the%20device%E2%80%99s%20security%20real-time.%3C%2FP%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%0A%3CH2%20id%3D%22toc-hId--1713089476%22%20id%3D%22toc-hId--1713089476%22%3EWhat%E2%80%99s%20next%3C%2FH2%3E%0A%3CP%3EWe%20thank%20all%20the%20partners%20that%20have%20joined%20us%20already%20on%20this%20journey%20to%20secure%20IoT%20for%20all%20and%20invite%20more.%26nbsp%3B%20Engage%20now%20as%20follows%3A%3C%2FP%3E%0A%3CUL%3E%0A%3CLI%3EAccess%20Edge%20Compute%20Node%20protection%20profile%2C%20NSCIB-CC-0112146-CR%2C%20coming%20very%20soon%20to%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECommon%20Criterial%3C%2FA%3E%20portal.%3C%2FLI%3E%0A%3CLI%3EDevice%20makers%20-%20engineer%20device%20security%20to%20ECN%20PP%2C%20engage%20any%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2Flabs%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECommon%20Criterial%20licensed%20lab%3C%2FA%3E%20for%20certification%20and%20attestation%20setup%2C%20and%20view%20%3CA%20href%3D%22https%3A%2F%2Fwww.commoncriteriaportal.org%2Fproducts%2F%22%20target%3D%22_blank%22%20rel%3D%22noopener%20nofollow%20noopener%20noreferrer%20noopener%20noreferrer%22%3ECommon%20Criterial%20portal%20for%20licensed%20devices%3C%2FA%3E%20(allow%20time%20for%20engineering%20and%20certification%20of%20early%20devices).%3C%2FLI%3E%0A%3CLI%3ESolution%20builders%20%E2%80%93%20demand%20ECN%20PP%20compliant%20devices%20for%20security%20assurance.%3C%2FLI%3E%0A%3CLI%3ECommon%20Criterial%20licensed%20labs%20%E2%80%93%20%3CA%20href%3D%22https%3A%2F%2Faka.ms%2Fecn-pp-cc-lab%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Econtact%20us%3C%2FA%3E%20to%20setup%20for%20device%20attestation.%3C%2FLI%3E%0A%3CLI%3ETechnology%20partners%20-%20%3CA%20href%3D%22https%3A%2F%2Fforms.office.com%2FPages%2FResponsePage.aspx%3Fid%3Dv4j5cvGGr0GRqy180BHbR_qJ-a3j7DVAgrLSGeGpjElUM1dGMFNIVEFBVkszQ1FZQ1NHS0kxMEZDWi4u%22%20target%3D%22_blank%22%20rel%3D%22noopener%20noopener%20noreferrer%20noopener%20noreferrer%22%3Ejoin%20us%3C%2FA%3E%20to%20evolve%20ECN%20PP.%3C%2FLI%3E%0A%3C%2FUL%3E%0A%3CP%3E%26nbsp%3B%3C%2FP%3E%3C%2FLINGO-BODY%3E%3CLINGO-TEASER%20id%3D%22lingo-teaser-1686066%22%20slang%3D%22en-US%22%3E%3CP%3E%3CSPAN%20style%3D%22font-family%3A%20inherit%3B%20font-style%3A%20italic%3B%22%3E%26nbsp%3B%3C%2FSPAN%3E%3CEM%3E%3CSPAN%20class%3D%22lia-inline-image-display-wrapper%20lia-image-align-center%22%20image-alt%3D%22smart_world_370x200.png%22%20style%3D%22width%3A%20303px%3B%22%3E%3CIMG%20src%3D%22https%3A%2F%2Ftechcommunity.microsoft.com%2Ft5%2Fimage%2Fserverpage%2Fimage-id%2F219765i55D82EA44BD6EB58%2Fimage-size%2Flarge%3Fv%3D1.0%26amp%3Bpx%3D999%22%20title%3D%22smart_world_370x200.png%22%20alt%3D%22smart_world_370x200.png%22%20%2F%3E%3C%2FSPAN%3E%3C%2FEM%3E%3C%2FP%3E%0A%3CP%3E%3CEM%3EAnnouncing%20Edge%20Compute%20Node%20protection%20profile%20(ECN%20PP)%20to%20guide%20how%20to%20engineer%2C%20claim%2C%20evaluate%2C%20and%20consume%20device%20security%20for%20IoT%3C%2FEM%3E%3C%2FP%3E%3C%2FLINGO-TEASER%3E%3CLINGO-LABS%20id%3D%22lingo-labs-1686066%22%20slang%3D%22en-US%22%3E%3CLINGO-LABEL%3EAzure%20IoT%20edge%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3EIoT%3C%2FLINGO-LABEL%3E%3CLINGO-LABEL%3ESecurity%3C%2FLINGO-LABEL%3E%3C%2FLINGO-LABS%3E
Microsoft

