This infographic outlines the comprehensive security measures implemented in the Riseberg IoT Platform, ensuring protection at every layer.
Riseberg's security strategy is built on two fundamental pillars, ensuring end-to-end protection for the entire IoT solution.
Robust protection for connected devices, their communications, and the data they generate, from the sensor to the cloud. This includes secure device identity, encrypted channels, and data integrity checks.
Ensuring secure access for users, protecting their interactions with the platform, and maintaining the confidentiality of user data through strong authentication, authorization, and encrypted communications.
We employ multi-layered security measures to authenticate devices, encrypt communications, and ensure data integrity throughout its lifecycle.
The "Secure Pairing" process is critical for establishing a trusted identity for each device. It involves unique hardware identifiers, X.509 certificates, and optional TPM/HSM support for enhanced private key protection.
Secure Pairing Process:
X.509 certificates have a default 3-month expiration (configurable) and are regularly rotated.
Confidentiality is paramount. Data is encrypted both in transit and at rest.
All device-to-cloud communications use TLS 1.2/1.3 with robust cipher suites (e.g., AES-256 GCM) for protocols like MQTT and HTTP/2.
Stored data is protected by multiple encryption layers:
Encryption keys are managed by dedicated KMS, separate from the data.
Ensuring data is untampered and credentials are secure is vital.
We use strong cryptographic hash functions like SHA-256 / SHA-512 to verify message integrity, ensuring data isn't altered.
Device X.509 certificates are regularly rotated. We also implement fast revocation mechanisms (CRL/OCSP) for compromised or decommissioned devices.
User access to the Riseberg platform is safeguarded by strict authentication and authorization mechanisms, ensuring data privacy and secure interactions.
We provide flexible and secure authentication options:
All interactions with the platform are secured:
All web and mobile app interactions occur exclusively over HTTPS (TLS), with HSTS support to prevent downgrade attacks.
Our APIs are critical access points and are protected by:
Security is an ongoing process. Riseberg employs tools and procedures for continuous monitoring, detailed logging, and adherence to standards to maintain a secure and reliable operational environment.
| Feature | Description |
|---|---|
| SIEM Integration | Centralized collection, correlation, and analysis of security events from all platform components. |
| Immutable Logging | Detailed recording of all security access and operations in centralized, tamper-proof logs. |
| Audit Trails | Maintenance of a comprehensive audit trail for all configuration changes and critical events. |
| GDPR Compliance | Platform architecture and processes designed to comply with the General Data Protection Regulation. |
| Regular Audits & Pen Tests | Periodic security reviews and penetration tests conducted by independent third parties. |
Our Commitment to Security
At Riseberg, security is not an afterthought but the foundation upon which our platform is built. We are continuously committed to adopting best practices and evolving our measures to protect your data and ensure your operational peace of mind.