ARC WHITE PAPER. Yokogawa s Comprehensive Lifecycle Approach to Process Control System Cyber-Security VISION, EXPERIENCE, ANSWERS FOR INDUSTRY
|
|
|
- Miles Tyler
- 10 years ago
- Views:
Transcription
1 ARC WHITE PAPER By ARC Advisory Group SEPTEMBER 2011 Yokogawa s Comprehensive Lifecycle Approach to Process Control System Cyber-Security Executive Overview... 3 Introduction... 4 Security Lifecycle Approach... 5 System Products, Platforms, and Conduits... 9 System Integration Competencies Security Management Support Recommendations VISION, EXPERIENCE, ANSWERS FOR INDUSTRY
2 Yokogawa Security Lifecycle Yokogawa Security Lifecycle Concept 2 Copyright ARC Advisory Group ARCweb.com
3 Executive Overview Today s process control systems can take advantage of advanced generalpurpose IT to reduce costs, improve performance, enable Today s cyber-security threats interoperability and add other important new capabilities. However, the very same technologies make today s mean that industrial process control system users and industrial systems increasingly vulnerable to security suppliers alike must be intrusions malicious or otherwise from both within increasingly vigilant against current and future intrusions that and without the plant. Certainly, the IT world has developed powerful tools and techniques to help prevent, could compromise the security of the system itself, the production identify, and mitigate the effects of intrusions. However, process, intellectual property, or requirements specific to industrial systems (such as the negatively impact health, safety, need to maintain nonstop operations and provide deterministic response) often make employing these tools and or the environment. techniques in industrial environments problematic. Today s cyber-security threats mean that industrial process control system users and suppliers alike must be increasingly vigilant against current and future intrusions that could compromise the security of the system itself, the production process, intellectual property, or negatively impact health, safety, or the environment (HSE). Since industrial process control systems typically have a much longer lifecycle than do commercial systems (fifteen or more years for industrial systems, vs. three to five years for commercial systems) and since both system technology and cyber-threats are ever-changing, automation system suppliers must embrace a lifecycle approach to industrial cyber-security. Ideally, this should involve a continuous improvement process of assessment, implementation, monitoring, and maintaining. As explained in this white paper, this is precisely the approach that Yokogawa, one of the world s leading suppliers of process automation systems and related technologies and services, takes with its CENTUM process control systems, ProSafe-RS safety systems, STARDOM and FAST/TOOLS SCADA systems and related instrumentation and software applications. Yokogawa built its security lifecycle approach upon industry cyber-security standards; plus its own internal product security policy that incorporates both the company s security standards and engineering standards. Copyright ARC Advisory Group ARCweb.com 3
4 Introduction In the past, industrial automation systems (DCS, SIS, SCADA, etc.) were largely closed, proprietary, and standalone (unconnected) in nature. While this made interoperability challenging, from a security perspective, it minimized opportunities for and the likelihood of external intrusions While today s process control (malicious or otherwise) from outside the immediate systems can take advantage of network. Of course, careless, inept, or disgruntled advanced general-purpose IT to reduce costs, improve performance, enable employees still had plenty of opportunities to compromise the security of the process control system, a company s operations, or its intellectual property. interoperability and add other important new capabilities; the very same technologies have However, today s more advanced process control systems are moving closer to the ARC Advisory Group s made today s industrial systems vision of an open and interoperable Collaborative increasingly vulnerable to security Process Automation System (CPAS). Furthermore, intrusions malicious or otherwise from both within and without the plant. modern industrial systems increasingly incorporate general-purpose, internet-enabled information technology (IT) developed for commercial and business applications. We often refer to this as commercial, off-the-shelf technology or COTS. As a result, while today s process control systems can take advantage of this advanced general-purpose IT to reduce costs, improve performance, enable interoperability and add other important new capabilities; the very same technologies have made today s industrial systems increasingly vulnerable to security intrusions malicious or otherwise from both within and without the plant. Certainly, the IT world has developed powerful tools and techniques to help prevent, identify, and mitigate the effects of intrusions. However, requirements specific to industrial systems (such as the need to maintain nonstop operations and provide deterministic response) often make employing these tools and techniques in industrial environments problematic. Several issues and trends further exacerbate the situation. These include the increasing sophistication and resources of the hackers themselves and the tools and approaches they use. Even more troubling, are recent incidences of highly sophisticated attacks targeted specifically at industrial systems and networks. Stuxnet and Night Dragon provide two wellpublicized examples. In the past, many in the industrial community be- 4 Copyright ARC Advisory Group ARCweb.com
