Ovation Security Center Data Sheet

Similar documents
Ovation Security Center Data Sheet

Verve Security Center

Industrial Security for Process Automation

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Protecting Your Organisation from Targeted Cyber Intrusion

How To Secure Your System From Cyber Attacks

Cyber Security for NERC CIP Version 5 Compliance

Sygate Secure Enterprise and Alcatel

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

SANS Top 20 Critical Controls for Effective Cyber Defense

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Cybersecurity Health Check At A Glance

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Document ID. Cyber security for substation automation products and systems

Building A Secure Microsoft Exchange Continuity Appliance

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Data Management Policies. Sage ERP Online

AVeS Cloud Security powered by SYMANTEC TM

System Management. What are my options for deploying System Management on remote computers?

TRIPWIRE NERC SOLUTION SUITE

External Supplier Control Requirements

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Kaseya IT Automation Framework

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

Section 12 MUST BE COMPLETED BY: 4/22

Chapter 9 Firewalls and Intrusion Prevention Systems

Information Technology Solutions

LogRhythm and NERC CIP Compliance

North American Electric Reliability Corporation (NERC) Cyber Security Standard

GFI White Paper PCI-DSS compliance and GFI Software products

Managed Service Plans

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Did you know your security solution can help with PCI compliance too?

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Driving Company Security is Challenging. Centralized Management Makes it Simple.

THE TOP 4 CONTROLS.

Network and Host-based Vulnerability Assessment

Innovative Defense Strategies for Securing SCADA & Control Systems

Achieving PCI-Compliance through Cyberoam

GE Measurement & Control. Cyber Security for NEI 08-09

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Summary of CIP Version 5 Standards

Proven LANDesk Solutions

Supplier Information Security Addendum for GE Restricted Data

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

IBM Endpoint Manager for Core Protection

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

GE Measurement & Control. Cyber Security for NERC CIP Compliance

SECURITY BEST PRACTICES FOR CISCO PERSONAL ASSISTANT (1.4X)

Trend Micro. Advanced Security Built for the Cloud

Guideline on Auditing and Log Management

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

GE Measurement & Control. Cyber Security for Industrial Controls

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

LogRhythm and PCI Compliance

Remote Services. Managing Open Systems with Remote Services

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Best Practice Configurations for OfficeScan (OSCE) 10.6

INCIDENT RESPONSE CHECKLIST

Defending Against Data Beaches: Internal Controls for Cybersecurity

Endpoint Security for DeltaV Systems

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

74% 96 Action Items. Compliance

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

How To Manage Security On A Networked Computer System

Data Sheet: Endpoint Security Symantec Network Access Control Comprehensive Endpoint Enforcement

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Critical Security Controls

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

How To Achieve Pca Compliance With Redhat Enterprise Linux

Windows Remote Access

Best Practices for DanPac Express Cyber Security

Trend Micro OfficeScan Best Practice Guide for Malware

White Paper: Consensus Audit Guidelines and Symantec RAS

Operational Continuity

Firewalls, Tunnels, and Network Intrusion Detection

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

Patch and Vulnerability Management Program

IT Security and OT Security. Understanding the Challenges

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Network Instruments white paper

5 Steps to Advanced Threat Protection

Payment Card Industry Data Security Standard

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Injazat s Managed Services Portfolio

FISMA / NIST REVISION 3 COMPLIANCE

The Comprehensive Guide to PCI Security Standards Compliance

Reducing the cost and complexity of endpoint management

INSIDE. Securing Network-Attached Storage Protecting NAS from viruses, intrusions, and blended threats

Choosing Between Whitelisting and Blacklisting Endpoint Security Software for Fixed Function Devices

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Symantec Endpoint Protection Analyzer Report

NERC CIP VERSION 5 COMPLIANCE

The SIEM Evaluator s Guide

Transcription:

Features Scans for vulnerabilities Discovers assets Deploys security patches easily Allows only white-listed applications in workstations to run Provides virus protection for Ovation Windows stations Aggregates, normalizes, and correlates events for security incident identification Stores logs for forensic analysis with integrity check Inspects data packets across Ovation perimeter Image backup and recovery of the Ovation system Supports Ovation Windows and Solaris (Limited) operating platforms Supports cyber security of multiple Ovation control systems Introduction The Ovation Security Center consists of a suite of security functions and services that have the ability to enhance and manage the cyber security of the Ovation expert control system without disrupting the controlled process. These security products were specifically selected for their capability to improve system security while reducing the cost of complying with the North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standards. Their ability to automate procedures that are currently performed manually and their capacity to integrate with the real-time control system, gives Ovation customers an advantage for system security. While targeted to address the CIP standards, the Ovation Security Center functions enhance the plant s reliability and availability through a well-managed security operation of control systems. The Ovation Security Center is comprised of the security functions that are crucial to normal plant operations and are deployable on the customer s security priorities. Emerson Process Management Power & Water Solutions, Inc. - 1 -

