Security is now a board level issue: how to secure the data supply chain

Image credit: Shutterstock (Image credit: Shutterstock)

It has never been more crucial for businesses to implement and demonstrate their commitment to cybersecurity; with data increasingly being used to make significant business decisions. 

While historically, the major concerns for senior management around IT security have focused on intellectual property theft and reputational risk, ongoing changes in technology and politics have changed today’s business landscape and priorities significantly. With GDPR now in full force, organisations must demonstrate to stakeholders that they are making a credible effort to ensure that security is built into the heart of business operations. 

With the potential for GDPR fines to attract multi-million pound figures, security is now firmly a board level issue. 

Vulnerabilities in the data supply chain

Organisations must first understand what potential vulnerabilities look like within a data supply chain, so they can be recognised and mitigated. As cyberattacks increase in sophistication, they are likely to be so subtle that they don’t visibly impact a system; providing misleading information to force erroneous decisions. Ironically, whilst this type of attack will be very difficult to detect, early identification is vital in order to prevent significant damage.

The first step when looking to identify vulnerabilities in data is to determine whether a device is performing as expected. If we consider a device monitoring air quality in a petrochemical process plant that feeds its data to a cloud-based reporting system; the sensor unit itself is likely to have some type of firmware on it that manages connectivity, scheduling reporting, checking and calibration, etc. If that sensor firmware has been hacked, the sensor could report at an offset, or even provide completely fabricated data. 

At the next level up, if the sensor is working well, then you need to start considering whether the data in transit to the aggregating system is vulnerable. Can you certify that you are truly receiving data from the sensor rather than data that has been injected en route? Without complete trust and confidence in the data chain from end to end, there is the risk of a system being manipulated to trigger false alerts or conceal a malicious release of pollutants.

Image credit: Pixabay

Image credit: Pixabay (Image credit: Image Credit: Geralt / Pixabay)

The triad of information security stands on firmware

A data supply chain needs to deliver the triad of information security - confidentiality, integrity and availability in order for its data to be usable. Confidentiality is key to mitigating privacy concerns and reducing intellectual property and competitor risks. Integrity in this sense means making sure the data hasn’t been spoofed in some way, and availability means ensuring that data is being generated and consumed as expected.

Protecting firmware running on devices at the entrance to the data supply chain is a vital foundation of the triad, as many of the recent attacks that we have seen on IoT devices have been a result of attackers accessing and changing the firmware. Altering firmware allows attackers to hijack the device and make it do whatever they want. All too many connected devices, especially lower cost consumer goods, have very limited protection against firmware modification. Things as simple and obviously risky as having a default administrative password such as the word ‘password’ left unfixed, have resulted in repeated compromises, for example.

Image credit: Shutterstock

Image credit: Shutterstock

Hardware root of trust

Providing a strong root of trust as the foundation for device security and the data supply chain as a whole is the best way to optimise security in an end device. Building a secure system strictly in software is very difficult, as most connected devices require their software and firmware to be continuously updated and patched. Being able to identify devices, confirm their patch status, validate that firmware being loaded is authorised and that the encryption keys that are used for these processes and the delivery of data are secure, is essential. With these capabilities in place, the identification, management and isolation of at risk devices can be easily assured. 

Having strong security in hardware delivers the fundamental security operations like securely storing, encrypting and decrypting data, confirming the authenticity of the firmware that is running on the device and definitively identifying the device. A strong security root of trust is fundamental to mitigating a whole range of vulnerabilities for IoT devices. 

Hardware security can be provided via a root of trust embedded into a chip that is part of the system as a secure IP core, or by adding a separate dedicated security chip. In most designs, security should be embedded in the main chip in the IoT device, such as an application processor or custom ASIC, to deliver optimal levels of security performance. Our own approach to embedding hardware security is delivered via a fully programmable hardware security core, built around a custom RISC-V CPU. The security processing core creates a siloed architecture that isolates and secures the execution of sensitive code, processes and algorithms from the primary processor. This mitigates the risk of critical vulnerabilities like the recent Meltdown and Spectre security flaws and allows designers to optimise the primary processor for high performance, low power or other characteristics, while optimising security in the siloed core. 

The IoT age offers huge potential, but also a number of new challenges. With reputation, financial success and decision making at risk, IoT security is an issue that now ranks as a top board level concern. To limit the risk of these types of attacks, a system level approach to security is critical.

Bart Stevens, Sr. Director of Product Management and Cryptography at Rambus

Bart Stevens
Bart Stevens is senior director of product marketing for cryptography at Rambus. He is an expert on embedded security for Enterprise, Networking, Wireless, IoT & Mobile applications
Latest in Security
cybersecurity
Chinese government hackers allegedly spent years undetected in foreign phone networks
Data leak
A major Keenetic router data leak could put a million households at risk
Code Skull
Interpol operation arrests 300 suspects linked to African cybercrime rings
Insecure network with several red platforms connected through glowing data lines and a black hat hacker symbol
Multiple routers hit by new critical severity remote command injection vulnerability, with no fix in sight
Code Skull
This dangerous new ransomware is hitting Windows, ARM, ESXi systems
An abstract image of a lock against a digital background, denoting cybersecurity.
Critical security flaw in Next.js could spell big trouble for JavaScript users
Latest in News
Open AI
OpenAI unveiled image generation for 4o – here's everything you need to know about the ChatGPT upgrade
Apple WWDC 2025 announced
Apple just announced WWDC 2025 starts on June 9, and we'll all be watching the opening event
Hornet swings their weapon in mid air
Hollow Knight: Silksong gets new Steam metadata changes, convincing everyone and their mother that the game is finally releasing this year
OpenAI logo
OpenAI just launched a free ChatGPT bible that will help you master the AI chatbot and Sora
An aerial view of an Instavolt Superhub for charging electric vehicles
Forget gas stations – EV charging Superhubs are using solar power to solve the most annoying thing about electric motoring
NetSuite EVP Evan Goldberg at SuiteConnect London 2025
"It's our job to deliver constant innovation” - NetSuite head on why it wants to be the operating system for your whole business