5 lieved that their systems and networks were obscure to the general public and thus safe from cyber-attacks. Clearly, this is no longer the case. Today s cyber-security threats mean that industrial process control system users and suppliers alike must be increasingly vigilant against current and future intrusions that could compromise the security Users, suppliers, industry of the system itself, the production process, intellectual organizations, and national property, or negatively impact health, safety, or the governments as well as the environment (HSE). automation and IT groups within individual user organizations Users, suppliers, industry organizations, and national will need to work together closely governments as well as the automation and IT to be able to identify and groups within individual user organizations will generate effective deterrents and need to work together closely to be able to identify and counter-measures to the constantly evolving threat. generate effective deterrents and counter-measures to the constantly evolving threat. Since industrial process control systems typically have a much longer lifecycle than do commercial systems (fifteen or more years for industrial systems, vs. three to five years for commercial systems) and since both system technology and cyber-threats are ever-changing, automation system suppliers must embrace a lifecycle approach to industrial cyber-security. Ideally, this should involve a continuous improvement process of assessment, implementation, monitoring, and maintaining. As explained in this white paper, this is precisely the approach that Yokogawa, one of the world s leading suppliers of process automation systems and related technologies and services, takes with its CENTUM process control systems, ProSafe-RS safety systems, STARDOM and FAST/TOOLS SCADA systems and related instrumentation and software applications. Security Lifecycle Approach Cyber-security experts agree that, given enough time and resources, a dedicated hacker could breach the security of virtually any system industrial or otherwise. And while networked or internet-connected systems may be a bit more vulnerable than standalone systems, there are many other ways that viruses, trojans, or other malware could be introduced into an industrial system. For example, it s common knowledge that the Stuxnet trojan was probably introduced into affected systems via thumb drives inserted into local USB ports on Windows workstations. Copyright ARC Advisory Group ARCweb.com 5
6 However, with its comprehensive security lifecycle approach that addresses system products, system integration support, and ongoing security management support over the entire lifecycles of its customers automation systems, Yokogawa believes that it can minimize cyber-security risk for its customers to an acceptable level, and do so without either compromising system performance or incurring excessive cost. With the clear objective of helping to ensure the stable operation of its customers systems, Yokogawa built its security lifecycle approach upon industry cyber-security standards; Yokogawa Security Lifecycle plus its own internal product security policy that incorporates both the company s security standards and engineering standards. Yokogawa invests in the human and technical resources it believes are required to sustain a high level of competence in the cyber-security area. The company supports international cyber-security standards; develops and rigidly enforces internal engineering standards; carefully considers security issues in the development of the company s system products, platforms, and interfaces; and delivers a variety of related lifecycle services. Together, these efforts are intended to help the company s customers reduce cybersecurity risk to a degree that is as low as reasonably practical (ALARP). Industry Standards Provide the Starting Point ARC strongly advocates that automation suppliers and users alike adhere to appropriate industry standards to the greatest practical extent. While cyber-security is a relatively new discipline, a number of key industry standards for both IT security in general and mission-critical industrial automation systems, have emerged at the national and international levels, with a welcome trend towards convergence. These include standards for policies, procedures, and technologies that address both general-purpose IT cyber-security and industrial automation system-specific cyber-security. Both categories are relevant for the industrial world, since so many industrial systems and applications today are built using general-purpose IT technology and because cyber-security responsibilities for the industrial systems often falls largely on the shoulders of corporate IT people. Yokogawa s lifecycle approach to cyber-security recognizes all major established industry cyber-security standards and the company closely tracks 6 Copyright ARC Advisory Group ARCweb.com
7 relevant standards currently in development. These include the ISA S99 Series, the ISO/IEC Series, and the NIST SP 800 Yokogawa s lifecycle approach to Series. Yokogawa cyber-security specialists also participate in work groups and technical committees to cyber-security recognizes all major established industry cybersecurity standards and the contribute actively to key industry standardization efforts. These include ISO/IEC (JTC1/SC27, WG3, WG4), company closely tracks relevant standards currently in IEC (TC65/WG10, TCS7/WG15), and ISA (ISA S99, ISA development. Security Compliance Institute). Yokogawa Product Security Policy Yokogawa created its Industrial Automation (IA) Product Security Policy based on established industry standards (ISA S99, NIST SP Series, etc.) to help ensure that the company provides secure IA products that protect the integrity of its customers production-related information assets, while maintaining the functionality of the automation products, systems, and applications. The overall product security policy comprises both a general Basic Security Policy and more specific Product Security Standards for each product category. Together, they specify issues that a supplier must address at each phase of the product lifecycle: planning, research & development, engineering, quality assurance, sales, after-sales services, and