The Ovation Security Center s integrated hardware/software solution is packaged in an enclosure with a network interface to Ovation control systems. All security functions performed are managed from outside the security perimeter, providing a separate DMZ for maximum integrity and security. The Ovation Security Center executes all administrative, reporting, and control functions and provides local and/or remote display capabilities through standard web browsers. Emerson provides the infrastructure of components required to support any software updates, including a subscription server for downloading patches and files, sufficient bandwidth to support the downloads, and verification of patches for compatibility with Ovation releases. Ovation Security Center Components Vulnerability Scan The Ovation Security Center s Vulnerability Scan function addresses CIP-005 - Electronic Security Perimeter(s) section R4 and CIP-007 - Systems Security Management section R8: Cyber Vulnerability Assessment respectively. The Vulnerability Scan function provides a centralized vulnerability assessment and identification function for Ovation systems. It is a network-based scanning solution that performs a comprehensive examination of all devices on the Ovation network, including servers, workstations, routers, printers, and switches. The scan s purpose is to discover devices on the network and identify their vulnerabilities, such as missing patches; so that the vulnerabilities are remediated before they are exploited. The Vulnerability Scan is also capable of running detailed configuration checks that enumerate ports, users, shares, groups, agents, and services. Scans are user-scheduled to collect information that is integrated with the Security Incident & Event Management functions, which provides a complete picture of the overall risk posture. Vulnerability Scan Benefits: Automates discovery of all network devices, operating systems, and infrastructure Performs ad hoc scans targeting a single or multiple machines Provides details of identified vulnerabilities, impact to the organization, and options to fix Supports the ability to schedule scans Patch Management The Ovation Security Center s Patch Management function addresses CIP-007 section R3: Security Patch Management. The Patch Management function provides a centralized software patch distribution mechanism for Microsoft Windows and Sun Solaris - based Ovation workstations. The function compiles a comprehensive, centralized view of the patch status of the Ovation system through agent-based scans of each managed endpoint. A graphical dashboard consisting of more than 20 standard reports documents the current patch status, history of patch deployments, trends, client inventory and more at the individual machine or aggregated levels. This information is integrated into the Security Incident & Event Management functions to support compliance reporting requirements. The Patch Management function is capable of deploying security patches for the underlying operating systems and selected integrated thirdparty applications. Patch deployment is automated, based on user-configurable distribution policies. Patch update downloads are initiated from the Ovation Security Center and retrieved through Emerson s SureService Ovation Security Center Support Module. Emerson Process Management Power & Water Solutions, Inc. - 2 -

Patch deployment can be scheduled to run automatically, but typically require a workstation reboot for the patches to be effective. The manager of the Patch Management function operates in a virtualized environment, utilizing an agent that is installed on each managed workstation to permit the remote installation of software updates. Patch Management Benefits: Allows processing of patches, auto scanning, inventory and scan access Enables multiple machine/patch deployment in schedulable jobs Ability to patch multiple operating system types Option to reboot each station automatically or manually after patches are deployed Malware Prevention The Ovation Security Center s Malware Prevention function addresses CIP-007 System Security Management, section R4: Malicious Software Prevention. This function provides centralized configuration and control of the Malware Prevention agent that resides on each Ovation host workstation. If an executable file name does not reside on the whitelist, the security software restricts that executable from running, thus rendering it quarantined. The Malware Prevention function provides a unique approach for protecting Ovation workstations against viruses, worms, and Trojans. Rather than regular updates to a blacklist and assuming all intrusions will be caught, this appliance uses application whitelisting at the kernel level in each endpoint workstation, which simplifies and effectively blocks any unauthorized executable from running. If the executable is not on the list, it doesn t run. This appliance defends against security breaches on four fronts: 1. Directly defeats malware and other exploits by preventing them from executing 2. Limits user privileges 3. Prevents end users from altering the approved and validated system configuration 4. Intercepts any inappropriate behavior (e.g. memory exploits like DLL injections) and examines other mechanisms that malware attempts to exploit The manager of the Malware Prevention function operates in a virtualized environment utilizing an agent that integrates into the kernel space of each protected workstation. This allows the workstation to incorporate protection from memory exploits (even if they re using approved applications) and provides integrity checks including file digest, file location, and file size. Malware Prevention events are reported to the Ovation Security Center Security s Incident & Event Management function as a security event. Standard malware prevention reports are available for operations management and regulatory compliance. Malware Prevention software logs any applications that have been blocked and provides a scrub option that the administrator can use to remove them from the client machine. Emerson Process Management Power & Water Solutions, Inc. - 3 -