Companies building Internet of Things (IoT) solutions today are likely to deploy IoT applications that use unsecured devices, mainly because they cannot verify the security claims from device manufacturers.

 

Solution builders could create secured devices themselves. They tend not to because they either lack domain expertise, or simply prefer to buy devices off-the-shelf. Device makers, on the other hand, possess the requisite expertise to secure devices but lack the ability to convey details. For example, language constructs such as for conveying computation, storage, and power profiles of an Industrial PC (IPC), are simply not available for security.  Device makers therefore see no motivation to invest in securing devices if they can’t claim the value and hence the current stalemate. Our studies and observations show this stalemate exists for two reasons:

 

  • Lack of standards guiding how to holistically engineer and claim device security.
  • Lack of standards guiding how to consume and verify device security claims.

 

Given how IoT globally connects solutions, supply chains, and interests irrespective of company, geography, or governmental affiliations, effectively solving the stalemate requires global openness as well. 

 

We’re happy to announce the Edge Compute Node protection profile (ECN PP), a Common Criteria (ISO 15408) standard that will guide how to engineer, claim, evaluate, and consume security for IoT devices.  We build on Common Criteria for transparency, cross-industry practice, global recognition arrangements, and global availability of licensed laboratories.  Edge Compute Node protection profile, officially NSCIB-CC-0112146-CR, is in final step of certification.

 

We created and drove development of ECN PP here at Microsoft but our efforts were immensely amplified by the following partners contributing diverse expertise and experience, and for whom we’re very grateful. 

 

Figure 1: We recognize these collaborators with gratitude for amplifying our efforts with their diverse expertise.Figure 1: We recognize these collaborators with gratitude for amplifying our efforts with their diverse expertise.

 

We’re excited by this development and so are our partners:

 

“ProvenRun’s mission is to help its customers resolve the security challenges linked to the large-scale deployment of connected devices. We are very proud to have contributed our expertise into this mission to enable industry motions that help ensure all IoT deployments are secured-by-design”,  Dominique Bolignano, CEO and founder, ProvenRun.

When ready, device makers and solution builders can freely access ECN PP from the Common Criteria portal, and later view list of ECN PP certified devices.  We’re excited to see how ECN PP co-development partners are already putting it into use as we illustrate one real example at the end of this article. Device makers of products like Azure IoT Edge can now holistically secure devices, objectively claim security, and be assured of differentiated visibility on Azure device catalog in addition to the Common Criteria portal.  We envision other IoT solution providers building custom experiences with ECN PP on respective platforms.  For us, ECN PP is only the beginning of an exciting journey in which we invite you to join us in making it our common journey towards a unified goal.

 

How we see security in IoT

Our vision for security in IoT is a world in which every IoT ecosystem stakeholder choices and actions contributes to overall security of IoT where consumers and benefactors are simply secured by default.  To a solution builder as an example, this means building with components that have been certified to deliver all security and compliance requirements for the target solution.   We achieve this vision by standardizing a baseline and then evolve this baseline with maturity.  Given afore described stalemate between the IoT solution builder and device maker, it stands to reason for the IoT device, and not the security subcomponents, to be the current minimum baseline.

 

Figure 2: The IoT device as the practical minimum baseline to standardize on security.Figure 2: The IoT device as the practical minimum baseline to standardize on security.

