AUD20 - Industrial Network Security

Size: px
Start display at page:

Download "AUD20 - Industrial Network Security"

Transcription

1 AUD20 - Industrial Network Security Lesley Van Loo EMEA Senior Commercial engineer - Rockwell Automation Rev 5058-CO900B Copyright 2012 Rockwell Automation, Inc. All rights reserved.

2 2 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Firewall, VPN) Secure Remote Access References

3 3 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Firewall, VPN) Secure Remote Access References

4 4 The Connected Enterprise

5 The Value in Bringing the Information Together Copyright 2012 Rockwell Automation, Inc. All rights reserved. Laboratory Information Management Systems Performance Production Scheduling Alarms/Events Quality Systems HMIs Control Systems Data Historians Other Database Systems Computerized Maintenance Management Systems You need to deliver the information fast, reliably and securely!

6 Risks and Threats to Control Systems Application of Security patches Natural or Man-made disasters Worms and viruses Theft Sabotage Unauthorized access INFORMATION Denial of Service Business Risk Unauthorized actions by employees Unauthorized remote access Unintended employee actions OPERATIONS Security risks increase potential for disruption to system uptime and safe operation and a loss of IP Copyright 2012 Rockwell Automation, Inc. All rights reserved.

7 7 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Firewall, VPN) Secure Remote Access References

8 8 Industrial Security Trends Security for the Connected Enterprise Scalable, robust, secure and futureready infrastructure for the Connected Enterprise: Application Software Network Holistic Defense-in-Depth

9 9 Industrial Security Trends Security Quips "Good enough" security now, is better than "perfect" security... never (Tom West, Data General) Security ultimately relies - and fails - on the degree to which you are thorough. People don't like to be thorough. It gets in the way of being done. (Dave Piscitello) Your absolute security is only as strong as your weakest link Concentrate on known, probable threats Security is not a static end state, it is an interactive process You only get to pick two of the three: fast, secure, cheap (Brett Eldridge)

10 Industrial Security Trends Established Industrial Security Standards International Society of Automation ISA/IEC (Formerly ISA-99) Industrial Automation and Control Systems (IACS) Security Defense-in-Depth IDMZ Deployment National Institute of Standards and Technology NIST Industrial Control System (ICS) Security Defense-in-Depth IDMZ Deployment Department of Homeland Security / Idaho National Lab DHS INL/EXT Control Systems Cyber Security: Defense-in-Depth Strategies Defense-in-Depth IDMZ Deployment A secure application depends on multiple layers of protection. Industrial security must be implemented as a system. Copyright 2012 Rockwell Automation, Inc. All rights reserved. 10

11 11 Industrial Security Trends EtherNet/IP Industrial Automation & Control System Network Open by default to allow both technology coexistence and device interoperability for Industrial Automation and Control System (IACS) Networks Secured by configuration: Protect the network - Electronic Security Perimeter Defend the edge - Industrial DMZ (IDMZ) Defense-in-Depth multiple layers of security

12 12 Defense In Depth - Don t miss the Depth A secure application depends on multiple layers of protection. Industrial security must be implemented as a system. Layered Security Model Shield potential targets behind multiple levels of protection to reduce security risks Defense in Depth Use multiple security countermeasures to protect integrity of components or systems Openness Consideration for participation of a variety of vendors in our security solutions Flexibility Able to accommodate a customer s needs, including policies & procedures Consistency Solutions that align with Government directives and Standards Bodies

13 14 Holistic Defense-in-Depth Critical Elements to Industrial Security one-size-fits-all A balanced Industrial Security Program must address both Technical and Non-Technical Elements Non-technical controls - rules for environments: e.g. standards, policies, procedures, and risk management Technical controls technology to provide restrictive measures for non-technical controls: e.g. Firewalls, Group Policy Objects, Layer 3 access control lists (ACLs) Security is only as strong as the weakest link Vigilance and Attention to Detail are KEY to the long-term security success

14 Partners Copyright 2012 Rockwell Automation, Inc. All rights reserved. 15 Security Innovation Building the Security-oriented Architecture Architecture Security Requirements Authenticated Access Data Confidentiality IP Protection Product & Network Hardening Tamper Prevention & Detection Partnering & Supply Chain Data Protection and Confidentiality Network IP protection Role-based Security Data Protection Anti- Tamper and Detection Remote Access Supply-chain

15 16 Holistic Defense-in-Depth Industrial Security Policies Drive Technical Controls Physical limit physical access to authorized personnel: Cells/Areas, control panels, devices, cabling, and control room. locks, gates, key cards, biometrics. This may also include policies, procedures and technology to escort and track visitors Network security framework e.g., firewall policies, access control list (ACL) policies for switches and routers, AAA, intrusion detection and prevention systems (IDS/IPS) Computer Hardening patch management, Anti-X software, removal of unused applications/ protocols/services, closing unnecessary logical ports, protecting physical ports Application authentication, authorization, and accounting (AAA) software Device Hardening change management, communication encryption, and restrictive access

16 17 Architectural Security Framework Cisco / Rockwell Automation CPwE Reference Architectures Flat and Open IACS Network Infrastructure Flat and Open IACS Network Infrastructure Structured and Hardened IACS Network Infrastructure