Malware Prevention Benefits: No malware, grayware, or other unauthorized executables running to compromise security, performance, or availability Tamper protection guards against unauthorized access and attacks, protecting users from malware that attempt to disable security measures Enforces regulatory policy compliance Provides preventative protection against targeted attacks Antivirus Protection The Ovation Security Center s Antivirus function addresses CIP-007 System Security Management, section R4: Malicious Software Prevention. This function provides real-time virus protection based on the known signatures of malicious software. Signatures are tested weekly and released by Emerson. The targets of the protection are the Windows workstations that are more susceptible virus attacks. The Antivirus function includes the device control capability on Microsoft Windows for workstations. Access to those devices can be blocked via user names or restricted with readonly rights. The manager of the Antivirus function operates in a virtualized environment, utilizing an agent that is installed on each managed workstation to permit the remote installation of software updates. Antivirus Benefits: Mature technology Easy deployment Affordable pricing Device control for addressing root issues Security Incident & Event Management The Ovation Security Center s Security Incident & Event Management function provides centralized collection and correlation mechanisms that expedite the analysis and reporting of the Ovation system s security posture. The function aggregates and normalizes all events and logs reported by the variety of firewalls, intrusion detection software, antimalware products, vulnerability scanners, network devices, workstations, and active directories that exist within the system. These actions address CIP-007 Systems Security Management, specifically section R6: Security Status Monitoring. The protection is more effective when the devices of the stations, such as disk drives, USB ports, or CD/DVD drives, are closely controlled or tightly restricted. The virus-laden files cannot be transferred from removable media to the station when the access is blocked. It further protects against the potential, illegal information leaks through unauthorized file transfers. Additionally, the function simplifies large amounts of disparate types of data in order to provide an indication that a security incident may be happening. The Event Management function analyzes the data in detail and provides depth of context. Distinct reports can be generated specifically for NERC CIP compliance. Emerson Process Management Power & Water Solutions, Inc. - 4 -

Log Management Benefits: Meets compliance log retention requirements Adapt storage and retention to each log source Analyze and search logs conveniently and appropriately Stores logs in a managed NAS Security Incident & Event Management Benefits: Smart protection, confidence, and regulatory compliance Comprehensive security events collection and monitoring for multi-vendor security environments Real-time event correlation to detect both known and unknown threats Comprehensive interactive reporting for fast and intuitive security analysis Easy setup, dashboard, report and alert customization Log Management 1 As part of the Security Incident & Event Management function, the Log Management function provides the ability to retain and preserve the original log files for an extended period of time. The storage of the multiple raw logs requires an external Network Attached Storage device. This feature is required per CIP- 008 Incident Reporting & Response planning, in the event that a real cyber security incident has been identified and evidence needs to be retained. Network Intrusion Detection 1 The Ovation Security Center s Network Intrusion Detection function addresses the growing concerns and possibilities of cyber-attacks from the plant network rather than from compromised control workstations or end points. The Network Intrusion Detection appliance is connected inline or to a span port monitoring traffic at Ovation s perimeter access points. The data traffic across these access points will be extensively inspected against the protocol headers and payloads. Potential network-based attacks, including worms, Denial-of-Service (DOS), and other forms of malware can be detected. The detection mechanism can be signature or anomaly-based, so that either known or unknown attack patterns can be effectively detected. At this time, this function is intended for Ovation perimeter protection or between Ovation systems within an Ovation multi-network architecture. The Network Intrusion Detection function requires the presence of the Security Incident & Event Management appliance so that the detection information is aggregated together and the alert is generated through the same setup. Log file integrity checking is provided with the calculated message digest with an MD5 algorithm. Changing a single bit in the data causes a completely different message digest to be generated. The original digested messages are protected with encryption. 1 Log Management and Network Intrusion Detection is available with the Ovation Security Center 2.1 and 3.0 releases Emerson Process Management Power & Water Solutions, Inc. - 5 -

