Industrial Security , Mannheim, VDI. Tino Hildebrand Head Marketing & Promotion SIMATIC HMI Industrial Automation Systems Siemens AG

Size: px
Start display at page:

Download "Industrial Security , Mannheim, VDI. Tino Hildebrand Head Marketing & Promotion SIMATIC HMI Industrial Automation Systems Siemens AG"

Transcription

1 Wie sichern Sie Ihre Produktionsanlagen vor Angriffen aus dem Internet Industrial Security to guarantee top performance in production , Mannheim, VDI Tino Hildebrand Head Marketing & Promotion SIMATIC HMI Industrial Automation Systems Siemens AG

2 CERT (Computer Emergency Response Team): Global Network for cyber security issues and requests The organizational background for CERT organizations CERT cooperation Department of Homeland Security (DHS) The first CERT was founded in 1988 as a consequence of the first Internet Worm National Cyber Security Division (NCSD) Approx. 250 CERT organizations worldwide representing both governmental and private organizations Trusted information exchange via the FIRST (Forum of Incident Response and Security Teams) organization, new parties must be introduced by at least two existing members Expected rules of cooperation between FIRST members are defined in FIRST operational framework Control Systems Security Program (CSSP) Industrial Control System CERT (ISC-CERT) Focus : Control Systems only cooperates with US-CERT Focus: All IT-related issues related to US Page I IA AS S MP / Tino Hildebrand

3 Current CERT landscape showing Siemens CERT and other exemplary CERT organizations Communication between Siemens & ICS-CERT CERT cooperation Worldwide CERT network (over 250 governmental / private CERT organizations) Siemens CERT is first contact point for cyber security issues and requests concerning Siemens internal IT as well as product issues and requests CERT-Bund (Part of BSI) US-CERT ICS-CERT GovCERT.NL UKCERT Information is exchanged via trusted, encrypted channels (data) or telephone CERT.CC Siemens CERT ICS-CERT has so far notified Siemens CERT with several vulnerabilities which were disclosed by researchers to them AusCERT CNCERT Product CERT Service Corporate CERT Service Source: CERT/CC Page I IA AS S MP / Tino Hildebrand

4 Introduction Technological challenges How to implement Industrial Security Siemens to support your Industrial Security strategy The Defense in Depth Strategy in detail Summary

5 What are the current publications all about? Remember Stuxnet in 2010? Stuxnet was a highly sophisticated piece of malware Combined known and unknown vulnerabilities Designed to sabotage industrial processes What are this new SIMATIC vulnerability? Test of automation vendor components by ICS-CERT CERT ICS = Computer Emergency Response Team(s) = Industrial Control Systems Negative test results are sent as alerts to vendors Vendors patch weaknesses and/or warn customers Page I IA AS S MP / Tino Hildebrand

6 Vulnerability Disclosures Trends and Growth Reasons for a strong growth of vulnerability disclosures Trends Applications shifting to Cloud Computing approaches Increased use of Mobile Devices Weak members in the corporate security chain (top down) Employee Smartphone Laptops PC workstations Network infrastructure Mobile storage devices Tablet PC Computer centre Policies and guidelines Printer Production systems Page I IA AS S MP / Tino Hildebrand

7 Why is Industrial Security so important? Industrial Security for protection of production plant and automation systems Possible threat scenarios: Spying on data, recipes, Sabotage of production plant Plant downtime e.g. caused by virus and malware Manipulation of data or of application software Unauthorized use of system functions Possible effects of a security incident: Risk of death and serious injury Environmental impact Loss of intellectual property Loss of production or impaired product quality Damage to company image and financial loss Page I IA AS S MP / Tino Hildebrand

8 Introduction Technological challenges How to implement Industrial Security Siemens to support your Industrial Security strategy The Defense in Depth Strategy in detail Summary

9 has to cover a broad range of objectives Market security requirements Security requirements are driven by Process Automation (e.g. Pharmacy, FDA) and Energy Industry: Automated asset management of used components Automated identification of status of production (Legal) Proof of authorized exchange of devices OEM request: copy protection (even if reverse engineering is used) of their Software Components Requirements in integrated security for automation products Know How Protection Access Protection and User Management Communication Security System Integrity Process security for the whole Supply Chain Additional Malware/Spyware protection Industrial Security addresses end customers, machine builders and system integrators requirements Page I IA AS S MP / Tino Hildebrand

