Cyber security and anti-tamper protections for mission-critical intelligent systems
Wind River has announced security enhancements to Wind River Studio, a cloud-native platform for the development, deployment, operations, and servicing of mission-critical intelligent systems. Studio enables companies to meet rigorous cyber security and anti-tamper requirements, further helping secure devices and systems through development, deployment, and operations.
The steep rise in security threats shows a concerning trend. As new devices become connected, each represents a point of entry that can be exploited by a cyber attack. In 2020, IoT devices were responsible for 32.72% of infections observed in wireless networks, more than twice that in 2019.
Industries with higher dependency on software and intelligence-based systems will need to start demanding that security be addressed at every step in an intelligent system’s life cycle.
“In an intelligent systems world where devices are expected to connect and compute together in near real time, cyber security is a design necessity and no longer a 'nice to have'. This is even more true for mission-critical systems, such as those in the energy, aerospace and defence, and industrial sectors.
Recent research with executive leaders in these sectors have shown us that companies on a successful path with their intelligent systems were twice as likely to have built-in deep cyber protections for their systems than any other group,” said Cyra Richardson, Chief Product Officer, Wind River.
“Security must be taken seriously - the only way to do that is to be proactive. With billions of new devices constantly connecting locations around the world, the attack surface is staggering. It will be important for solution builders, both hardware and software, to be thoughtful stewards and strong advocates for cybersecurity in order to deliver trustworthy compute infrastructure.”
The latest version of Wind River Titanium Linux, developed by the Wind River technology protection and cyber security group Star Lab, offers a robust Linux system-hardening and security capability and is available on the market for operationally deployed Linux systems. Key features for Titanium Linux include secure boot, anti-tamper protections, and the ability to simplify mandatory access control (MAC) policy creation.
To further address security problems across multiple industries and geographies, Titanium Linux security controls also map to key IoT security guidelines, such as NIST IoT cyber security-related initiatives; OWASP IoT security projects; IoT Security Foundation protocols; and guidance from the European Union Agency for Cybersecurity, ETSI, GSMA, and several others.
Designed using a threat model presuming an attacker will gain root (admin) access to a system, Titanium Linux maintains the integrity and confidentiality of critical applications, data, and configurations while assuring operations. Titanium Linux hardens the kernel against attack while enforcing MAC on customers’ applications and data. Even if an attacker exploits the system and gains administrative access, they still cannot extract or maliciously modify sensitive data and code.
Additional key security capabilities that Wind River Studio enables include:
- Support in preventing the accidental release of vulnerable code using code scanning and analysis tools. Capabilities include code coverage analysis, static analysis, both quick and deep code scan, and secure container management.
- Cloud and device attestation based on x.509 certificates and secure secret storage to mitigate person-in-the-middle attacks that would leak customer, device, and mission-sensitive data.
- Hardened Linux kernel to prevent tampering and reverse-engineering attacks on the Wind River Linux kernel, sensitive applications, and data. This includes prevention of stack overflows, heap overflows, information disclosure (zeroing freed memory), and kernel overwrite. The hardened kernel uses two additional techniques to thwart exploits: kernel address space layout randomization (KASLR) to limit injection attacks and hardware segregation to limit modification of kernel memory.