System Backup & Recovery 3 The disaster recovery goal of System Backup & Recovery is to expedite full recovery if or when the Ovation system experiences a partial or full loss of its software assets. Network Intrusion Detection Benefits: Detection of cyber-attacks from adjacent networks Extensive inspection protocols and payloads Integration of detection information with the Security Incident & Event Management Network Attached Storage 2 Network Attached Storage provides an easy-touse, high-performance storage solution to share and protect critical data. Installed in the Ovation Security Center cabinet, it serves the following purposes for the Ovation Security Center s functional modules and Ovation control systems: Bulk storage of the Log Management archived logs Diverse storage for back-up images of the Ovation Security Center appliances Ovation backup-images from the new System Backup & Recovery Remote replication to another storage device to support offsite archiving. Based on image technology, the System Backup & Recovery function can perform disk- or filelevel backups that include the host s operating system, application software, configuration and data. A backup plan can be created for full, differential, incremental, or a combination of any or all backup types. The plan can be executed by schedule; can be event-triggered or even performed manually. The backup files may be sent to multiple locations, although the Network Attached Storage is the preferred selection. Software restoration can be performed for the entire Ovation system, an individual workstation, or even folders or files. The Universal Restore capability allows the restoration to a dissimilar hardware station. This feature is especially useful when the identical hardware is no-longer available. The deduplication feature is designed to save the storage space and transmission bandwidth when common software exists in various stations, such as the Ovation operator stations. 2 Network Attached Storage is available with the Ovation Security Center 2.1 and 3.0 releases 3 System Backup & Recovery is available with the Ovation Security Center 3.0 release Emerson Process Management Power & Water Solutions, Inc. - 6 -

System Backup & Recovery Benefits: Leverage the established Ovation Security Center infrastructure for supporting multiple Ovation systems Fast recovery available from disk images in case of disaster recovery Scripted plan for recovering full Ovation when real-time data base and controller synchronization needs to be considered Ovation Security Center Configuration The Ovation Security Center is designed to be safely added to an Ovation system while the controlled process is in operation. To accomplish this, the Ovation Security Center consists of the network equipment necessary to establish its own DMZ and does not require modification to any existing DMZ or field LAN communications equipment. TCP/IP connectivity is the only requirement. There is no special setup or alteration of the existing Ovation system needed. Figure 1 illustrates an overview of standard Ovation Security Center communications. All of the appliances are interconnected in a private DMZ, which is router-isolated from Ovation and the customer s plant network. Each of the communications paths are described as follows: Ovation Security Center Communications to Ovation The standard Ovation Security Center network package is designed with the inherent flexibility to connect to the most common Ovation plant configurations: Can be directly connected to one and up to eight independent (non multi-networked) Ovation DCS networks. The connection point on each Ovation network is a port on one of the Ovation switches in each DCS LAN. Can be directly connected to a single multinetworked Ovation system (up to 16 connected Ovation subnets). The connection point on the multi-network system is a port on one of the Ovation core switches. If the multi-network Ovation system is not using the Emerson collapsed backbone architecture, the Ovation Security Center can be connected to a port on any one of the multi-networked DCS LANs. The multinetwork configuration must be reviewed in order to verify that all appliances can be implemented. Intra-appliance Communications The standard Ovation Security Center network package provides a dedicated DMZ that allows communication between the appliances. This feature enables the Security Incident & Event Management appliance to collect and consolidate the security information from the other security appliances. An Emerson-provided router with integral firewall capability is used to secure the DMZ and control all traffic between the Ovation Security Center and the Ovation control system. In addition, this router controls any traffic to or from the plant LAN. Note: The router is configured to log security events to the Security Incident and Event Management functions Emerson Process Management Power & Water Solutions, Inc. - 7 -

Figure 1 depicts connection of up to eight independent Ovation DCS networks and connections to a single multi-networked Ovation system (up to 16 Ovation subnets) Emerson Process Management Power & Water Solutions, Inc. - 8 -