17 18 Architectural Security Framework Cisco / Rockwell Automation CPwE Reference Architectures Structured and hardened network infrastructure Scalable framework utilizing holistic defense-in-depth approach Security is pervasive, not a bolt-on component Alignment with industrial security standards (e.g. ISA, NIST) Industrial security policy: A-I-C vs. C-I-A Industrial DMZ implementation Remote partner access policy, with robust & secure implementation Network Security Services Must Not Compromise Plant/Site Operations Standard DMZ Design Best Practices AAA FactoryTalk Authentication Server, Active Directory (AD), AAA Radius / ISE Enterprise Zone Levels 4-5 Remote Access Server Level 3 Site Operations Industrial Demilitarized Zone (IDMZ) FactoryTalk Client OS Hardening Level 2 Area Supervisory Control Device Hardening, Encrypted Communications Device Hardening Physical Security Procedural VLANs, Segmenting Domains of Trust Zone Firewall Device Hardening, Electronic Level 1 - Controller VLANs Catalyst 3750 StackWise Switch Stack Enterprise WAN Cisco ASA 5500 Firewall (Active) Network Status and Monitoring Catalyst 6500/4500 Controller Controller Controllers, I/O, Drives External DMZ/ Firewall Physical or Virtualized Servers Patch Management Remote Desktop Gateway Server Application Mirror AV Server I/O Firewall (Standby) HMI Level 0 - Process Plant Firewall: Inter-zone traffic segmentation ACLs, IPS and IDS VPN Services Portal and Remote Desktop Services proxy Network Device Resiliency Network Infrastructure Hardening Access Control Drive Physical Port Security MCC Internet Soft Starter

18 19 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Firewall, VPN) Secure Remote Access References

19 20 Architectural Security Framework Physical Restrict Industrial Automation and Control System (IACS) access to authorized personnel only Control panels, devices, cabling, and control room Locks, gates, key cards, video Surveillance, other Authentication Devices (biometric, keypad, etc.). Physical port access (Ethernet and USB ports) Switch the Logix Controller key to RUN

20 21 Architectural Security Framework Physical Port Security Keyed solutions for copper and fiber Lock-in, Blockout products secure connections Data Access Port (keyed cable and jack)

21 23 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Firewall, VPN) Secure Remote Access References

22 24 Architectural Security Framework Device hardening Controller / communication modules Electronic design: Change passwords from default settings Logix Controller Source Protection Signed AOI s Logix Controller Data Access Control Signed firmware Trusted Slot Designation Disable unused ports Stratix managed switches (with CLI, Device Manager or Studio 5000 (AOP and code) USB port Logix controller and Ethernet communication card Message instruction (KB AID ) or Trusted slot feature Studio 5000 (V20 and later) USB ports industrial PC

23 25 Architectural Security Framework Device/ network hardening - Encrypted Communications Enables secure communications down to the controller chassis through IPSec VPN (L2TP) Create a secure link from a ControlLogix chassis to An engineering or HMI workstation A Services Router (like the Stratix 5900) or Cisco VPN Appliance (ASA) Another ControlLogix chassis for secure controller-to-controller messaging via EN2TSC Authentication to this module required before gaining access to modules on the Local 1756 backplane 1756-EN2TSC Take proper precautions unintentional threats can occur more often than intentional ones

24 26 Architectural Security Framework Device/ network hardening - Encrypted Communications ControlLogix Secure Communications Module 1756-EN2TSC Secure client connections (i.e., maintenance lap tops, servers) Secure program uploads and downloads Secure communications between ControlLogix controllers

25 27 Demo 1756-EN2TSC Connect a Windows PC securely to a ControlLogix controller 1. Setup EN2TSC Enable security features Configure with what device you are connecting too EN2TSC Windows based PC Application server (ASA) or service router (Stratix 5900) Disable connections and services to the controller / EN2TSC 2. Setup your VPN network on your windows based PC Instructions can be easily found on the internet for different Win OS 3. Connect via VPN tunnel 4. Trusted slot designation

26 28 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Stratix security features, Firewall, VPN) Secure Remote Access References

27 29 Architectural Security Framework Network Hardening How can I keep bad guys off my industrial networks? I m worried hackers are trying to get into my control system to disrupt or manipulate its operation Safety, Availability, IP protection are all critical to me. Network Hardening enables secure enterprise connectivity, remote manufacturing and remote engineering Rockwell Automation solutions available today include: Architectural Guidelines Network and Security Services Electronic design ControlLogix secure communication module Stratix Portfolio of Routers & Switches NEW! Stratix 5900 Services Router

28 The Stratix Portfolio Simplifying the Integration of Industrial & Enterprise Environments Products that deliver Layer 2 and Layer 2 switching for simple to complex networks applications Advanced security services Plant-floor and Enterprise integration Technology that offers Advanced switching, routing & security features Common tools for Controls & IT Improved maintainability Addressing the needs of Automation as well as Operations and IT Stratix 5100 Wireless Access Point

29 The Stratix Value Designed & developed for Industrial EtherNet/IP applications Optimize network performance QoS Quality of Service - default configurations are set to ODVA standards for EtherNet/IP industrial applications for discrete, motion, safety and process applications; security: minimize impact DoS attacks IEEE1588 (CIP Sync) - ODVA implementation of the IEEE 1588 precision time protocol ensures performance when connecting EtherNet/IP devices Simplify design, deployment and maintainability DHCP per port - assign a specific IP address to each port, ensuring that the device attached to a given port will get the same IP address Broken Wire Detection - detect cabling problems like, open, broken, cut or shorted twisted-pair wires, with status availability in Logix Network Address Translation NAT A 1:1 IP address translation to help segment machine level network devices from the plant network, translate only the devices that need to be visible to the plant network

