Securing The Connected Enterprise



Similar documents
Network Security Trends & Fundamentals of Securing EtherNet/IP Networks

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

AUP28 - Implementing Security and IP Protection

REFERENCE ARCHITECTURES FOR MANUFACTURING

T46 - Integrated Architecture Tools for Securing Your Control System

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Industrial Security in the Connected Enterprise

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions

Industrial Security Solutions

Dr. György Kálmán

Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture

Design Considerations for Securing Industrial Automation and Control System Networks

Scalable Secure Remote Access Solutions

Computer System Security Updates

Das sollte jeder ITSpezialist über. Automations- und Produktionsnetzwerke wissen

AUD20 - Industrial Network Security

Securing Manufacturing Computing and Controller Assets

Key Considerations for Operationalizing the Connected Industrial Enterprise

Manufacturing and the Internet of Everything

Choosing the correct Time Synchronization Protocol and incorporating the 1756-TIME module into your Application

IACS Network Security and the Demilitarized Zone

Production Software Within Manufacturing Reference Architectures

PR03. High Availability

Network & Security Services (NSS) Because Infrastructure Matters

Scalable Secure Remote Access Solutions for OEMs

Securing the Connected Enterprise

Simplifying the Transition to Virtualization TS17

White Paper A Manufacturing Network Fabric Maturity Model

IP Telephony Management

Scalable, Secure Remote Monitoring Solutions Stay a step ahead by remotely monitoring your critical assets

Recommended IP Telephony Architecture

Secure Remote Support

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014

Achieving Secure, Remote Access to Plant-Floor Applications and Data

Industrial Control Systems Security Guide

DeltaV System Cyber-Security

Plant-wide Network Infrastructure. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

Network & Security Services Rockwell Automation s Specialist team of Network & Security Specialists

Industrial Security for Process Automation

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

GE Measurement & Control. Cyber Security for NEI 08-09

Cisco Advanced Services for Network Security

How the Internet of Things Will Transform the Manufacturing Industry

Designing a security policy to protect your automation solution

The Cisco ASA 5500 as a Superior Firewall Solution

Top-Down Network Design

Ease Server Support With Pre-Configured Virtualization Systems

Symphony Plus Cyber security for the power and water industries

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Best Practices for DanPac Express Cyber Security

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cisco ASA 5500 Series Firewall Edition for the Enterprise

CISCO IOS NETWORK SECURITY (IINS)

Deploying Firewalls Throughout Your Organization

Aluminium Smelter Benefits from New Approach to Networking

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme. Firewall

Network Virtualization Network Admission Control Deployment Guide

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Cisco Certified Security Professional (CCSP)

Session 14: Functional Security in a Process Environment

Security in IT & Automatisierung

Network Security Administrator

Stratix Switches Within Integrated Architecture. Dave VanGompel, Principal Application Engineer

Architecture Overview

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Securing Process Control Systems

Securing EtherNet/IP Networks

Best Practices for Outdoor Wireless Security

State of Texas. TEX-AN Next Generation. NNI Plan

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Internet Content Provider Safeguards Customer Networks and Services

Overcoming Security Challenges to Virtualize Internet-facing Applications

Decrease your HMI/SCADA risk

Cisco Virtualization Experience Infrastructure: Secure the Virtual Desktop

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Chapter 1 The Principles of Auditing 1

Cyber Security for NERC CIP Version 5 Compliance

Process Control Networks Secure Architecture Design

Cisco Medical-Grade Network: Build a Secure Network for HIPAA Compliance

IT Networking and Security

This is a preview - click here to buy the full publication

May/June Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight.

What would you like to protect?

Information Technology Security Procedures

Innovative Defense Strategies for Securing SCADA & Control Systems

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

CCNA Security v1.0 Scope and Sequence

Network Security Guidelines. e-governance

Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

RuggedCom Solutions for

Transcription:

Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved.