 

Sizing the solution right – device security promise

A major goal in security is to balance efficacy with cost otherwise unintended consequences result.   Go cheap and risk efficacy or spend too much and risk security budget cuts.  For IoT devices, secured silicon (aka hardware security module or simply HSM) is often the last defense to deliver resistance against tampering from malicious physical access.  Secure silicon together with associated engineering and operating costs is also the biggest cost driver.  A need therefore arises to appropriately size secure silicon investments for the IoT deployment risk profile.   We address this need by providing a useful tool to judge the coverage expected of the secure silicon, a tool we call device security promise, that currently offer standard promise, secure element promise, and secure enclave promise for sizing.

 

Figure 3: Device security promise for IoT devices.Figure 3: Device security promise for IoT devices.

 

If you wondered how to assess the IoT deployment risk then you are in luck.  The IoT Security Maturity Model by the Industrial Internet Consortium delivers excellent tools and guidance for exactly this purpose. You can also learn more here about the role of secure silicon in securing IoT.

 

It is worthwhile to note device security promise only conveys the scope of secure silicon isolation.  Robustness in protection, for example how much resistance can one expect from the secure silicon against physical and environmental tampering, derives from depth in secure silicon security engineering and qualifiable through standards such as the National Institute of Standards and Technology’s (NIST) Federal Information Processing Standard 140-2 (FIPS 140-2) and Platform Security Architecture certification (PSA Certified™). ECN PP captures and reports compliances to standards addressing robustness for a holistic view of the device security posture.  The approach taken by ECN PP is equally important.

 

Measurable goals over prescriptions

ECN PP defines measurable security goals instead of component prescription.  This approach invites and engages unique talents and expertise of device makers in achieving these goals for efficacy while simultaneously garnering product differentiation.  We avoid prescriptions to preclude blind compliance with no stake in efficacy, which brings us back to the problem we set out to solve.  The result is a modular protection profile that presents a comprehensive security goals grouped under convenient categories and accommodates device security promise customization.

 

Figure 4: ECN PP modularly structured for device security promise customizationFigure 4: ECN PP modularly structured for device security promise customization

 

Taking device security certification to the next level with programmatic real-time attestations

ECN PP on its own provides the tools that help enable secured IoT deployments through standards for collaboration and global transparency, but we envision using it to build more.  To start with, while Common Criterial portal shall remain authoritative listing for security ECN PP compliant devices, device makers with ECN PP compliant devices certified for Azure will merit product targeted recognition within our IoT device catalog.  We’re excited for this ability to recognize our device partner commitment to security.  We’re equally excited about our current engagements to build on ECN PP and deliver programmatic real-time device security attestations.

kartben_0-1600710678038.png

Beyond visibility into overall deployment security posture, programmatic workflows with real-time security attestations will empower solution builders to target workloads only to devices that meet certain security posture for example, they can target workloads with confidential or privacy content only to secure enclave promise devices.  Another pleasant upshot are the signals these workflows will generate to device makers for the types of devices in demand based on device security promise.

 

While this work is just being announced, we already see strong interest and real engagements such as follows:

kartben_0-1600710744202.png

This is an example of a device maker, Scalys, following ECN guidance to select Arm TrustZone® based NXP Layerscape® LS1012A to build a robust secure enclave promise device, and engaging UL to setup for certification. A solution builder will discover Scalys certified device from Common Criteria portal, and build solution they can later attest the device’s security real-time.

 

What’s next

We thank all the partners that have joined us already on this journey to secure IoT for all and invite more.  Engage now as follows:

  • Access Edge Compute Node protection profile, NSCIB-CC-0112146-CR, coming very soon to Common Criterial portal.
  • Device makers - engineer device security to ECN PP, engage any Common Criterial licensed lab for certification and attestation setup, and view Common Criterial portal for licensed devices (allow time for engineering and certification of early devices).
  • Solution builders – demand ECN PP compliant devices for security assurance.
  • Common Criterial licensed labs – contact us to setup for device attestation.
  • Technology partners - join us to evolve ECN PP.