30 Stratix Security Features Application/Project (CIP) based port access Controller based port control (on/off) Default settings for port access based on controller mode (idle/fault) Unauthorized device identification (tags) per port Configurable port security Preconfigured port security set-up via smartports Configure number of devices allowed per port Configurable device MAC ID authentication Storm control per port Encrypted administrative traffic SSHv2, SNMPv3, and HTTPS support Advanced capability (via CLI) Multiple layers (7) of password protection Access Control Lists (ACLs) to apply security policies per port 802.1x for user authentication DHCP Snooping and IP source guard to prevent spoofing TACACS+ and Radius for centralized authentication Simple tools to help standardize and enforce security policies

31 33 Port Security MAC address-based This feature is available on Stratix 5700, 8000 and 8300 managed switches. Provides a simple method for restricting network host access based on Media Control Access Address (MAC Address). A specific switch port can be blocked when: A greater number of source MAC addresses than configured is seen on the port. Source MAC address(es) seen on the port is not contained in a defined list. Each Port Security policy violation additionally triggers an alarm in the switch.

32 34 Access Control Lists (ACLs) In computer networks this is the preferred method of network administrators to filter traffic and apply security policies. For example, a network administrator may want to allow users access to the Internet to browse web pages (HTTP) but deny file exchange (FTP). An ACL is a sequential list of permit or deny statements that apply to addresses (MAC and IP) or upper-layer protocols.

33 35 Access Control Lists (ACLs) ACLs can be applied to an interface (IP or switch port) Inbound or outbound mode. Stratix 5700, 8000 and 8300 switches support only inbound mode for all ACLs. When an access lists applied to an inbound interface, the packets are checked against the access list before any routing or switching table lookup process occurs. All ACLs have an implied Deny Any Any at the end; Any traffic not specifically allowed will be dropped Does not inspect traffic Access Control Lists configuration can be done using: Command Line Interface (CLI) Primary user interface for configuring, monitoring and maintaining Cisco devices. It is the primary tool used by IT professionals today. Cisco network Assistant (CNA) (Stratix 5700, 8000 and 8300) Stratix Configurator (Stratix 5900)

34 Network Segmentation Structured and Hardened Network Infrastructure Smaller modular building blocks to help minimize network sprawl and build scalable, robust and future-ready network infrastructure Smaller fault domains (e.g. Layer 2 loops) Smaller broadcast domains Smaller domains of trust (security) Multiple techniques to create smaller network building blocks (Layer 2 domains) Structure and hierarchy Logical model geographical and functional organization of IACS devices Campus network model - multi-tier switch model Layer 2 and Layer 3 Logical framework Segmentation Multiple network interface cards (NICs) e.g. CIP bridge Network Address Translation (NAT) appliance Virtual Local Area Networks (VLANs) VLANs with NAT Integrated Services Router (Stratix 5900) Copyright 2012 Rockwell Automation, Inc. All rights reserved. 39

35 40 Demo security features Stratix platform Panduit Lock-in and block-out products Application/Project (CIP) based port access Controller based port control (on/off) Storm control (AOP) Configurable port security Smartports -> preconfigured port security set-up (Number of devices allowed per port) Segmentation VLANs and NAT

36 41 Architectural Security Framework Network hardening - Segmentation Enterprise-wide Network Enterprise-wide Network Enterprise-wide Network Enterprise-wide Network Plant-wide Network Switch with VLANs Plant-wide Network Plant-wide Network Plant-wide Network Not Recommended as only solutions Recommended Depends based on customer standards, security policies and procedures, risk tolerance, and alignment with IACS Security Standards Enterprise-wide Network Enterprise-wide Network Enterprise-wide Network Router (Zone Based FW) Firewall IDMZ Plant-wide Network Plant-wide Network Plant-wide Network Good Better Best

37 Architectural Security Framework Stratix 5900 Layer 2 & Layer 3 Services Router Premiere routing and security services for Layer 2 or Layer 3 Router + Firewall Virtual Private Network (VPN) Network Address Translation (NAT) Access Control Lists (ACL) 1GE WAN, 4 FE LAN, 1 Serial Port Built with Cisco technology (IOS) Common features of the Stratix Ethernet managed switch family Common IT development tools (CLI, DM, CiscoWorks, CCP) Supports advanced monitoring & troubleshooting (Netflow) Industrially hardened, DIN rail mountable Ideal Ideal for for helping Site to Site protect Connections, communications Cell/Zone through Area Firewall secure & channels & OEM restricting Integration unwanted communications by policy and inspection

38 Stratix 5900 Device Manager Web based graphical device management tool Dashboard, Configure, Monitor and Maintenance views to help manage and diagnose network issues Displays real-time views of configuration and performance Simplifies task of setting up router (LAN, WAN) Graphical displays to easily monitor & diagnose the router Alarm tools to alert, identify and help solve network problems Connect securely from your Internet browser