so on. Significantly, these are living documents, subject to periodic review by the company s designated, executive-chaired steering committee. In this manner, Yokogawa can continually update its security policies and internal standards as needed to clarify and provide the most effective protective measures possible for its customers. System Security Standards Yokogawa s System Security Standard documents provide guidelines and best practices for security countermeasures intended to help protect the company s automation systems and applications from external or internal intrusions or other threats and reduce the risks for its customers production-related assets. The System Security Standard explains risks and measures (using easily understood language, wherever possible); explains security control techniques; and references both to industry-standard models. The comprehensive document covers both system configuration and system management issues. Individual sections: Copyright ARC Advisory Group ARCweb.com 7
8 Outline the security environment surrounding the production control system and associated risks Provide a systematic framework for an information security management system (including identifying specific points of vulnerability and designing and implementing protective measures) Provide technical security control measures (network architecture, virus protection, patch management, system hardening, system and network monitoring, Windows domain management, security functions of the various Yokogawa systems, and staff security policy) Consider physical protection issues (defining physical boundaries, managing removable devices, managing third-party maintenance, etc.) Provide guidelines for developing a business continuity plan to minimize risk and damages from a security intrusion. Target products for the Yokogawa System Security Standards include the CENTUM VP and CENTUM CS 3000 process automation systems, Pro- Safe-RS safety integrated system, STARDOM and FAST/TOOLS SCADA system. The standard also covers the company s many solution-based software packages such as the Exaquantum plant information management system, Exapilot operation efficiency improvement package, Exaopc OPC interface package, and Exaplog event analysis package. The overall Yokogawa System Security Standard incorporates a number of documents used across all lifecycle stages (development, system integration, support services) to cover major threats. These include: Industrial Automation System Standard Applications Security Endpoint Security Network Security Integrated Management System The Security Standard also includes best practices for system hardening, networking, user and account management, monitoring, maintenance, and others. 8 Copyright ARC Advisory Group ARCweb.com
9 Global Engineering Standards Yokogawa has also developed Global Engineering Standards (GES), which it uses to execute projects across its geographically distributed resources. These standards cover a broad range of critical areas, including both physical security and cyber-security. They help bridge the diversity of languages, cultures, and expertise across the company s global organization to help ensure that Yokogawa automation systems implemented anywhere in the world reflect current best practices. Specific GESs include: Security and Administration Firewall Network Management System Remote Access Facilities Anti-Virus Software Facilities Operating System Patch Management Windows Domain and Account Management, and Backup and Recovery Management System Products, Platforms, and Conduits A complete industrial automation system solution is comprised of individual hardware and software products residing on a common platform with a variety of different interfaces, or conduits, both internal and external to the system. To achieve cyber-security defense in depth, appropriate security must be designed into each system component and conduit, supported by appropriate integration, operation, and management practices. Defense in depth also requires appropriate security between plant control networks and external networks (via firewallprotected demilitarized zones ); within the plant control network itself; and robust, well-structured endpoint security at the workstation level. Security Zones and Conduits To help ensure appropriate system security, the system supplier must match the security assurance levels (SAL) of various physical or logical groups of system products to the specific requirements of the different Copyright ARC Advisory Group ARCweb.com 9
10 plant areas, or zones in which they are applied. Security assurance levels and security zones, which are somewhat analogous to the safety integrity levels (SIL) used for process protective and other safety systems, are described within the ANSI/ISA S99 security standards. According to the company, Yokogawa system products provide the mission-critical reliability and robustness required to help ensure safety and security. The company also aligns the critical conduits between zones (a prime target for intrusions) with the appropriate target SAL. This includes zone-to-zone conduits, component-to-component conduits, and operator interface-to-component conduits. Security Designed into Individual System Products Consistent with the company s lifecycle approach to cyber-security, rather than viewing security as a pasted-on afterthought, Yokogawa system architects, engineers, and product development experts start the product design process from a clean Consistent with the company s lifecycle approach to cybersecurity, rather than viewing sheet of paper. This enables them to design security security as a pasted-on into the actual product specifications. This security afterthought, Yokogawa system focus at the component specification level provides the architects, engineers, and product company with a basic advantage when it comes to development experts start the achieving a high level of security at the system integration stage. product design process from a clean sheet of paper. In the product development stage, Yokogawa s development engineers check the source code for software-based products, using third-party tools to remove common vulnerabilities. Prior to commercialization, Yokogawa system products are certified using the company s extremely rigid internal certification process, based on established international standards. In addition, as a fundamental part of the product lifecycle, Yokogawa system products undergo security evaluation conducted by external security consultants based upon their prescribed practices and proven technologies. Finally, as part of the lifecycle approach, the company s development engineers based at various locations around the world participate in an ongoing education program designed to familiarize them with the latest threats, potential vulnerabilities, and countermeasures. 10 Copyright ARC Advisory Group ARCweb.com