10 Office and Industrial World with different requirements Office Security Confidentiality Integrity Availability Industrial Security Availability Integrity Confidentiality Requirements that a Security solution must meet in an industrial context 24/7/365 availability has top priority Open standards for seemless communication and functionality Common standards, e.g. Microsoft systems software, as basis of automation solutions Constant operability and assured system access System performance Protection against mal-operations and sabotage Know-how protection System and data integrity Continuous communication between office and production IT systems for real time monitoring and controlling Data transfer in real time for efficient production processes Support throughout the lifecycle of a plant Security trail and change management Page I IA AS S MP / Tino Hildebrand

11 Introduction Technological challenges How to implement Industrial Security Siemens to support your Industrial Security strategy The Defense in Depth Strategy in detail Summary

12 Why to implement a security strategy instead of having just security measures? Great Wall Unconquerable wall single layer of protection no more checkpoints behind the wall No single security measure is good enough to prevent intrusions! Defense in Depth multiple layers of protection each layer supports the other layers for every transition between two layers an attacker must spend time and effort Page I IA AS S MP / Tino Hildebrand

13 Defense in Depth strategy - Creating multiple layers of protection Potential Threat Physical Security - Physical access to facilities and equipment Policies & procedures -Security management processes -Operational Guidelines -Business Continuity Management & Disaster Recovery DCS Security cells & DMZ -Secure architecture based on network segmentation Firewalls and VPN - Implementation of Firewalls as the only access point to a security cell System hardening - adapting system from default to secure User Account Management - Administration of operator und user rights (role based access control) Patch Management Defense in Depth because you should not rely on just one measure Malware detection and prevention - Anti Virus and Whitelisting Page I IA AS S MP / Tino Hildebrand

14 Defense in Depth strategy - Example Prevention: Firewall VPN Reaction: IDS IPS Virus Scanner Tolerant: Embedded hardening A safe and trustworthy operation needs more than one security layer - embedded security is needed Page I IA AS S MP / Tino Hildebrand

15 Fundamental Industrial Security levels Plant security Access blocked for unauthorized persons Physical prevention of access to critical components Plant IT security Controlled interfaces between office and plant network e.g. via firewalls Further segmentation of plant network Antivirus and whitelisting software Maintenance and update processes Access protection User authentication for plant or machine operators Integrated access protection mechanisms in automation components Industrial Security levels according to current standards and regulations Security solutions in an industrial context must take account of all protection levels Page I IA AS S MP / Tino Hildebrand

16 Automation Cells guarantee high productivity and ensure security requirements Complete plant security Internet Secure automation cells Structured actions as part of a comprehensive security concept are required on several different levels. One important protection level is to create secure automation cells by segmenting the network and restricting communication between the cells. Open communication between different automation components within a secure automation cell is state-ofthe-art and standardized (It is, for example, quite common to run production via OPC.) = secure communication between automation cells Page I IA AS S MP / Tino Hildebrand

17 Automation Cells guarantee high productivity and ensure security requirements Complete plant security Secure automation cells Internet Secure automation cells Structured actions as part of a comprehensive security concept are required on several different levels. One important protection level is to create secure automation cells by segmenting the network and restricting communication between the cells. Open communication between different automation components within a secure automation cell is state-ofthe-art and standardized (It is, for example, quite common to run production via OPC.) = secure communication between automation cells Page I IA AS S MP / Tino Hildebrand

18 needs contribution by everyone Management Operators OEM / System integrators Measures and processes that prevent unauthorized access of persons to the surrounding area of the plant Physical access protection for critical automation components (e.g. locked control cabinets) Requirements that operators of industrial automation systems must meet: Security guidelines and processes, Risk management in terms of security Information and document mgmt. etc. System-side requirements in terms of. Access protection, user control Data integrity and confidentiality Controlled data flow, etc. Component suppliers Requirements that components of an automation system must meet in terms of Product development processes Product functionalities Page I IA AS S MP / Tino Hildebrand