39 44 Stratix Configurator CCP PC based application software for device management for IOS based Stratix products Based on Cisco Configuration Professional (CCP) Easy-to-use configuration wizards for router, firewall, intrusion prevention system (IPS), VPN, unified communications, WAN, and LAN configurations HMI Server Catalyst 2960 Stratix 5700 Catalyst 3750-X Line Controller Free download available at our Product Compatibility and Download Center: rockwellautomation/support/pcdc.page? Machine Stratix 5900 Machine #1 Stratix 5900 #2

40 45 Architectural Security Framework Stratix 5900 Layer 2 & Layer 3 Services Router Stratix 5900 Service Router is ideal for: Enterprise-wide Business Systems Levels 4 & 5 Data Center Enterprise Zone Level IDMZ Site-to-Site Connection Stratix ) Site-to-Site Connection Stratix ) Cell/Area Zone Firewall Plant-wide Site-wide Operation Systems Level 3 - Site Operations Physical or Virtualized Servers Industrial Zone FactoryTalk Application Servers & Services Platform Network Services e.g. DNS, AD, DHCP, AAA Remote Access Server (RAS) Call Manager Storage Array Stratix ) OEM Integration Levels 0-2 Cell/Area Zones Remote Site #1 Local Cell/Area Zone #1 Local OEM Skid / Machine #1

41 46 Traditional Firewalls Cisco IOS Classic Firewall stateful inspection (formerly known as Context- Based Access Control, or CBAC) employed an interface-based configuration model, in which a stateful inspection policy was applied to an interface. All traffic passing through that interface received the same inspection policy

42 47 Zone Based Firewall (ZBF) Zone-Based Policy Firewall (also known as Zone-Policy Firewall) changes the firewall configuration from the older interface-based model to a more flexible, more easily understood zone-based model Interfaces are assigned to security zones, and inspection policy is applied to traffic moving between the zones.

43 48 Zone Based Firewall terminology Security Zone A Security zone is a group of interfaces to which a policy can be applied. For example a Control security zone and an Information security zone. By default, traffic flows freely between interfaces in the same zone. Zone Pairs Specifies a uni-directional firewall policy between two zones. Zone pairs define the communications between different zones. Zone Policy A zone policy defines what we allow or deny to go between zones. For actions in the policy-maps the selections are Drop, Pass and Inspect.

44 50 Demo Stratix 5900 Zone Based Firewall The overarching goal of this demo is to create two security zones within the Stratix 5900 to allow a Studio 5000 laptop within one security zone to communicate with a Logix controller within a different security zone. The two security zones will be configured as listed below Information Security Zone used for HMI s and Engineering Workstations running FTSudio 5000 Control Security Zone used for ControlLogix processor and I/O subsystems The objective is to ping the Logix controller and then to successfully connect to a Logix controller in the Control Security Zone

45 53 Virtual Private Network (VPN) Each remote member of your network can communicate in a secure and reliable manner using the Internet or other untrusted networks as the medium to connect to the private or trusted LAN. Data Confidentiality - Internet Protocol Security Protocol (IPsec), Point-to-Point Tunneling Protocol (PPTP), Layer 2 Tunneling Protocol (L2TP)/IPsec Data Integrity - Check whether the encrypted portion of the packet, or the entire header and data portion of the packet, has not been tampered with. If tampering is detected, the packet is dropped. Data Origin Authentication (2 nd tier consideration) - It is extremely important to verify the identity of the source of the data that is sent. Anti Replay - This is the ability to detect and reject replayed packets and helps prevent spoofing. Data Tunneling/Traffic Flow Confidentiality - Tunneling is the process of encapsulating an entire packet within another packet and sending it over a network. Authentication, Authorization, Accounting (AAA) Nonrepudiation ( 2 nd tier consideration ) You can pick and choose the VPN Protocols and technologies to support the requirements listed above

46 54 Demo Site-to-Site VPN connection One site is already configured Let s setup the other site using Stratix Configurator Site-to-Site VPN network Gi Gi network network IACS device

47 Network Security Framework Stratix Cell Firewall and Site-to-Site VPN Allows the system to be securely distributed between a Central Site and smaller sites. DMZ Enterprise ASA X Industrial Zone Failover Industrial WAN Enterprise Stratix 5900 Distributed Site #1 Applications: Water/ Waste Water Pipelines Oil and Gas The Stratix 5900 firewall are restricts/ filters traffic to and from the Cell/ Area Zones Stratix 5900 offers: Network Address Translation Basic stateful inspection of all traffic Both routed and Transparent Firewalls Netflow Syslog HMI Server Stratix 5900 Catalyst 2960 Stratix 5700 Catalyst 3750-X Stratix 5900 HMI Server Engineering Workstation Line Controller Central Site ASA 5500-X Catalyst 2960 DMZ Catalyst 3750-X Stratix 5700 Central Site Controller Untrusted Network Stratix 5900 Stratix 5900 Distributed Site #2 Distributed Site #3 Machine #1 Machine #2

48 56 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Stratix security features, Firewall, VPN) Secure Remote Access References

49 57 Remote access Spectrum Control - WebPort Webport Connects Manage and connect to Webports from 1 central location Deployed on Microsoft s Azure Cloud Computing Platform Secure VPN technology (cloud based Windows Azure) Log and aggregate data multiple webports into a SQL database Create reports from data logs; custom dashboards to visualize data Web API allowing data to be shared Remote Connectivity Evolved Features Webport Ethernet or 3G Connectivity Linux Operating System SQL Database Micro SD for extended data storage (soon) 4 port LAN switch 2 Serial Ports (RS-232/RS485) Simplified User Interface Easy to use intuitive user interface Icon based interface Scrolling display for immediate updates Context Sensitive Interactive Help Ethernet 3G Cellular