Ovation Security Center Communications from the Plant LAN The standard Ovation Security Center network package provides a single access point for secure communications from a corporate plant LAN to the Ovation Security Center. This connection is used for report generation, event analysis, updating patches and vulnerability definitions, and maintenance. To ensure security, this connection exists via a VPN tunnel from the user s workstation to the Ovation Security Center router. The tunnel is configured to authenticate the user with either the corporate or the Ovation Domain Controller. Additionally, the same VPN tunnel approach is used if the customer requires/permits SureService support for the Ovation Security Center. If desired, an optional firewall appliance may be used in series with the Emerson-provided router. Ovation Security Center User Interface (OSC UI) Users can manage and monitor the Ovation Security Center appliances using the Ovation Security Center User Interface (OSC UI). The OSC UI is a standard Windows machine with Remote Desktop and a browser. The machine does not have any Ovation functionality. Emerson recommends that this workstation is connected to the DMZ router for local management. If desired, the OSC UI can be connected to the plant LAN for remote management or further data analysis. Ovation Security Center Support Ovation Software Support The Ovation Security Center levels 2.0 and 2.1 will support Ovation 2.4 through 3.3.1 level systems for Microsoft Windows and Ovation 1.7.2 through 1.9.2 level systems for Sun Solaris. The Ovation Security Center level 3.0 will support Ovation 3.5 and above level systems for Microsoft Windows. Keeping Your Ovation Security Center Up-to-Date The Ovation Security Center SureService Support Module is designed to keep both the software and hardware elements of the Ovation Security Center performing at their highest levels. The support module consists of: Software Updates and Security Patches Emerson validates important patches supplied by third-party vendors applicable to the Ovation system including: Microsoft Windows 7 and XP Operating System Microsoft Windows Server 2008 and Server 2003 Operating System Sun Solaris 10 Operating System Microsoft Internet Explorer Adobe Reader It is important to keep the Ovation Security Center current with software updates and security patches. Packages consisting of tested patches, vulnerability definitions, and any appliance updates are delivered through a dedicated support web site on a monthly basis. A customer-provided PC with an Internet browser is used to download the posted file(s). These files are then transferred to the Ovation Security Center via the OSC UI using removable media (e.g. memory stick). Additionally, a cumulative DVD of all patches is delivered once per year. Component Repair Repairs to any of the Ovation Security Center components will be made during the term of a valid SureService contract that includes Ovation Security Center support. Annual License Renewal Also provided is the annual renewal fee for each of the three licensed components. The support module will need to be purchased on a yearly basis. However, the first year of the Ovation Security Center SureService Support Module is included with the purchase of the Ovation Security Center. Emerson Process Management Power & Water Solutions, Inc. - 9 -

Note: The Ovation Security Center SureService Support Module also requires the purchase of the SureService Expert Telephone Support Module. Summary The Ovation Security Center provides enhanced security management that enables Ovation control system customers to meet CIP standards for regulatory compliance. It provides a centrally located management console equipped with appliances that manage security events, patch retrieval and deployment, malware prevention, log storage and reporting, intrusion prevention, data recovery, and vulnerability discovery. Non-Ovation Applications Many functions of the Ovation Security Center can easily be extended to other control systems in the same plant. Implementation of those functions may require collaboration between the control system OEM and the asset owner. Every device that is to be covered must be network-accessible to the Ovation Security Center. Routers and firewalls within the plant s network infrastructure may have to be modified to support the Ovation Security Center s communication requirements. Security Incident & Event Management/Log Management Security Incident & Event Management can accept information sourced by other devices. Standard parsers included with the Security Incident & Event Management allow it to receive, normalize, and correlate events from many devices. A special parser may need to be developed if the device generates logs in a nonstandard format. Vulnerability Scan Nonintrusive Vulnerability Scan can be applied to all devices that are networkaccessible to the Ovation Security Center over the network. The scanner can determine a device s operating system and other attributes once administrative credentials have been provided. Patch Management A host agent will be installed on each supported workstation. After the host agent is incorporated, the workstation s OEM or asset owner can verify the correct operation of the workstation. The monthly tested operating system patches are generally available from each workstation s OEM. The list of the approved patches can be compared with the approved patch list from Emerson. Any unneeded patches can be removed from the deployment list. Any additionally required patches can be packaged separately and deployed to the OEM s workstations by the asset owner Malware Prevention An agent will need created for each workstation to be protected Each agent can be developed jointly between the OEMs of the workstation and the Malware Prevention appliance, and supported by the asset owner Backup & Recovery A backup plan needs to be created so that the data, scheme, access credentials, and storage locations can be properly defined Local database needs to be attended particularly with the assistance from the OEM Network Intrusion Detection Network Intrusion Detection can be used with other network devices that are customer supplied The list of the supported devices is available for compatibility verification. Emerson Process Management Power & Water Solutions, Inc. - 10 -