Public Sector

Public Sector

Public Sector and other organizations deemed as Critical Infrastructure by the government are a prime target for cyber criminals looking for financial reward, or adversarial nation states looking to disrupt society. This infrastructure includes physical and digital systems that individuals and businesses rely on where data security and personal safety is paramount. Security of the often complex and global supply chains is also fundamental and, as Governments worldwide introduce new regulations, such as NIST SP 800-183 and ISA/IEC 62443, it is essential for organizations to take steps to mitigate risk and build resilience and continuity into their connected operations in order to maintain regulatory compliance.

Device Authority partners with public sector organizations to enable them to embrace the benefits of connected technology whilst also ensuring public safety, data security and robust operations. By providing advanced authentication, encryption, and access control mechanisms, Device Authority ensures the integrity and confidentiality of data transmitted between IoT devices and backend systems, preventing unauthorized access and data breaches. Additionally, Device Authority facilitates secure device lifecycle management, compliance assurance, and supply chain security measures to enhance overall cybersecurity posture.

Device Manufacturer - Renewable Energy Device Operator - Floodwater Sensors Device Operator - Connected Sports Arena

Situation

A major German manufacturer of onshore and offshore wind turbines required a secure and scalable solution to manage remote thin-client devices used for data acquisition across its fleet. These devices collect and transmit critical turbine data, such as sensor values, operational events, and performance metrics, to a central IoT platform powered by Cumulocity.

Given the highly distributed nature of their infrastructure, the company needed to ensure secure onboarding, identity provisioning, and certificate lifecycle management for each device. In addition, the solution had to support EST (Enrollment over Secure Transport) for secure firewall onboarding and VPN client authentication, ensuring end-to-end protection across both data and device layers.

Solution

Device Authority KeyScaler was used to provide:

  • Dynamic Device Key Generation (DDKG) for establishing a root of trust at the device level.
  • PKI Services for IoT, using X.509 certificates integrated with enterprise security infrastructure.
  • Automated Device Provisioning and Zero-Touch Registration to the Cumulocity IoT Platform.
  • Automated Identity Lifecycle Management, including certificate renewal and revocation for thin-client devices.
  • Support for EST protocol to enable secure firewall and VPN authentication.

Summary

Faster time to value by using pre-built integrations to enterprise IoT platforms.

Streamlined device security reducing admin burden, freeing up internal FTEs to handle other essential duties.

Identity Lifecycle Management prevents compromise and speeds incident response, minimizing customer disruption, preserving brand reputation, and reducing liability.

Situation

Flood prone areas require a network of government–managed flood sensors and actuators that warn emergency agencies of flooding in advance, so that people and traffic can be directed to safety.​

Most of these OT devices have been in service for up to 20 years, and now are being connected to the Internet via secure gateways to gain real-time access to flood data. Modern, PKI-based security is required to mitigate the previously weak credentials on these devices not designed to be online as part of the IoT.​

Solution

Device Authority KeyScaler was used to provide: ​

  • Generation of device root of trust using DDKG for Automated Device Provisioning of secure gateways​
  • PKI Services for IoT utilizing x.509 Certificates issues by the enterprise CA​
  • Identity Lifecycle Management including automatic provisioning to the cloud​
  • External Threat Intelligence Data from Defender for IoT to inform device authorization safety

Summary

Enabled IT/OT integration

Highest level of PKI security

Accelerated incident response

Minimized customer disruption

Reduced liability

Situation

A large sports arena was installing smart sensors in the facility that can detect indoor environmental factors such as air flow, chemical odors and smoke, etc.  ​
Should a potentially dangerous event occur such as a chemical spill, fire, or pathogen release, security staff can be quickly alerted, and emergency responders can be immediately dispatched.​
These sensors require x.509 certificates, and as part of the nation’s Critical National Infrastructure need to validate their Software Bill of Materials (SBOM).​

Solution

Device Authority KeyScaler was used to provide:

  • Generation of device root of trust using DDKG for Automated Device Provisioning​​
  • PKI Services for IoT utilizing x.509 Certificates issued by the corporate CA​
  • Identity Lifecycle Management including automatic provisioning to Azure IoT Hub​
  • Continuous Assurance utilizing the device Software Bill of Materials (SBOM)

Summary

Faster time to value

Reduced admin burden

Accelerated incident response

Minimized customer disruption

SBOM Validation/Continuous Assurance

In response to evolving cybersecurity threats, regulatory bodies such as the White House and the EU have introduced stringent requirements to bolster national and regional cybersecurity. Find out how KeyScaler can support organizations as they navigate this shifting landscape and take a proactive approach to cybersecurity to ensure compliance and validation throughout the entire device lifecycle.

Read more

KeyScaler Central

KeyScaler Central is the core server technology that enables automation of the full device identity lifecycle. KeyScaler Central contains the primary technologies needed to enable the full complement of KeyScaler’s automation capabilities.

Read more

Try Our ROI Calculator

Discover the potential savings and value our solutions can bring to your organization. Try our ROI calculator today to gain valuable insights into how our offerings can optimize your security investments. Start now and see the difference it can make.

Key Benefits

Automated device identity lifecycle management

Secure legacy devices

Enables IT/OT Convergence

Accelerated Incident Response

Supports regulatory compliance

Get in touch

Contact Us