PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy



Similar documents
SAN MATEO COUNTY OFFICE OF EDUCATION

A brief on Two-Factor Authentication

Compiled By: Chris Presland v th September. Revision History Phil Underwood v1.1

RAP Installation - Updated

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

Professional Integrated SSL-VPN Appliance for Small and Medium-sized businesses

Innovative Defense Strategies for Securing SCADA & Control Systems

Implementing a Microsoft Windows 2000 Network Infrastructure

Remote Access via VPN Configuration (May 2011)

DeltaV Web Server. DeltaV Web Server. Introduction. DeltaV Product Data Sheet. Gives you a secure view of your process from your desktop PC

A guide to CLARiSUITE TM network solutions

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Configuring IPsec VPN with a FortiGate and a Cisco ASA

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

Designing a Windows Server 2008 Network Infrastructure

I.T. Assurance. Letting you do what you do best... run your business

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Technical White Paper

Redesigning automation network security

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Millbeck Communications. Secure Remote Access Service. Internet VPN Access to N3. VPN Client Set Up Guide Version 6.0

A Guide to New Features in Propalms OneGate 4.0

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Appendix C Network Planning for Dual WAN Ports

Configuring Windows Server 2008 Network Infrastructure

Understanding Security Testing

Building Your Complete Remote Access Infrastructure on Windows Server 2012

IT Security - Regulations and Technical Aspects. Network concepts. Authors: Andreas Lorenz and Thomas Brandel

Chapter 3 LAN Configuration

Object: Eurocopter network architecture and security rules. Technical implementation in each Eurocopter site (EC/ECD/subsidiaries)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Using IPsec VPN to provide communication between offices

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

DirectAccess in Windows 7 and Windows Server 2008 R2. Aydin Aslaner Senior Support Escalation Engineer Microsoft MEA Networking Team

RuggedCom Solutions for

7.1. Remote Access Connection

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

VPN Lesson 2: VPN Implementation. Summary

Microsoft Office365 with Active Directory Federated Services (ADFS) Authenticating Users Using SecurAccess Server by SecurEnvoy

IT Security and OT Security. Understanding the Challenges

NETFORT LANGUARDIAN MONITORING WAN CONNECTIONS. How to monitor WAN connections with NetFort LANGuardian Aisling Brennan

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

DIGIPASS Authentication for SonicWALL SSL-VPN

NERC CIP Substation Cyber Security Update. John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Windows Remote Access

IP PBX. SD Card Slot. FXO Ports. PBX WAN port. FXO Ports LED, RED means online

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Access Control in Home Networking

800xA Smart Client Frequently Asked Questions

Course Outline: Designing a Windows Server 2008 Network Infrastructure

Out-of-Band Multi-Factor Authentication Cloud Services Whitepaper

Firewall Environments. Name

IT Onsite Service Contract Proposal. For. <<Customer>> Ltd

What would you like to protect?

Safe Network Integration

Secure Networks for Process Control

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

Industrial Security for Process Automation

Secure Communication Made Easy

Solving the Desktop Dilemma

Gigabit SSL VPN Security Router

70-647: Windows Server Enterprise Administration

John M Shaw Presentation to UTC Region 7 February 19, 2009 jshaw@garrettcom.com

Enable VPN PPTP Server Function

The BiGuard SSL VPN Appliances

RAS Associates, Inc. Systems Development Proposal. Scott Klarman. March 15, 2009

Chapter 8 Router and Network Management

This section provides a summary of using network location profiles to identify network connection types. Details include:

Chapter 3 Security and Firewall Protection

ADDING STRONGER AUTHENTICATION for VPN Access Control

Scalable Secure Remote Access Solutions

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

When Your Networkʼs Down, Call Crown

Decrease your HMI/SCADA risk

Lesson 24 Network Fundamentals

Who s Endian?