19 Introduction Technological challenges How to implement Industrial Security Siemens to support your Industrial Security strategy The Defense in Depth Strategy in detail Summary

20 Fundamental Industrial Security levels Plant security Access blocked for unauthorized persons Physical prevention of access to critical components Plant IT security Controlled interfaces between office and plant network e.g. via firewalls Further segmentation of plant network Antivirus and whitelisting software Maintenance and update processes Access protection User authentication for plant or machine operators Integrated access protection mechanisms in automation components Industrial Security levels according to current standards and regulations Security solutions in an industrial context must take account of all protection levels Page I IA AS S MP / Tino Hildebrand

21 Siemens Industrial Security approach Siemens Industrial Security approach Implementation of practicable and comprehensive Security Management in terms of the technology used as well as the engineering and production processes. The interfaces to office IT and the Internet/Intranet are subject to clearly defined regulations - and are monitored accordingly. PC-based systems (HMI, engineering and PC-based controls) must be protected with the aid of anti-virus software, whitelisting (positive lists) and integrated security mechanisms. The control level is protected by various integrated security functions. Communication must be monitored and can be intelligently segmented by means of firewalls. The Siemens Industrial Security approach is based on five key points that cover the main aspects of protection in all Industrial Security levels. Page I IA AS S MP / Tino Hildebrand

22 Siemens offering Industrial Security Services Professional consulting from the initial planning steps, through implementation and operation of a tailor-made solution, right up to its modernization Analysis of weak points Design of customized security solutions Security Management Within operations there is a clear need for processes and policies that cover all aspects for security Operational guidelines form an essential part of every Industrial Security concept Products & Systems Well thought-out concepts for the security of PCs, controllers and networks, fully in keeping with the spirit of Totally Integrated Automation Integral security in PCs and controllers Security products for networking and communication Siemens supports in selectively implementing these measures within the scope of an integrated range for industrial security Page I IA AS S MP / Tino Hildebrand

23 Security Management Industrial IT Security Services Security Management Products & Systems Security Management Security Management Process Security management and operational guidelines form an essential part of every Industrial Security concept Security measures have to be defined depending on the identified threats and risks to the plant Achievement and continuous preservation of the necessary security level needs a consequent security management process containing risk analysis with definition of mitigation measures coordination of organizational / technical measures regular / event-based repetition of the risk analysis. Industrial Security must be established at suppliers, integrators and operators likewise. Products, plants and processes have to be compliant with existing due diligence based on laws, standards, internal guidelines and state of the art. 4 Validation & improvement 1 3 Risk analysis Technical measures 2 Policies, Organizational measures Operational guidelines covering organizational and technical measures Page I IA AS S MP / Tino Hildebrand

24 Introduction Technological challenges How to implement Industrial Security Siemens to support your Industrial Security strategy The Defense in Depth Strategy in detail Summary

25 Defense in Depth strategy - Creating multiple layers of protection Potential Threat Physical Security - Physical access to facilities and equipment Policies & procedures -Security management processes -Operational Guidelines -Business Continuity Management & Disaster Recovery DCS Security cells & DMZ -Secure architecture based on network segmentation Firewalls and VPN - Implementation of Firewalls as the only access point to a security cell System hardening - adapting system from default to secure User Account Management - Administration of operator und user rights (role based access control) Patch Management Defense in Depth because you should not rely on just one measure Malware detection and prevention - Anti Virus and Whitelisting Page I IA AS S MP / Tino Hildebrand

26 - Defense in Depth strategy Physical Security Ignoring the risk of physical security could undo all other security measures Restrict physical and unauthorized access to Facilities and buildings Control and equipment rooms Cabinets Devices, PCs (USB, CD/DVD) Switches, cables and wiring LAN Ports, WiFi, Controller, IO System, PS, etc. Page I IA AS S MP / Tino Hildebrand

27 - Defense in Depth strategy Policies, Procedures,Training: Most critical path of an effective security strategy Management buy-in Defined Responsibilities Control System specific: Remote access & Service Laptops Portable Media Patch Management Strategy Malware Protection Mitigation and Disaster Recovery Plan Change Management & documentation Maintenance of Security Measures (e.g. FW rules) Regular Auditing of implemented measures Raise security awareness of personnel Provide training on policies and procedures Page I IA AS S MP / Tino Hildebrand