8 Connected Enterprise Control and Information Convergence Scalable, robust, secure and futureready infrastructure: Application Internet of Things, Internet of Everything Software Network Holistic Defense-in-Depth

4 IT-OT CONVERGENCE Transactional information: orders, supply network, product design ERP FINANCIALS HR LOGISTICS QUALITY WAREHOUSE IT COMMON SECURE NETWORK INFRASTRUCTURE OT Real-time data: alarms, events, states, energy, diagnostics, INDUSTRIAL THINGS PLCS & SCANNERS MATERIAL & TRANSPORT MACHINES & TESTERS SHOP FLOOR PERSONNEL PRINTERS & LABEL SERVICES

5 Risks and Threats to Control Systems Application of Security patches Natural or Man-made disasters Worms and viruses Theft Sabotage Unauthorized access INFORMATION Denial of Service Business Risk Unauthorized actions by employees Unauthorized remote access Unintended employee actions OPERATIONS Security risks increase potential for disruption to system uptime, safety operation, and a loss of intellectual property.

6 Industrial Security Trends Security Quips "Good enough" security now, is better than "perfect" security... never (Tom West, Data General) Security ultimately relies - and fails - on the degree to which you are thorough. People don't like to be thorough. It gets in the way of being done (Dave Piscitello) Your absolute security is only as strong as your weakest link Concentrate on known, probable threats Security is not a static end state, it is an interactive process You only get to pick two of the three: fast, secure, cheap (Brett Eldridge)

Secure Automation & Information Defending the digital architecture Tamper Detection Secure Network Infrastructure Content Protection Access Control & Policy Management Detect & Record unwanted Activity & Modifications to the application Control Access to the network, and Detect unwanted access and activity Protect viewing, editing, and use of specific pieces of control system content Control Who, What, Where & When access is allowed, to which application & device INDUSTRIAL SECURITY MUST BE IMPLEMENTED AS A SYSTEM

9 Why is this important? Industrial Automation and Control System Convergence Flat and Open IACS Network Infrastructure Flat and Open Industrial Automation and Control Structured System and Hardened Network Infrastructure IACS Network Infrastructure

9 Industrial Security Trends Established Industrial Security Standards International Society of Automation ISA/IEC-62443 (Formerly ISA-99) Industrial Automation and Control Systems (IACS) Security Defense-in-Depth IDMZ Deployment National Institute of Standards and Technology NIST 800-82 Industrial Control System (ICS) Security Defense-in-Depth IDMZ Deployment Department of Homeland Security / Idaho National Lab DHS INL/EXT-06-11478 Control Systems Cyber Security: Defense-in-Depth Strategies Defense-in-Depth IDMZ Deployment

10 Security Holistic Defense-in-Depth Multiple Layers to Protect and Defend the Edge No single product, technology or methodology can fully secure Industrial Automation and Control System (IACS) applications. Protecting IACS assets requires a defense-in-depth security approach, which addresses internal and external security threats. This approach utilizes multiple layers of defense (physical, procedural and electronic) at separate IACS levels by applying policies and procedures that address different types of threats.

Industrial Network Security Trends Policies - Industrial vs. Enterprise Network Requirements Industrial (OT) Network Enterprise (IT) Network Focus 24/7 operations, high OEE Protecting intellectual property and company assets Precedence of Priorities Availability Integrity Confidentiality Confidentiality Integrity Availability Types of Data Traffic Converged network of data, control, information, safety and motion Converged network of data, voice and video Access Control Strict physical access Simple network device access Strict network authentication and access policies Implications of a Device Failure Production is down ($$ s/hour or worse) Work-around or wait Threat Protection Isolate threat but keep operating Shut down access to detected threat Upgrades Rockwell Automation TechED 2015 @ROKTechED #ROKTechED Scheduled during downtime Automatically pushed during uptime 11

ICS Security Program NOTE: This is different than an Enterprise Security Program. Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. Rockwell Automation TechED 2015 @ROKTechED #ROKTechED 12

13 Network Security Framework Industrial Demilitarized Zone Level 5 Level 4 E-Mail, Intranet, etc. Enterprise Network Site Business Planning and Logistics Network Enterprise Security Zone Remote Gateway Services Application Mirror Patch Management Web Services Operations AV Server Application Server Firewall Firewall Web E-Mail CIP Industrial DMZ Level 3 Level 2 Level 1 FactoryTalk Application Server FactoryTalk Client Batch Control FactoryTalk Directory Operator Interface Discrete Control Engineering Workstation FactoryTalk Client Drive Control Remote Access Server Engineering Workstation Continuous Process Control Site Operations and Control Area Supervisory Control Operator Interface Safety Control Basic Control Industrial Security Zone Cell/Area Zone Level 0 Sensors Drives Actuators Robots Process Logical Model Industrial Automation and Control System (IACS) Converged Multi-discipline Industrial Network No Direct Traffic Flow between Enterprise and Industrial Zone