11 Building Secure Industrial Control Systems Many established practices exist for building security into both commercial IT systems and industrial control systems. Yokogawa has borrowed from these and developed its own best practices, technical standards, procedures, and tools to meet customer requirements for safe and secure industrial automation systems. These provide a solid bridge between individual Yokogawa industrial control system products (I/O, controllers, data servers, application services, workstations, software applications, etc.) and a total system solution. System Integration Competencies Designing and certifying the individual industrial control system components with security in mind is all well and good, but what really counts when production and human health and safety are on the line, is how safe and secure the total system functions as a whole. For this reason, Yokogawa places considerable emphasis on how its engineers go about integrating the various system hardware and software components into a functioning system intended to monitor, control, and manage critical industrial processes on an uninterrupted basis 24 hours a day, 7 days per week. Yokogawa has been supplying its customers with complete process control systems for over 30 years. In this time, the company has developed unique expertise in systems integration that carries over into the security domain. Specifically, it is extending well-proven knowledge management tools such as its Global Engineering Standards, Yokogawa s internal standard for executing projects that provides the standards and templates for unifying project implementation into the physical and cyber-security domains. Since industrial control systems typically have much longer life cycles than do commercial information technology systems, Yokogawa has developed a total system architecture that avoids the potentially negative impacts of periodic technology updates. The company s internal system integration standards and practices further support this critical independence from the frequent technology refreshes encountered in the IT world. Copyright ARC Advisory Group ARCweb.com 11
12 Furthermore, Yokogawa engineers receive comprehensive training in both systems integration and cyber-security to improve their security knowledge and skills. This includes basic, advanced, and practical (hands on) training courses, with mandatory periodic testing to help ensure the effectiveness of the training: Basic course covers total system architecture Advanced course covers Windows domain and account management, OS patch management, firewalls, Level 2/Level 3 switches, remote access, anti-virus software, network management, and backup and recovery management Practical course provides hands-on experience in all of the above Yokogawa also offers similar training for its users. These training courses, based upon the company s comprehensive internal training courses, are detailed enough for users to implement the security lifecycle for their control systems. Design, Implement, Verify The company s internal system integration process involves a three-stage design/implement/verify process, supplemented by a training and certification program for its engineers based in various Yokogawa engineering centers around the world. Yokogawa s Global Engineering Standard and Security Standard govern the system integration design process. The Yokogawa Security Standard, supported by the company s system design tool, governs implementation. Specialized tools test the robustness of the integrated system and verify that the integrated system conforms to the Yokogawa Security Standard. System Hardening Tools and Verification Typically, Windows operating systems are designed to provide home and office users with maximum functionality and ease of Typically, Windows operating use. However, in industrial environments, safety and systems are designed to provide security take precedence over potentially vulnerable, home and office users with non-essential functionalities and ease-of-use features. maximum functionality and ease of use. However, in industrial To minimize vulnerabilities for its industrial users, environments, safety and security Yokogawa employs system hardening tools to configure Windows OS parameters in a manner that take precedence over potentially vulnerable, non-essential eliminates non-required functionalities and possibly functionalities. exploitable weaknesses, and to increase the dependa- 12 Copyright ARC Advisory Group ARCweb.com