28 - Defense in Depth strategy Security Cells and DMZ: Key to a Secure System Architecture Limits the effect of a security threat to the local cell Internal network structure will not be visible from outside Access to the security cell only via clearly defined access points Page I IA AS S MP / Tino Hildebrand

29 - Defense in Depth strategy Firewalls and VPN: Secure access to the security cell Virtual Private Networks (VPN) with Data Encryption secure connections between cells through an unprotected network SCALANCE S for encypted, authenticated data exchange between devices through the IPsec tunnel in the VPN The data exchange/communication is protected against: eavesdropping espionage and manipulation Page I IA AS S MP / Tino Hildebrand

30 - Defense in Depth strategy System Hardening Commercially available PCs contain a lot of software that is not used by the process control system Many viruses are written against common software like Internet Explorer, Media Player, Active X, Javascript, Adapt an out of the box system from default to secure: Disable or lock down USB, CD/DVD, unused communication ports Remove and disable unnecessary applications, protocols and services e.g. , Games, Autorun, Screensaver, Messenger, Apply latest MS Patches SSC Siemens Security Console (DCOM, FW, limiting file registry, sharing, and database access) Bios PW and limit desktop and system access IP hardened equipment ensures that critical automation components do not fail when subjected to communication stress Page I IA AS S MP / Tino Hildebrand

31 - Defense in Depth strategy Preventing a wide range of attacks: Patch Management 90% of all successful cyber security attacks are based on vulnerabilities for which patches have already been released Only 2% of all equipment is completely patched (source: Secunia) PCS 7/WinCC support for MS Security Patches New MS Security Patches are tested for compatibility with latest/supported versions of PCS 7 Test results published via Newsletter and FAQ Patch Deployment via centralized Patch Server located in a perimeter network (DMZ) and Windows Server Update Serv. (WSUS) Setup of Patch Groups and Procedures for updating online (redundant system) Page I IA AS S MP / Tino Hildebrand

32 - Defense in Depth strategy Malware detection and prevention: Virus Scanner & Whitelisting The following virus scanners are approved: Trend Micro Office Scan Symantec Endpoint Protection McAfee VirusScan Enterprise To avoid a negative impact on performance or response time of the system, follow the recommended setup guidelines for PCS 7/ WinCC based Control systems Whitelisting to Stop unauthorized applications and malware Whitelisting software creates or holds a list of programs and applications that are allowed to be executed on a PC Software that is not part of the Whitelist will not be executed Benefits no pattern updates required less maintenance effective protection against zero-day exploits Page I IA AS S MP / Tino Hildebrand

33 - Defense in Depth strategy Summary Office PC OS Client OS Server Enterprise Control Network Office PC Perimeter Netzwork (DMZ) OS Client Process Control Network (DCS) OS Server WSUS or WWW IT - Firewall WSUS WAN AV Server Whitelisting Console Front - Firewall Engineering Station Quarantine - PC Back - Firewall Page I IA AS S MP / Tino Hildebrand Segmentation in Security Cells and DMZ Cell access via Front & Back FW only All Ports and Media Drives disabled PC hardening Latest MS Patches Role-Based Access Control and User Account Management with least privilege principle Anti Virus & Whitelisting File and data transfer to and from PCS 7 via Quarantine PC and FTP/SFTP in DMZ Remote access via secure communication, dedicated Access points and defined support user accounts and Policies and Procedures!

34 Introduction Technological challenges How to implement Industrial Security Siemens to support your Industrial Security strategy The Defense in Depth Strategy in detail Summary

35 More security where it matters in industrial automation Security at the control level Security Management Security at the communication level IT Link to the Office World PC based security functions see the website Page I IA AS S MP / Tino Hildebrand

36 Summary Industrial Security is not only a topic of technical implementation, but starts from security awareness across all layers of management and employees Industrial Security Security is an ongoing task and must be ensured through all lifecycle phases There is no 100% security Security is a process involving management, operators, integrators and suppliers and not only a product for sale Siemens Industry Automation provides products, systems and solutions as well as professional services to ensure overall Industrial Security for customers Page I IA AS S MP / Tino Hildebrand