50 59 Remote access ewon Industrial VPN Router Talk2M Talk2M cloud services Connect and get live with any devices across Internet Unlimited in time free service + ewon industrial VPN router DIN rail mounting, 24 VDC Easy VPN tunneling (secure and encrypted) through customer s LAN LAN and serial ports to connect equipments (PLC, HMI, ) Optional modem (2G/3G) Firewall friendly Mobile Web Access SMS & relay

51 Putting it Together Secure Remote Access Good, Better, Best Scenario/Recognizing an Issue An employee, or 3 rd party, needs access to the control system from a network outside the production zone to assist in troubleshooting and maintenance Risk/Threat Good Solution Stratix 5900 Better Solution Good solution + expanded technical enforcement of the security perimeter-using FactoryTalk Security Unauthorized remote access Worms and viruses Theft Sabotage Best Solution Better solution + expanded technical enforcement of the security perimerter-though the implementation of Remote Access Gateways with in an Industrial DMZ $$$ Unplanned Downtime Quality Issues-Brand Image Copyright 2012 Rockwell Automation, Inc. All rights reserved. 60

52 What is Industrial Security? Reduce risks Improve ability to be free from danger, injury or loss The use of proven technologies, policies & procedures to Enhance protection Protect & limit RISK = Vulnerability Threat Consequence x Frequency Protect of People, Property & Proprietary Information from unintended or malicious actions taken against it

53 63 Additional Defense-in-Depth Security Values Tamper Prevention and Detection - How can I know that my control system s configuration hasn t been changed? How can I make sure the controller can only be accessed through a secure connection path? I m worried about changes to the control system that may affect its productivity and safety of those who work on it. Firmware Digital Signatures Controller Change Detection and Logging (store on SD or FT AssetCentre) High Integrity AOI s Trusted slot for Communications (+ optional link to serial number) Disable unused USB ports IP protection - How do I prevent people from seeing what s inside and exactly how it operates? I ve designed a very innovative industrial control process or machine. I am concerned my competitors will try to reverse engineer and counterfeit it. Logix Source Code Protection Application access control - How can I limit who can do what from where? I have different users and different areas in my plant. Not everyone should be able to do everything. Data Access Control FactoryTalk Security

54 64 Putting it Together Unintended Action Protection Good, Better, Best Scenario/Recognizing an Issue Contractor connecting to plant network to make change or integrate new line- causes downtime by introducing virus or unintentional configuration changes Good Solution Detect unauthorized changes with change detection audit value Use managed switches to segment the architecture with VLANs Scan contractor devices Better Solution Good solution + Enforce VLAN access with Access Control Lists Best Solution Better solution + limit access with FactoryTalk Security with Security Authority Binding enabled Risk/Threat Unauthorized actions by employees Unintended employee actions Lost $$$ Damage to product or assets

55 65 Agenda Connected Enterprise: Value, Risks and Threats Trends, Defense-in-Depth, Architectural Security Framework Physical security (restrict access) Device hardening (hardware and electronically) Network Security (Stratix security features, Firewall, VPN) Secure Remote Access References

56 66 Rockwell Automation: Industrial Security Resources Security-enhanced Products and Technologies Rockwell Automation product and technologies with security capabilities that help increase overall control system system-level security. EtherNet/IP Plantwide Reference Architectures Control system validated designs and security best-practices that complement recommended layered security/defense-in-depth measures. Network & Security Services (NSS) RA consulting specialists that conduct security risk assessments and make recommendations for how to avert risk and mitigate vulnerabilities.

57 Security Launch & Landing Pad Assessment Services Security Technology Security FAQ Security Services Leadership & Standards Security Resources Security Advisory Index MS Patch Qualification Reference Architectures Assessment Services Pretty Good Privacy (PGP) Public Key

58 68 Security Advisory Index Vulnerabilities, Advisories and Disclosures We expect them. We plan for them. We work to avoid them. We support our customers.

59 69 Additional Material Cisco and Rockwell Automation Alliance Websites Reference Architectures Design Guides Converged Plant-wide Ethernet (CPwE) CPwE Resilient Ethernet Protocol (REP) Application Guides Fiber Optic Infrastructure Application Guide Wireless Design Considerations for Industrial Applications Whitepapers Top 10 Recommendations for Plant-wide EtherNet/IP Deployments Securing Manufacturing Computer and Controller Assets Production Software within Manufacturing Reference Architectures Achieving Secure Remote Access to plant-floor Applications and Data Design Considerations for Securing Industrial Automation and Control System Networks

60 Network & Security Services ASSESS Assess the current state of the security program, design, policy Assess the current state of the network design, implementation DESIGN/PLAN Design and plan a network infrastructure Design and plan security program, policy, infrastructure, business continuity plan IMPLEMENT Installation and configuration of a network Implementation of a security program, infrastructure design, policy training AUDIT Audit current architecture compared to governing body (ODVA, CNI, IEEE, TIA/EIA) Audit security program compared to governing body (NERC CIP, ISA SP-99, NIST , NIST MANAGE/MONITOR Manage, maintain and monitor uptime and issues on the network Managed Security Services (Incident response, disaster recovery, monitoring) Copyright 2012 Rockwell Automation, Inc. All rights reserved. 70

61 71 Additional Material The Industrial IP Advantage A new go-to resource for educational, technical and thought leadership information about industrial communications (including industrial security!) Standard Internet Protocol (IP) for Industrial Applications Coalition of like-minded companies

62 Thank you for participating! We want your feedback! Please complete the session survey! Follow ROKAutomation on Facebook & Twitter. Connect with us on LinkedIn. Rev 5058-CO900B Copyright 2012 Rockwell Automation, 76 Inc. All rights reserved.

