Kaspersky IoT Secure Gateway 100

Security objectives and constraints

Security objectives

The

of Kaspersky IoT Secure Gateway 100 include the following requirements:

  • Kaspersky IoT Secure Gateway 100 ensures secure, unidirectional transfer of data from the gateway-connected OPC UA server to the MQTT broker over the MQTT protocol while eliminating the possibility of the external network having any impact on internal resources of the enterprise.
  • Kaspersky IoT Secure Gateway 100 ensures the and of data transmitted to the MQTT broker.

of Kaspersky IoT Secure Gateway 100 is not a security objective of Kaspersky IoT Secure Gateway 100.

Security constraints

The

of Kaspersky IoT Secure Gateway 100 include the following limitations:

  • The hardware platform is trusted, so threats associated with its vulnerabilities are not considered.
  • No cybercriminal has physical access to the hardware platform, so threats associated with the corresponding vulnerabilities are not considered.
  • The threat level from the external network is medium (basic elevated).
  • The threat level from the internal network is low (basic).
  • Kaspersky IoT Secure Gateway 100 does not have internal administration resources. The software portion and configuration are saved on an extractable microSD card that can be physically accessed only by the administrator.
  • Kaspersky IoT Secure Gateway 100 cannot guarantee the integrity and confidentiality of data transmitted within the internal network from the gateway-connected OPC UA server to Kaspersky IoT Secure Gateway 100.
  • Kaspersky IoT Secure Gateway 100 cannot ensure that connected devices will be protected against attacks launched from within the internal network.
  • Kaspersky IoT Secure Gateway 100 is the only means to exchange data between the external network and internal network.
  • The hardware platform has separate network controllers for connecting to the internal and external network.
  • The MQTT broker supports connections over the protocol.

For more detailed information on assessing the information security threat level, please refer to the website of the relevant government agency with jurisdiction over technical and export regulations.

Threats associated with breached availability of the infrastructure, such as inaccessible communication channels between the sides of network interaction, are not considered.