37 Thank you for your attention! Tino Hildebrand Head Marketing & Promotion SIMATIC HMI I IA AS S MP Phone: +49 (911) Fax: +49 (911) Cellular: +49 (173) tino.hildebrand@siemens.com _IndustrialSecurity_VDI_Mannheim_Hildebrand_EN.ppt

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

Operational Guidelines for Industrial Security

Operational Guidelines for Industrial Security Operational Guidelines for Industrial Security Proposals and recommendations for technical and organizational measures for secure operation of plant and machinery Version 2.0 Operational Guidelines for

More information

Protecting productivity with Plant Security Services

Protecting productivity with Plant Security Services Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services

More information

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.

Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved. Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Support and Remote Dialup SIMATIC. Process Control System PCS 7. Support and Remote Dialup. Preface 1. Support and Remote Dialup.

Support and Remote Dialup SIMATIC. Process Control System PCS 7. Support and Remote Dialup. Preface 1. Support and Remote Dialup. Preface 1 2 SIMATIC Process Control System PCS 7 Dialup 3 Practical information 4 Commissioning Manual 12/2011 A5E02657554-02 Legal information Legal information Warning notice system This manual contains

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

Implementing Security Update Management

Implementing Security Update Management Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

CYBER SECURITY. Is your Industrial Control System prepared?

CYBER SECURITY. Is your Industrial Control System prepared? CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there

More information

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry. Security all around Industrial security for your plant at all levels siemens.com/industrialsecurity Answers for industry. A systematic approach to minimize threats With the increased use of Ethernet connections

More information

Driving Company Security is Challenging. Centralized Management Makes it Simple.

Driving Company Security is Challenging. Centralized Management Makes it Simple. Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary

More information

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

The Electronic Arms Race of Cyber Security 4.2 Lecture 7 The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte List of Content Why Process Automation Security? Security Awareness Issues

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates,

More information

Security in the smart grid

Security in the smart grid Security in the smart grid Security in the smart grid It s hard to avoid news reports about the smart grid, and one of the media s favorite topics is security, cyber security in particular. It s understandable

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Supplier Information Security Addendum for GE Restricted Data

Supplier Information Security Addendum for GE Restricted Data Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,

More information

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Architecting the Internal Cloud Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc. Securely Building the Internal Cloud Virtualization is the Key How Virtualization Affects

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

SANS Top 20 Critical Controls for Effective Cyber Defense

SANS Top 20 Critical Controls for Effective Cyber Defense WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects

More information

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall What you don t know will hurt you Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter

More information

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

SCADA Cyber Security

SCADA Cyber Security SCADA Cyber Security Information on Securing SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: erik.daalder@nl.yokogawa.com

More information

The Protection Mission a constant endeavor

The Protection Mission a constant endeavor a constant endeavor The IT Protection Mission a constant endeavor As businesses become more and more dependent on IT, IT must face a higher bar for preparedness Cyber preparedness is the process of ensuring

More information

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015

Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Siemens Osakeyhtiö Cyber security tackling the risks with new solutions and co-operation Miikka Pönniö 22.9.2015 Restricted Siemens Osakeyhtiö 2015. All Rights Reserved. siemens.fi/answers Cyber security

More information

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc. Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim

More information

GE Measurement & Control. Cyber Security for Industrial Controls

GE Measurement & Control. Cyber Security for Industrial Controls GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Network/Cyber Security

Network/Cyber Security Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

Information Security Policy

Information Security Policy Information Security Policy Steve R. Hutchens, CISSP EDS, Global Leader, Homeland Security Agenda Security Architecture Threats and Vulnerabilities Design Considerations Information Security Policy Current

More information

Remote Services. Managing Open Systems with Remote Services

Remote Services. Managing Open Systems with Remote Services Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater

More information

Securityconcept fortheprotectionofindustrialplants. Industrial Security. White PaperV1.0

Securityconcept fortheprotectionofindustrialplants. Industrial Security. White PaperV1.0 Securityconcept fortheprotectionofindustrialplants Industrial Security White PaperV1.0 June 2013 Prologue This whitepaper gives an overview of Industrial Security. It describes the threats and risks to

More information

Best Practices for DanPac Express Cyber Security

Best Practices for DanPac Express Cyber Security March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Critical Controls for Cyber Security. www.infogistic.com

Critical Controls for Cyber Security. www.infogistic.com Critical Controls for Cyber Security www.infogistic.com Understanding Risk Asset Threat Vulnerability Managing Risks Systematic Approach for Managing Risks Identify, characterize threats Assess the vulnerability

More information

Accelerate Patching Progress in the Enterprise. Wolfgang Kandek CTO Qualys, Inc.