T46 - Integrated Architecture Tools for Securing Your Control System

T46 - Integrated Architecture Tools for Securing Your Control System T46 - Integrated Architecture Tools for Securing Your Control System PUBLIC PUBLIC - 5058-CO900G Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. The Connected Enterprise PUBLIC Copyright

More information

Securing The Connected Enterprise

Securing The Connected Enterprise Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise

More information

Network Security Trends & Fundamentals of Securing EtherNet/IP Networks

Network Security Trends & Fundamentals of Securing EtherNet/IP Networks Network Security Trends & Fundamentals of Securing EtherNet/IP Networks Presented by Rockwell Automation Industrial Network Security Trends Security Quips "Good enough" security now, is better than "perfect"

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

AUP28 - Implementing Security and IP Protection

AUP28 - Implementing Security and IP Protection AUP28 - Implementing Security and IP Protection Features in the Integrated Architecture Mads Laier DK Commercial Engineer Logix & Networks Rev 5058-CO900E Agenda Why IACS Security Now! Defense in depth

More information

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation Rev 5058-CO900C Agenda Control System Network Security Defence in Depth Secure Remote Access Examples

More information

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) AUP28 Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS) Clive Barwise, Rockwell Automation European Product Manager Networks and Security

More information

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015

The Internet of Things (IoT) and Industrial Networks. Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 The Internet of Things (IoT) and Industrial Networks Guy Denis gudenis@cisco.com Rockwell Automation Alliance Manager Europe 2015 Increasingly Everything will be interconnected 50 Billion Smart Objects

More information

Industrial Security in the Connected Enterprise

Industrial Security in the Connected Enterprise Industrial Security in the Connected Enterprise Presented by Rockwell Automation 2008 Cisco Systems, Inc. and Rockwell Automation, Inc. All rights reserved. THE CONNECTED ENTERPRISE Optimized for Rapid

More information

Scalable Secure Remote Access Solutions

Scalable Secure Remote Access Solutions Scalable Secure Remote Access Solutions Jason Dely, CISSP Principal Security Consultant jdely@ra.rockwell.com Scott Friberg Solutions Architect Cisco Systems, Inc. sfriberg@cisco.com Jeffrey A. Shearer,

More information

Securing the Connected Enterprise

Securing the Connected Enterprise Securing the Connected Enterprise ABID ALI, Network and Security Consultant. Why Infrastructure Matters Rapidly Growing Markets Global Network Infrastructure and Security Markets 13.7% CAGR over the next

More information

PR03. High Availability

PR03. High Availability PR03 High Availability Related Topics NI10 Ethernet/IP Best Practices NI15 Enterprise Data Collection Options NI16 Thin Client Overview Solution Area 4 (Process) Agenda Overview Controllers & I/O Software

More information

ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions

ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions Network Segmentation Methodology Application Guide ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions By Josh Matson and Gregory

More information

Design Considerations for Securing Industrial Automation and Control System Networks

Design Considerations for Securing Industrial Automation and Control System Networks Design Considerations for Securing Industrial Automation and Control System Networks Synopsis Rockwell Automation and Cisco Four Key Initiatives: Common Technology View: A single system architecture, using

More information

REFERENCE ARCHITECTURES FOR MANUFACTURING

REFERENCE ARCHITECTURES FOR MANUFACTURING Synopsis Industry adoption of EtherNet/IP TM for control and information resulted in the wide deployment of standard Ethernet in manufacturing. This deployment acts as the technology enabler for the convergence

More information

Recommended IP Telephony Architecture

Recommended IP Telephony Architecture Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 SNAC.Guides@nsa.gov This Page Intentionally Left Blank ii Warnings

More information

Computer System Security Updates

Computer System Security Updates Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),

More information

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014 Securing Manufacturing Control Networks Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014 As Internet-enabled technologies such as cloud and mobility grow, the need to understand the potential

More information

RuggedCom Solutions for

RuggedCom Solutions for RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

IINS Implementing Cisco Network Security 3.0 (IINS)

IINS Implementing Cisco Network Security 3.0 (IINS) IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using

More information

Implementing Cisco IOS Network Security

Implementing Cisco IOS Network Security Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles

More information

Cisco Certified Security Professional (CCSP)

Cisco Certified Security Professional (CCSP) 529 Hahn Ave. Suite 101 Glendale CA 91203-1052 Tel 818.550.0770 Fax 818.550.8293 www.brandcollege.edu Cisco Certified Security Professional (CCSP) Program Summary This instructor- led program with a combination

More information

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0 COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.