14 Security Holistic Defense-in-Depth Industrial Security Policies Drive Technical Controls Physical limit physical access to authorized personnel: cells/areas, control panels, devices, cabling, and control room. locks, gates, key cards, biometrics. This may also include policies, procedures and technology to escort and track visitors Network security framework e.g., firewall policies, access control list (ACL) policies for switches and routers, AAA, intrusion detection and prevention systems (IDS/IPS) Computer Hardening patch management, anti-x software, removal of unused applications/protocols/services, closing unnecessary logical ports, protecting physical ports Application authentication, authorization, and accounting (AAA) Device Hardening change management, communication encryption, and restrictive access

Networking Design Considerations CPwE Reference Architectures Education, design considerations and guidance to help reduce network Latency and Jitter, to help increase the Availability, Integrity and Confidentiality of data, and to help design and deploy a Scalable, Robust, Secure and Future-Ready EtherNet/IP network infrastructure: Single Industrial Network Technology Robust Physical Layer Segmentation / Structure (modular & scalable building blocks) Prioritization - Quality of Service (QoS) Redundant Path Topologies with Resiliency Protocols Time Synchronization PTP, CIP Sync, Integrated Motion on the EtherNet/IP network Multicast Management Convergence-ready Solutions Security Holistic Defense-in-Depth Scalable Secure Remote Access Wireless LAN 802.11 - Autonomous, Unified Rockwell Automation TechED 2015 @ROKTechED #ROKTechED 15

16 Security Holistic Defense-in-Depth CPwE Reference Architectures - Architectural Security Framework Enterprise Internet External DMZ/ Firewall Enterprise Zone: Levels 4 5 Industrial Demilitarized Zone (IDMZ) Physical or Virtualized Servers Patch Management AV Server Application Mirror Remote Desktop Gateway Server Industrial Zone: Levels 0 3 Authentication, Authorization and Accounting (AAA) Core Switches Wireless LAN Controller (WLC) Active Level 3 Site Operations: Distribution Switch Stack Standby FactoryTalk Client Level 2 Area Supervisory Control LWAP SSID 2.4 GHz SSID 5 GHz WGB Controller Controller Level 1 - Controller I/O Soft Starter MCC Level 0 - Process I/O Drive

17 Additional Material Training & Certifications Cisco Industrial Networking Specialist Training and Certification E-learning modules (pre-learning courses) Control Systems Fundamentals for Industrial Networking (ICINS) Networking Fundamentals for Industrial Control Systems (INICS) Classroom training Managing Industrial Networks with Cisco Networking Technologies (IMINS) Exam 200-401 IMINS CCNA Industrial Training and Certification Classroom training Managing Industrial Networks for Manufacturing with Cisco Technologies (IMINS2) Exam 200-601 IMINS2 Industrial IP Advantage E-learning modules CPwE Design Considerations and Best Practices

PUBLIC INFORMATION Copyright 2014 Rockwell Automation, 18 Inc. All Rights Reserved. Network & Security Services: Life Cycle Approach to Services and Solutions ASSESS DESIGN IMPLEMENT VALIDATE MANAGE A good place to start the journey is with a security assessment.

19 Key Takeaways Education and awareness: Within your organization, for your customers or trusted partners Establish an open dialog between Industrial Automation and IT groups Establish an Industrial security policy, unique from and in addition to the Enterprise security policy Holistic Defense-in-Depth approach: no single product, methodology, nor technology fully secures IACS networks Be aware of Industrial Automation and Control System Security Standards ISA/IEC-62443 (Formerly ISA99), NIST 800-82, DHS External Report # INL/EXT-06-11478 Utilize standards, reference models and reference architectures Work with trusted partners knowledgeable in industrial automation and security "Good enough" security now, is better than "perfect" security... never. (Tom West, Data General

Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. Securing The Connected Enterprise PUBLIC www.rockwellautomation.com