13 bility of the OS. Target operating systems include Windows XP, Windows Vista, Windows 7, Windows Server 2008, and Windows Server 2008 R2. This hardening tool runs two different procedures depending on the designed security policy and the integrated system in question and the relative sensitivity of the application. The objectives are to: Harden Yokogawa systems products throughout with a single security model in which the OS is secured against attack from both internal or external networks, such as third-party devices or networks Allow Yokogawa systems products to be combined with legacy systems, for which latest and most recommended security procedures in industrial environments do not apply Furthermore, additional strengthened procedures are supported for Yokogawa systems products, which the company implements as needed to match the specific risk levels for different environments. Using Security Standards as a basis, Yokogawa engineers use the company s system hardening tools to configure the PC/server so that base (registries, services, and local security policy), networking (personal firewall, file sharing control, NetBIOS over TCP/IP, DCOM setting, etc.), user account management and access control, and USB control are all configured securely. These actions supplemented by a rigorous verification program that uses custom plug-in tools to verify robustness help ensure that the company can deliver an integrated, yet secure system to its global customers. The company can also use these tools to verify the robustness of customers existing system. During the verification program, users are provided with a simple and comprehensive view of the security level of their control systems based upon the company s defined indexes. Yokogawa has developed PARM indexes that make it easier for users to comprehend industrial control system security levels. Here, the P stands for data protectability, A for availability, R for recoverability, and M for manageability. PARM translates all seven ISA99 foundational requirements into a simplified view using these four indexes. As the original equipment manufacturer, Yokogawa has the specific knowledge, expertise, and tools needed to verify the robustness of the company s systems. However, the company also subscribes to third-party organiza- Copyright ARC Advisory Group ARCweb.com 13
14 tions, such as the Industrial Security Compliance Institute ( ISA Secure ) to certify appropriate Yokogawa system products. The company has set up the policy to incorporate security steps into systems and products development processes, to develop a user security guide, and to continuously improve both process and user security with support from independent subject matter expert (SME) consultants. Security Management Support As previously mentioned, the constantly evolving nature of the cyber-security threat and the dynamic nature of modern automation technology and applications, require a lifecycle approach to cyber-security. Yokogawa is equipped to ensure that the systems the company delivers, installs, and commissions in its customers plants are as up to the challenge as humanly and technically possible. However, constant vigilance is required to anticipate, identify, and mitigate the inevitable vulnerabilities and cyber-security threats that emerge after the system is commissioned. And, unfortunately, while user organizations often have adequate internal resources to deal with cyber-security threats against the corporate network, only in rare cases do corporate IT departments fully understand the operating environment and security-related ramifications for process control, process protective, SCADA, and other plant-level systems and networks. This is where automation supplier-provided security management services such as those that Yokogawa offers under its VigilantPlant Services offering can provide so much value to user organizations. The company s cyber-security consultants combine in-depth expertise in latest cybersecurity approaches, techniques, and toolsets; with a full understand of industrial environments in general and inner-knowledge of Yokogawa system products, process control networks, and software applications. Yokogawa s VigilantPlant Service is designed to offer users the ability to achieve continuous improvement throughout the lifecycle based upon the DMAIC concept. 14 Copyright ARC Advisory Group ARCweb.com
15 Assessment and Consultation While older plant control systems can be particularly vulnerable to cybersecurity threats, even recently commissioned systems could have been exposed to new threats in the interim since commissioning. Yokogawa s VigilantPlant Service offers security assessment and consultation services in which customers are encouraged to deploy required countermeasures into installed control systems. This service is designed to help users manage risks and maintain business continuity by assessing, inspecting, and diagnosing installed systems to detect and identify specific weaknesses and potential cyber-security vulnerabilities. Yokogawa s deliverable from this important service is a detailed assessment report and recommendations for appropriate countermeasures. The countermeasure implementation service then follows up on these recommendations. Countermeasure Implementation Many industrial organizations lack the internal resources needed to deal with identified threats to their industrial systems and networks in a manner that will not negatively impact production operations or health, safety, and environment. To respond to this need, Yokogawa created an additional VigilantPlant Service to deliver appropriate, non-intrusive countermeasures to the assessed threats and/or vulnerabilities of installed control systems following the assessment and consultation service. The service includes: Virus check USB port lock Security patch update Software backup and recovery Unauthorized software control Even in the face of constantly evolving cyber-security threats and evolving platform technology, these services can help ensure that installed systems remain as robust and secure over their entire lifecycles as they are at commissioning. Copyright ARC Advisory Group ARCweb.com 15