More information

TABLE OF CONTENTS NETWORK SECURITY 1...1

TABLE OF CONTENTS NETWORK SECURITY 1...1 Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

GE Measurement & Control. Cyber Security for NEI 08-09

GE Measurement & Control. Cyber Security for NEI 08-09 GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4

More information

Stratix Industrial Networks Infrastructure At-A-Glance

Stratix Industrial Networks Infrastructure At-A-Glance Stratix ing and Routing Services Router Wireless Distribution Services Router Hardware Features Ports Per Module 2 5 to 16 4 and 9 port 6, 10, 18 and 20 port 8, 10, 16, 18, 24 port 6 and 10 port base switches

More information

TABLE OF CONTENTS NETWORK SECURITY 2...1

TABLE OF CONTENTS NETWORK SECURITY 2...1 Network Security 2 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

Scalable Secure Remote Access Solutions for OEMs

Scalable Secure Remote Access Solutions for OEMs Scalable Secure Remote Access Solutions for OEMs Introduction Secure remote access to production assets, data, and applications, along with the latest collaboration tools, provides manufacturers with the

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Introduction to Network Security

More information

Securing Manufacturing Computing and Controller Assets

Securing Manufacturing Computing and Controller Assets Securing Manufacturing Computing and Controller Assets Rockwell Automation and Cisco Four Key Initiatives: Common Technology View: A single system architecture, using open, industry standard networking

More information

Dr. György Kálmán gyorgy@mnemonic.no

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán gyorgy@mnemonic.no Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information

Implementing Cisco IOS Network Security v2.0 (IINS)

Implementing Cisco IOS Network Security v2.0 (IINS) Implementing Cisco IOS Network Security v2.0 (IINS) Course Overview: Implementing Cisco IOS Network Security (IINS) v2.0 is a five-day instructor-led course that is presented by Cisco Learning Partners

More information

Production Software Within Manufacturing Reference Architectures

Production Software Within Manufacturing Reference Architectures Production Software Within Manufacturing Reference Architectures Synopsis Industry adoption of EtherNet/IP for control and information has driven the wide deployment of standard Ethernet for manufacturing

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Security for. Industrial. Automation. Considering the PROFINET Security Guideline Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

Network & Security Services (NSS) Because Infrastructure Matters

Network & Security Services (NSS) Because Infrastructure Matters Network & Security Services (NSS) Because Infrastructure Matters Andrew Ballard Commercial Director Services & Support - EMEA Rev 5058-CO900E THE CONNECTED ENTERPRISE Headquarters Optimized for Rapid Value

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1 Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3

More information

Chapter 1 The Principles of Auditing 1

Chapter 1 The Principles of Auditing 1 Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks

More information

642 523 Securing Networks with PIX and ASA

642 523 Securing Networks with PIX and ASA 642 523 Securing Networks with PIX and ASA Course Number: 642 523 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional and the Cisco Firewall

More information

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion

Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann

More information

INTRODUCTION TO FIREWALL SECURITY

INTRODUCTION TO FIREWALL SECURITY INTRODUCTION TO FIREWALL SECURITY SESSION 1 Agenda Introduction to Firewalls Types of Firewalls Modes and Deployments Key Features in a Firewall Emerging Trends 2 Printed in USA. What Is a Firewall DMZ

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop White Paper Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop What You Will Learn Cisco Virtualization Experience Infrastructure (VXI) delivers a service-optimized desktop virtualization

More information

Achieving Secure, Remote Access to Plant-Floor Applications and Data

Achieving Secure, Remote Access to Plant-Floor Applications and Data Achieving Secure, Remote Access to Plant-Floor Applications and Data Abstract To increase the flexibility and efficiency of production operations, manufacturers are adopting open networking standards for

More information

Networking Devices. Lesson 6

Networking Devices. Lesson 6 Networking Devices Lesson 6 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Network Interface Cards Modems Media Converters Repeaters and Hubs Bridges and

More information

Industrial Firewalls Endpoint Security

Industrial Firewalls Endpoint Security Industrial Firewalls Endpoint Security Is there a need for a new type of industrial firewall? Industries have a huge park of different management and control systems to monitor their production. These

More information

Cisco IOS Advanced Firewall

Cisco IOS Advanced Firewall Cisco IOS Advanced Firewall Integrated Threat Control for Router Security Solutions http://www.cisco.com/go/iosfirewall Presentation_ID 2007 Cisco Systems, Inc. All rights reserved. 1 All-in-One Security

More information

Avaya G700 Media Gateway Security - Issue 1.0

Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise

More information

Network Access Security. Lesson 10

Network Access Security. Lesson 10 Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.

More information

CCNA Security v1.0 Scope and Sequence

CCNA Security v1.0 Scope and Sequence CCNA Security v1.0 Scope and Sequence Last updated April 7, 2011 Target Audience The Cisco CCNA Security course is designed for Cisco Networking Academy students seeking career-oriented, entry-level security

More information

Deploying Firewalls Throughout Your Organization

Deploying Firewalls Throughout Your Organization Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

Network & Security Services. Because Infrastructure Matters

Network & Security Services. Because Infrastructure Matters Network & Security Services Because Infrastructure Matters Network & Security Services Manufacturing Convergence merging IT and manufacturing systems has created the need for coexistence and interoperability

More information

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)

More information

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0 Module 1: Vulnerabilities, Threats, and Attacks 1.1 Fundamental Principles of a Secure Network

More information

FIREWALLS & CBAC. philip.heimer@hh.se

FIREWALLS & CBAC. philip.heimer@hh.se FIREWALLS & CBAC philip.heimer@hh.se Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that