Accelerate Patching Progress in the Enterprise. Wolfgang Kandek CTO Qualys, Inc. Accelerate Patching Progress in the Enterprise Wolfgang Kandek CTO Qualys, Inc. Introduction Patch Management Patch Progress Data Common Steps Case Studies Actions Summary References Q&A 2 Patch Management

More information

ABB s approach concerning IS Security for Automation Systems

ABB s approach concerning IS Security for Automation Systems ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik stefan.kubik@de.abb.com The problem Most manufacturing facilities are more connected (and

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding

More information

Process Solutions. Staying Ahead of Today s Cyber Threats. White Paper

Process Solutions. Staying Ahead of Today s Cyber Threats. White Paper Process Solutions White Paper Staying Ahead of Today s Cyber Threats Executive Summary In an age where ubiquitous flash drives can become precision-guided munitions and a serious security breach is a single,

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

Using Tofino to control the spread of Stuxnet Malware

Using Tofino to control the spread of Stuxnet Malware technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping

Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control

More information

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL for INFORMATION RESOURCES Updated: June 2007 Information Resources Security Manual 1. Purpose of Security Manual 2. Audience 3. Acceptable

More information

Information Technology Security Procedures

Information Technology Security Procedures Information Technology Security Procedures Prepared By: Paul Athaide Date Prepared: Dec 1, 2010 Revised By: Paul Athaide Date Revised: September 20, 2012 Version 1.2 Contents 1. Policy Procedures... 3

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

Cyber Security Where Do I Begin?

Cyber Security Where Do I Begin? ISPE Automation Forum Cyber Security Where Do I Begin? Don Dickinson Project Engineer Phoenix Contact ..50% more infected Web pages Click in the on one last and three you months won t of notice 2008 than

More information

Did you know your security solution can help with PCI compliance too?

Did you know your security solution can help with PCI compliance too? Did you know your security solution can help with PCI compliance too? High-profile data losses have led to increasingly complex and evolving regulations. Any organization or retailer that accepts payment

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

Protecting the un-protectable Addressing Virtualisation Security Challenges

Protecting the un-protectable Addressing Virtualisation Security Challenges Protecting the un-protectable Addressing Virtualisation Security Challenges Paul Hogan, Technical Director, Ward Solutions November 11, 2010 Top Cloud Security Challenges Secure Virtualisation Need secure

More information

How to Secure Your Environment

How to Secure Your Environment End Point Security How to Secure Your Environment Learning Objectives Define Endpoint Security Describe most common endpoints of data leakage Identify most common security gaps Preview solutions to bridge

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

Secure Software Update Service (SSUS ) White Paper

Secure Software Update Service (SSUS ) White Paper White Paper Secure Software Update Service (SSUS ) White Paper Author: Document Version: r03c Jeffrey Menoher Publish Date: 9/6/2013 Secure. Reliable. Fast Problem Many software updates, including operating

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations TECHNICAL WHITE PAPER Symantec pcanywhere Security Recommendations Technical White Paper Symantec pcanywhere Security Recommendations Introduction... 3 pcanywhere Configuration Recommendations... 4 General

More information

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals Learning Objective Explain the concepts of information systems security (ISS) as applied to an IT infrastructure.