Designing and Implementing a Server Infrastructure

Directed Circuits Meet Today s Security Challenges in Enterprise Remote Monitoring. A White Paper from the Experts in Business-Critical Continuity TM

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

Building A Secure Microsoft Exchange Continuity Appliance

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

Meraki MX50 Hardware Installation Guide

To Configure Network Connect, We need to follow the steps below:

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

OPC & Security Agenda

APS Windows Servers Argonne National Laboratory is managed by The University of Chicago for the U.S. Department of Energy

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Firewall VPN Router. Quick Installation Guide M73-APO09-380

Using a VPN with Niagara Systems. v0.3 6, July 2013

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Multi-Homing Dual WAN Firewall Router

Basic Network Configuration

MOBILITY & INTERCONNECTIVITY. Features SECURITY OF INFORMATION TECHNOLOGIES

Network Security 1 Module 4 Trust and Identity Technology

R4: Configuring Windows Server 2008 Network Infrastructure

Transcription:

PCN Cyber-security Considerations for Manufacturers Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

Contents CPChem PCN Philosophy and Policy Remote Access Considerations CPChem PCN Architecture Our Expectations from the vendors Summary

CPChem PCN Cyber- Security Policy Adopted 3 rd Qtr 2002 Joint IT & Process Control effort General Philosophy No changes to process controls from outside the PCN PCN must operate independently from the business network Controls and APC applications go in the PCN. Everything else goes in the business network. No business computing done on PCN computers (i.e., e-mail, Word, Excel, Internet, intranet)

PCN Policy Highlights No network connections to PCN except the local CPChem Business Network (BN) LAN Firewall between BN and PCN All inbound traffic blocked Only required outbound traffic allowed Central firewall management Standard hardware across enterprise

PCN Policy Highlights PCN Network may not physically extend outside the process area. Exceptions must be approved by Plant Manager and IT. Computers may not be connected to the BN and PCN simultaneously No control changes made from outside the PCN Anti-virus in PCN required if applications will handle it Password security rules same as BN except for Operator Stations

PCN Policy Highlights No modems in the PCN Remote Access requires IT and Plant Manager approval Remote access to PCN only via VPN with twofactor authentication Non-employees token held by CPChem employee 1 st choice is SSL VPN with Terminal Session access 2 nd choice is IP-Sec VPN with IP address restricted access

Remote Access Balance Need for Security Low probability but high consequences Open system propagation Unknown threat source Need for Access High benefit applications Limited expert support Reliability required for Operator confidence Systems may not be as robust as Business Apps.

CPC Secure PCN to BN Network Architecture Site Distirbution Router CPC WAN Firewall WWW PC PC Laptop Switch LAN Emplyee Laptop Vendor Laser printer PC Tape Drive Database Server Print Server Application Server File Share Server LIMS Servrer Data Historian Domain Controller DHCP Anit-virus Routable Subnets Data Pushed Out to PIN Laptop Laser printer PC Firewall Outbound Open Only for Need Inbound Totally Closed Non-Routable Subnets Data Pulled Down to PCN PCN Tape Drive Domain Controller WINS Proxy Anti-Virus Print Server APC Server Computer Gateway DCS Server Data Historian Collectors Operator Station LCN DCS Control Modules & Alarms Process Control Signals PLC

CPChem Vendor Expectations Stay more current with other vendor upgrades and patches (Microsoft, Oracle, etc.) Design for remote support via VPN, not modems. Do not design PCN hardware and software expecting MS Office, email, Instant Messaging, Intranet access, or Internet access. Design to push data out of the PCN

CPChem Vendor Expectations Applications on the BN should not need to access the PCN for reporting and analysis. Design to OPC standards Design software that will connect to any major brand of data historian (OPC connections) For Microsoft platforms: Design security to connect to Active Directory and use the PCN domain network password for access to everything.

Summary Suppliers need to address PCN security during design ISA SP 99 NIST SPP-ICS NIST SCP-ICS Suppliers need to stay current if using open systems