16 Maintenance and Support It s important to be able to maintain all deployed countermeasures in a cost-effective manner. An essential part of the lifecycle, this is required as part of the security management system to continuously secure the control system. Yokogawa offers a support and maintenance service in VigilantPlant Service to keep the deployed countermeasures running and apply updates for vulnerabilities uncovered during normal operations. The company also offers users training to help customers implement their security lifecycle. This can be followed by additional assessment and consultation, as needed. Yokogawa Security Competency Laboratories Yokogawa s Security Competence Laboratories in Singapore; Tokyo, Japan; Bangalore, India; and Houston, Texas play a key role in the company s overall cyber-security activities. Collectively, these laboratories serve as a dedicated centerof-excellence in which Yokogawa system and cyber-security specialists can collaborate to link current security technologies to the company s systems to help protect the company s customers from constantly evolving and increasingly sophisticated cyber-security threats. The Security Competence Laboratories research today's security technologies and real-world cyber-security implications for industrial operating environments and develop solutions and countermeasures that are best suited for different industry sectors, applications, and system configurations. The labs build upon the company s technical expertise to develop, validate, and deploy new procedures and tools for the Yokogawa engineers and security specialists who deliver the company s security and other services. Another role for Yokogawa s Security Competence Laboratories is to continually update the Yokogawa security standard, including documents and work processes. 16 Copyright ARC Advisory Group ARCweb.com
17 Recommendations Security experts agree that, given adequate time and resources, any system even hardened, relatively segregated, industrial control systems can be penetrated by determined external hackers or careless or disgruntled employees. However, clearly, there are ways to reduce the risk to an acceptable level (as low as reasonably practical) and to do so without compromising the basic functionality of the system. ARC believes that Yokogawa s lifecycle approach to automation system security (built on industry security standards and best practices), plus the company s own security and engineering standards, work together to enforce defense in depth to help provide a solid foundation for secure industrial control systems and stable plant operation. ARC believes that Yokogawa s lifecycle approach to automation system security (built on industry security standards and best practices), plus the company s own security and engineering standards, work together to enforce defense in depth to help provide a solid foundation for secure industrial control systems and stable plant operation. The company s well-trained global services organization is also available to provide ongoing cybersecurity support to help users meet new daily threats with a technology platform that evolves over time. However, it s equally important for end users in manufacturing companies and other industrial organizations to recognize that they can t expect their automation suppliers no matter how vigilant to provide a total cyber-security solution. To reduce security risks to an acceptable level, users must cultivate a security culture across all departments and develop and enforce internal security processes and practices based on ANSI/ISA S99, NIST SP 800, and other industry standards and best practices. Copyright ARC Advisory Group ARCweb.com 17
18 18 Copyright ARC Advisory Group ARCweb.com
19 Analysts: Barry Young and Paul Miller Editor: Dick Hill Acronym Reference: For a complete list of industry acronyms, refer to our web page at API Application Program Interface B2B Business-to-Business BPM Business Process Management CAGR Compound Annual Growth Rate CAS Collaborative Automation System CMM Collaborative Management Model CPG Consumer Packaged Goods CPM Collaborative Production Management CRM Customer Relationship Management DCS Distributed Control System EAM Enterprise Asset Management ERP Enterprise Resource Planning HMI Human Machine Interface IOp Interoperability IT Information Technology MIS Management Information System OpX Operational Excellence PAS Process Automation System PLC Programmable Logic Controller PLM Product Lifecycle Management RFID Radio Frequency Identification ROA Return on Assets RPM Real-time Performance Management SCM Supply Chain Management WMS Warehouse Management System Founded in 1986, ARC Advisory Group is the leading research and advisory firm for industry. Our coverage of technology from business systems to product and asset lifecycle management, supply chain management, operations management, and automation systems makes us the go-to firm for business and IT executives around the world. For the complex business issues facing organizations today, our analysts have the industry knowledge and first-hand experience to help our clients find the best answers. All information in this report is proprietary to and copyrighted by ARC. No part of it may be reproduced without prior permission from ARC. This research has been sponsored in part by Yokogawa. However, the opinions expressed by ARC in this paper are based on ARC's independent analysis. You can take advantage of ARC's extensive ongoing research plus experience of our staff members through our Advisory Services. ARC s Advisory Services are specifically designed for executives responsible for developing strategies and directions for their organizations. For membership information, please call, fax, or write to: ARC Advisory Group, Three Allied Drive, Dedham, MA USA Tel: , Fax: , [email protected] Visit our web pages at Copyright ARC Advisory Group ARCweb.com 19
20 3 ALLIED DRIVE DEDHAM, MA USA USA GERMANY JAPAN INDIA CHINA BRAZIL ARGENTINA
Managing Information throughout the Asset Lifecycle. Executive Overview... 3. ARC Perspective of ALM... 3
ARC WHITE PAPER By ARC Advisory Group FEBRUARY 2010 Managing throughout the Asset Lifecycle Executive Overview... 3 ARC Perspective of ALM... 3 Mustang s Starting Point: Traditional... 4 Implementation
Collaborative Service Management Reduces Cost and Risk. Executive Overview... 3. Trends in Process Industry Operations Challenge Service Models...
