Public Sector

Public Sector

Public Sector and other organizations deemed as Critical Infrastructure by the government are a prime target for cyber criminals looking for financial reward, or adversarial nation states looking to disrupt society. This infrastructure includes physical and digital systems that individuals and businesses rely on where data security and personal safety is paramount. Security of the often complex and global supply chains is also fundamental and, as Governments worldwide introduce new regulations, such as NIST SP 800-183 and ISA/IEC 62443, it is essential for organizations to take steps to mitigate risk and build resilience and continuity into their connected operations in order to maintain regulatory compliance.

Device Authority partners with public sector organizations to enable them to embrace the benefits of connected technology whilst also ensuring public safety, data security and robust operations. By providing advanced authentication, encryption, and access control mechanisms, Device Authority ensures the integrity and confidentiality of data transmitted between IoT devices and backend systems, preventing unauthorized access and data breaches. Additionally, Device Authority facilitates secure device lifecycle management, compliance assurance, and supply chain security measures to enhance overall cybersecurity posture.

Public Safety – Floodwater Sensors Connected Sports Arena

Situation

Flood prone areas require a network of government–managed flood sensors and actuators that warn emergency agencies of flooding in advance, so that people and traffic can be directed to safety.​

Most of these OT devices have been in service for up to 20 years, and now are being connected to the Internet via secure gateways to gain real-time access to flood data. Modern, PKI-based security is required to mitigate the previously weak credentials on these devices not designed to be online as part of the IoT.​

Solution

Device Authority KeyScaler was used to provide: ​

  • Generation of device root of trust using DDKG for Automated Device Provisioning of secure gateways​
  • PKI Services for IoT utilizing x.509 Certificates issues by the enterprise CA​
  • Identity Lifecycle Management including automatic provisioning to the cloud​
  • External Threat Intelligence Data from Defender for IoT to inform device authorization safety

Summary

Enabled IT/OT integration

Highest level of PKI security

Accelerated incident response

Minimized customer disruption

Reduced liability

Situation

A large sports arena was installing smart sensors in the facility that can detect indoor environmental factors such as air flow, chemical odors and smoke, etc.  ​
Should a potentially dangerous event occur such as a chemical spill, fire, or pathogen release, security staff can be quickly alerted, and emergency responders can be immediately dispatched.​
These sensors require x.509 certificates, and as part of the nation’s Critical National Infrastructure need to validate their Software Bill of Materials (SBOM).​

Solution

Device Authority KeyScaler was used to provide:

  • Generation of device root of trust using DDKG for Automated Device Provisioning​​
  • PKI Services for IoT utilizing x.509 Certificates issued by the corporate CA​
  • Identity Lifecycle Management including automatic provisioning to Azure IoT Hub​
  • Continuous Assurance utilizing the device Software Bill of Materials (SBOM)

Summary

Faster time to value

Reduced admin burden

Accelerated incident response

Minimized customer disruption

SBOM Validation/Continuous Assurance

In response to evolving cybersecurity threats, regulatory bodies such as the White House and the EU have introduced stringent requirements to bolster national and regional cybersecurity. Find out how KeyScaler can support organizations as they navigate this shifting landscape and take a proactive approach to cybersecurity to ensure compliance and validation throughout the entire device lifecycle.

Read more

KeyScaler Central

KeyScaler Central is the core server technology that enables automation of the full device identity lifecycle. KeyScaler Central contains the primary technologies needed to enable the full complement of KeyScaler’s automation capabilities.

Read more

Key Benefits

Automated device identity lifecycle management

Secure legacy devices

Enables IT/OT Convergence

Accelerated Incident Response

Supports regulatory compliance

Get in touch

Contact Us