More information

Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture

Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture Industrial Ethernet networking is advancing technology applications throughout the plant. These applications are rapidly

More information

Simplifying the Transition to Virtualization TS17

Simplifying the Transition to Virtualization TS17 Simplifying the Transition to Virtualization TS17 Name Sandeep Redkar Title Manager Process Solutions Date 11 th February 2015 Agenda Overview & Drivers Virtualization for Production Rockwell Automation

More information

Secure Remote Support

Secure Remote Support Secure Remote Support - Monitor, Manage, Configure remote assets - Cloud Based Data Collection Tom Peshek Program Manager Remote Services and Support - 5058-CO900G Remote Monitoring and Diagnostics Value

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

CISCO IOS NETWORK SECURITY (IINS)

CISCO IOS NETWORK SECURITY (IINS) CISCO IOS NETWORK SECURITY (IINS) SEVENMENTOR TRAINING PVT.LTD [Type text] Exam Description The 640-553 Implementing Cisco IOS Network Security (IINS) exam is associated with the CCNA Security certification.

More information

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with

More information

Network Security Administrator

Network Security Administrator Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze

More information

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents

TECHNICAL WHITEPAPER. Author: Tom Kistner, Chief Software Architect. Table of Contents TECHNICAL WHITEPAPER Author: Tom Kistner, Chief Software Architect Last update: 18. Dez 2014 Table of Contents Introduction... 2 Terminology... 2 Basic Concepts... 2 Appliances... 3 Hardware...3 Software...3

More information

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated

More information

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in

More information

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline Course Number: SEC 150 Course Title: Security Concepts Hours: 2 Lab Hours: 2 Credit Hours: 3 Course Description: This course provides an overview of current technologies used to provide secure transport

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Domain 6.0: Network Security

Domain 6.0: Network Security ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 6.0: Network Security Chapter 6 6.1 Explain the function of hardware and software security devices Network based firewall, Host based firewall

More information

Lucent VPN Firewall Security in 802.11x Wireless Networks

Lucent VPN Firewall Security in 802.11x Wireless Networks Lucent VPN Firewall Security in 802.11x Wireless Networks Corporate Wireless Deployment is Increasing, But Security is a Major Concern The Lucent Security Products can Secure Your Networks This white paper

More information

Stratix Switches Within Integrated Architecture. Dave VanGompel, Principal Application Engineer

Stratix Switches Within Integrated Architecture. Dave VanGompel, Principal Application Engineer Written By: Mark Devonshire, Product Manager Dave VanGompel, Principal Application Engineer Synopsis Industry adoption of EtherNet/IP for control and information has driven the wide deployment of standard

More information

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Firewall Security. Presented by: Daminda Perera

Firewall Security. Presented by: Daminda Perera Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network

More information

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations

More information

Cisco Router and Security Device Manager (SDM)

Cisco Router and Security Device Manager (SDM) Cisco Router and Security Device Manager (SDM) Session Number 1 Cisco SDM: Combining Ease Of Use & Application Intelligence Cisco SDM is an intuitive, web-based tool for Easy and Reliable Deployment and

More information

Gigabit SSL VPN Security Router

Gigabit SSL VPN Security Router As Internet becomes essential for business, the crucial solution to prevent your Internet connection from failure is to have more than one connection. PLANET is the ideal to help the SMBs increase the

More information

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..

More information

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data White Paper PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data Using credit cards to pay for goods and services is a common practice. Credit cards enable easy and

More information

Vyatta Network OS for Network Virtualization

Vyatta Network OS for Network Virtualization Complete Security and Compliance for Virtual Environments Vyatta takes the concept of virtualization beyond just applications and operating systems and allows enterprise IT to also virtualize network components

More information

Best Practices for DanPac Express Cyber Security

Best Practices for DanPac Express Cyber Security March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction

More information

Avaya TM G700 Media Gateway Security. White Paper

Avaya TM G700 Media Gateway Security. White Paper Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional

More information

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD005.001. Effective Date: April 7, 2005 State of New Mexico Statewide Architectural Configuration Requirements Title: Network Security Standard S-STD005.001 Effective Date: April 7, 2005 1. Authority The Department of Information Technology

More information

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1 Computer Security CS 426 Lecture 36 Perimeter Defense and Firewalls CS426 Fall 2010/Lecture 36 1 Announcements There will be a quiz on Wed There will be a guest lecture on Friday, by Prof. Chris Clifton

More information

By David G. Holmberg, Ph.D., Member ASHRAE

By David G. Holmberg, Ph.D., Member ASHRAE The following article was published in ASHRAE Journal, November 2003. Copyright 2003 American Society of Heating, Refrigerating and Air-Conditioning Engineers, Inc. It is presented for educational purposes

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

IACS Network Security and the Demilitarized Zone

IACS Network Security and the Demilitarized Zone CHAPTER 6 IACS Network Security and the Demilitarized Zone Overview This chapter focuses on network security for the IACS network protecting the systems, applications, infrastructure, and end-devices.

More information

Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes

Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Dennis Lanahan June 1, 2015 Securing the convergence of OT and IT with ST 1 Introduction to Owl US US Owned and & Operated Product

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

Security Technology: Firewalls and VPNs

Security Technology: Firewalls and VPNs Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up

More information