ARC WHITE PAPER By ARC Advisory Group JANUARY 2007 Collaborative Service Management Reduces Cost and Risk Executive Overview... 3 Trends in Process Industry Operations Challenge Service Models... 4 Problems
AVEVA NET Accesses and Manages the Digital Asset. Executive Overview... 3. Project Risk: Inaccessible, Unreliable Information... 4
ARC WHITE PAPER By ARC Advisory Group JUNE 18, 2013 AVEVA NET Accesses and Manages the Digital Asset Executive Overview... 3 Project Risk: Inaccessible, Unreliable Information... 4 AVEVA NET Focuses on
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
ARC WHITE PAPER. Risk Drives Industrial Control System Cyber Security Investment VISION, EXPERIENCE, ANSWERS FOR INDUSTRY MAY 2011
ARC WHITE PAPER By ARC Advisory Group MAY 2011 Risk Drives Industrial Control System Cyber Security Investment Executive Overview... 3 Game Changers for Industrial Control System Cyber Security... 4 Risk
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Ease Server Support With Pre-Configured Virtualization Systems
Ease Server Support With Pre-Configured Virtualization Systems Manufacturers and industrial production companies are increasingly challenged with supporting the complex server environments that host their
How To Protect Your Network From Attack From A Network Security Threat
Cisco Security Services Cisco Security Services help you defend your business from evolving security threats, enhance the efficiency of your internal staff and processes, and increase the return on your
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
Rethinking Cyber Security for Industrial Control Systems (ICS)
Rethinking Cyber Security for Industrial Control Systems (ICS) Bob Mick VP Emerging Technologies ARC Advisory Group [email protected] 1 Rethinking Cyber Security We Now Have Years of Experience - Security
White Paper. Information Security -- Network Assessment
Network Assessment White Paper Information Security -- Network Assessment Disclaimer This is one of a series of articles detailing information security procedures as followed by the INFOSEC group of Computer
Plant Network Security
Whitepaper Plant Network Security How to defend your Plant against the threats of 2014? Yokogawa Europe B.V. Euroweg 2 3825 HD Amersfoort, The Netherlands July 2014 Table of Content 1. Introduction...
MEDICAL DEVICE Cybersecurity.
MEDICAL DEVICE Cybersecurity. 2 MEDICAL DEVICE CYBERSECURITY Introduction Wireless technology and the software in medical devices have greatly increased healthcare providers abilities to efficiently and
Yokogawa s Wireless Solutions Show a Long- Term Commitment to ISA100 Standard. Executive Overview... 3
ARC WHITE PAPER By ARC Advisory Group FEBRUARY 2011 Yokogawa s Wireless Solutions Show a Long- Term Commitment to ISA100 Standard Executive Overview... 3 The Value Proposition of Wireless Sensors for Process
Announcement of a new IAEA Co-ordinated Research Programme (CRP)
Announcement of a new IAEA Co-ordinated Research Programme (CRP) 1. Title of Co-ordinated Research Programme Design and engineering aspects of the robustness of digital instrumentation and control (I&C)
White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012
Tofino Security exida Consulting LLC White Paper Version 1.0 Published February 16, 2012 Contents Executive Summary... 1 Step 1 Assess Existing Systems... 1 Step 2 Document Policies & Procedures... 3 Step
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
ARC WHITE PAPER. The Business Value Proposition of Control in the Field THOUGHT LEADERS FOR MANUFACTURING, ENERGY, & SUPPLY CHAIN NOVEMBER 2009
ARC WHITE PAPER By ARC Advisory Group NOVEMBER 2009 The Business Value Proposition of Control in the Field Executive Overview... 3 Control in the Field Provides Enhanced Process Integrity... 5 Testing
Session 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
Is your current safety system compliant to today's safety standard?
Is your current safety system compliant to today's safety standard? Abstract It is estimated that about 66% of the Programmable Electronic Systems (PES) running in the process industry were installed before
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
SCADA Cyber Security
SCADA Cyber Security Information on Securing SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
Total Protection for Compliance: Unified IT Policy Auditing
Total Protection for Compliance: Unified IT Policy Auditing McAfee Total Protection for Compliance Regulations and standards are growing in number, and IT audits are increasing in complexity and cost.
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems
Course: Information Security Management in e-governance Day 1 Session 5: Securing Data and Operating systems Agenda Introduction to information, data and database systems Information security risks surrounding
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster
Security Standards Symantec shall maintain administrative, technical, and physical safeguards for the Symantec Network designed to (i) protect the security and integrity of the Symantec Network, and (ii)
Certification Report
Certification Report EAL 3+ Evaluation of RSA envision platform v4.0 SP 1 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus
Information Technology Engineers Examination Information Security Specialist Examination (Level 4) Syllabus Details of Knowledge and Skills Required for the Information Technology Engineers Examination
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?
ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy
PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft
PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft Agenda Security Development Lifecycle Initiative Using PI to Protect Critical Infrastructure Hardening Advice for the PI
Security Controls for the Autodesk 360 Managed Services
Autodesk Trust Center Security Controls for the Autodesk 360 Managed Services Autodesk strives to apply the operational best practices of leading cloud-computing providers around the world. Sound practices
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Effective OPC Security for Control Systems - Solutions you can bank on
Effective Security for Control Systems - Solutions you can bank on Darek Kominek Manager, Marketing, Matrikon Eric Byres, P. Eng., ISA Fellow CTO, Byres Security Inc. Executive Summary There is a perception
VMware vcloud Networking and Security Overview
VMware vcloud Networking and Security Overview Networks and Security for Virtualized Compute Environments WHITE PAPER Overview Organizations worldwide have gained significant efficiency and flexibility
Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.