More information

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee

Created By: 2009 Windows Server Security Best Practices Committee. Revised By: 2014 Windows Server Security Best Practices Committee Windows Server Security Best Practices Initial Document Created By: 2009 Windows Server Security Best Practices Committee Document Creation Date: August 21, 2009 Revision Revised By: 2014 Windows Server

More information

Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware

Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware A White Paper presented by: Torsten Rössel Director of Business Development Innominate Security Technologies

More information

Network Security Guidelines. e-governance

Network Security Guidelines. e-governance Network Security Guidelines for e-governance Draft DEPARTMENT OF ELECTRONICS AND INFORMATION TECHNOLOGY Ministry of Communication and Information Technology, Government of India. Document Control S/L Type

More information

Effective Defense in Depth Strategies

Effective Defense in Depth Strategies Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview

More information

Unified Threat Management, Managed Security, and the Cloud Services Model

Unified Threat Management, Managed Security, and the Cloud Services Model Unified Threat Management, Managed Security, and the Cloud Services Model Kurtis E. Minder CISSP Global Account Manager - Service Provider Group Fortinet, Inc. Introduction Kurtis E. Minder, Technical

More information

Decrease your HMI/SCADA risk

Decrease your HMI/SCADA risk Decrease your HMI/SCADA risk Key steps to minimize unplanned downtime and protect your organization. Are you running your plant operations with serious risk? Most industrial applications lack recommended

More information

Data Security and Healthcare

Data Security and Healthcare Data Security and Healthcare Complex data flows Millions of electronic medical records across many systems New and emerging business relationships Changing and maturing compliance frameworks Diverse population

More information

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

Guidelines for Website Security and Security Counter Measures for e-e Governance Project and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online

More information

Post-Stuxnet Industrial Security

Post-Stuxnet Industrial Security Post-Stuxnet Industrial Security Zero-Day Discovery and Risk Containment of Industrial Malware with Innominate mguard Technology Introduction Following its discovery in June 2010, the Stuxnet worm triggered

More information

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)

More information

Network Security. Intertech Associates, Inc.

Network Security. Intertech Associates, Inc. Network Security Intertech Associates, Inc. Agenda IT Security - Past to Future Security Vulnerabilities Protecting the Enterprise What do we need in each site? Requirements for a Security Architecture

More information

Cyber Essentials Scheme

Cyber Essentials Scheme Cyber Essentials Scheme Requirements for basic technical protection from cyber attacks June 2014 December 2013 Contents Contents... 2 Introduction... 3 Who should use this document?... 3 What can these

More information

Information Technology Branch Access Control Technical Standard

Information Technology Branch Access Control Technical Standard Information Technology Branch Access Control Technical Standard Information Management, Administrative Directive A1461 Cyber Security Technical Standard # 5 November 20, 2014 Approved: Date: November 20,

More information

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES MOBILITY & INTERCONNECTIVITY Features SECURITY OF INFORMATION TECHNOLOGIES Frequent changes to the structure of enterprise workforces mean that many are moving away from the traditional model of a single

More information

Information Technology Solutions

Information Technology Solutions Managed Services Information Technology Solutions A TBG Security Professional Services Offering LET TBG MANAGE YOUR INFRASTRUCTURE WITH CONFIDENCE: TBG S INTEGRATED IT AUTOMATION FRAMEWORK PROVIDES: Computer

More information

IT Security in Process Automation - Top Ten

IT Security in Process Automation - Top Ten IT Security for Process Control Field Devices, Services and Maintenance INTERKAMA Forum, April 13 th, 2005 Slide 1 IT Security in Process Automation Content Why is this important? Security Measures in

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

New possibilities in latest OfficeScan and OfficeScan plug-in architecture New possibilities in latest OfficeScan and OfficeScan plug-in architecture Märt Erik AS Stallion Agenda New in OfficeScan 10.5 OfficeScan plug-ins» More Active Directory support» New automated client grouping

More information

McAfee - Overview. Anthony Albisser

McAfee - Overview. Anthony Albisser McAfee - Overview Anthony Albisser Channel Account Manager About McAfee Founded in 1987, McAfee is now the world s largest dedicated security company (acquired by Intel in 2011) Global research for real-time

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

Securing The Connected Enterprise

Securing The Connected Enterprise Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise

More information

Endpoint protection for physical and virtual desktops

Endpoint protection for physical and virtual desktops datasheet Trend Micro officescan Endpoint protection for physical and virtual desktops In the bring-your-own-device (BYOD) environment, protecting your endpoints against ever-evolving threats has become

More information

Chapter 9 Firewalls and Intrusion Prevention Systems

Chapter 9 Firewalls and Intrusion Prevention Systems Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish

More information