Security all around Industrial security for your plant at all levels siemens.com/industrialsecurity Answers for industry. A systematic approach to minimize threats With the increased use of Ethernet connections
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
ARC WHITE PAPER. OpenText EIM Solutions Help Enable the Information-Driven, Connected Manufacturing Enterprise
ARC WHITE PAPER By ARC Advisory Group AUGUST 2015 OpenText EIM Solutions Help Enable the Information-Driven, Connected Manufacturing Enterprise Executive Overview... 2 Connected Manufacturers Need a Separate
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
Proven LANDesk Solutions
LANDesk Solutions Descriptions Proven LANDesk Solutions IT departments face pressure to reduce costs, reduce risk, and increase productivity in the midst of growing IT complexity. More than 4,300 organizations
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology
Solution Recipe: Improve PC Security and Reliability with Intel Virtualization Technology 30406_VT_Brochure.indd 1 6/20/06 4:01:14 PM Preface Intel has developed a series of unique Solution Recipes designed
High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe
2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
PCI Solution for Retail: Addressing Compliance and Security Best Practices
PCI Solution for Retail: Addressing Compliance and Security Best Practices Executive Summary The Payment Card Industry (PCI) Data Security Standard has been revised to address an evolving risk environment
Securing OS Legacy Systems Alexander Rau
Securing OS Legacy Systems Alexander Rau National Information Security Strategist Sample Agenda 1 Today s IT Challenges 2 Popular OS End of Support & Challenges for IT 3 How to protect Legacy OS systems
Protecting productivity with Plant Security Services
Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services
Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process
Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting
Running A Fully Controlled Windows Desktop Environment with Application Whitelisting By: Brien M. Posey, Microsoft MVP Published: June 2008 About the Author: Brien M. Posey, MCSE, is a Microsoft Most Valuable
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
ARC WHITE PAPER. Siemens PLM Software s Robotics Simulation: Validating & Commissioning the Virtual Workcell
ARC WHITE PAPER By ARC Advisory Group MARCH 2008 Siemens PLM Software s Robotics Simulation: Validating & Commissioning the Virtual Workcell Executive Overview... 3 Business Drivers for Automotive and
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
Readiness Assessments: Vital to Secure Mobility
White Paper Readiness Assessments: Vital to Secure Mobility What You Will Learn Mobile devices have been proven to increase employee productivity and job satisfaction, but can also pose significant threats
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector
IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector V.2 Final Draft May 1, 2014 [email protected] This revision incorporates comments from the public. Page Use case 1 Comments
Certification Report
Certification Report EAL 2+ Evaluation of Symantec Endpoint Protection Version 12.1.2 Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Total Defense Endpoint Premium r12
DATA SHEET Total Defense Endpoint Premium r12 Overview: Total Defense Endpoint Premium Edition r12 offers comprehensive protection for networks, endpoints and groupware systems from intrusions, malicious
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Kepware s Latest Communications Platform Addresses Need for Enterprise Service Bus
ARC VIEW APRIL 26, 2012 Kepware s Latest Communications Platform Addresses Need for Enterprise Service Bus By Craig Resnick Keywords Enterprise Service Bus (ESB), Kepware Technologies, KEPServerEX, OPC
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
Driving Company Security is Challenging. Centralized Management Makes it Simple.
Driving Company Security is Challenging. Centralized Management Makes it Simple. Overview - P3 Security Threats, Downtime and High Costs - P3 Threats to Company Security and Profitability - P4 A Revolutionary
Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.
Seamless Mobile Security for Network Operators Build a secure foundation for winning new wireless services revenue. New wireless services drive revenues. Faced with the dual challenges of increasing revenues
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint?
Managed Intrusion, Detection, & Prevention Services (MIDPS) Why E-mail Sorting Solutions? Why ProtectPoint? Why? Focused on Managed Intrusion Security Superior-Architected Hardened Technology Security
The Business Case for Security Information Management
The Essentials Series: Security Information Management The Business Case for Security Information Management sponsored by by Dan Sullivan Th e Business Case for Security Information Management... 1 Un
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
External Supplier Control Requirements
External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ
PAVING THE PATH TO THE ELIMINATION A RSACCESS WHITE PAPER 1 The Traditional Role of DMZ 2 The Challenges of today s DMZ deployments 2.1 Ensuring the Security of Application and Data Located in the DMZ
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
DOBUS And SBL Cloud Services Brochure
01347 812100 www.softbox.co.uk DOBUS And SBL Cloud Services Brochure [email protected] DOBUS Overview The traditional DOBUS service is a non-internet reliant, resilient, high availability trusted
