A Case Study for Building Cybersecurity Policies for Industrial Robots



Similar documents
Fast Innovation requires Fast IT

Making Machines More Connected and Intelligent

Cisco Cyber Threat Defense - Visibility and Network Prevention

Evolving from SCADA to IoT

APIs The Next Hacker Target Or a Business and Security Opportunity?

INSERT COMPANY LOGO HERE

Strengthen security with intelligent identity and access management

How the Internet of Things Will Transform the Manufacturing Industry

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

Cisco Cybersecurity Pocket Guide 2015

OPC & Security Agenda

Leverage the Internet of Things to Transform Maintenance and Service Operations

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Security for Financial Services: Addressing the Perception Gaps in a Dynamic Landscape

Big Data and Security: At the Edge of Prediction

The Internet of Things and I4.0 is an Evolution. New Markets (e.g. maintenance hub operator) Data Driven. Services. (e.g. predictive.

Connected Manufacturing

Building the Internet of Things Jim Green - CTO, Data & Analytics Business Group, Cisco Systems

Preemptive security solutions for healthcare

Defending the Internet of Things

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Microsoft s cybersecurity commitment

IT Security and OT Security. Understanding the Challenges

BYOzzzz: Focusing on the Unsolved Challenges of Mobility, An Industry Perspective

ARC VIEW. Services Oriented Drives Support Critical Energy Management and Asset Management Applications through IT/OT Convergence. Keywords.

Cisco Advanced Malware Protection for Endpoints

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

SMART TRANSPORT KEEPING STUDENTS CONNECTED AND SAFE WITH THE SMART SCHOOL BUS

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions

Data Analytics. How Operational Analytics can transform the grid. Sameer Tiku. Product Architect. Bentley Systems

IoT Changes Logistics for the OEM Spare Parts Supply Chain

Ernie Hayden CISSP CEH GICSP Executive Consultant

Update On Smart Grid Cyber Security

Architecting and Building a Secure and Compliant Virtual Infrastructure and Private Cloud

Securing The Connected Enterprise

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Airports and their SCADA Systems. Dr Leigh Armistead, CISSP. Peregrine Technical Solutions

SIMATIC IT Historian. Increase your efficiency. SIMATIC IT Historian. Answers for industry.

Predicting From the Edge in an

Architecting an Industrial Sensor Data Platform for Big Data Analytics: Continued

Shared Infrastructure: What and Where is Collaboration Needed to Build the SM Platform?

PLCs and SCADA Systems

Igniting the Next Industrial Revolution

ARC VIEW. Inductive Automation s Ignition Technology Offers Potential to Disrupt HMI/SCADA Market VISION, EXPERIENCE, ANSWERS FOR INDUSTRY

How To Manage Log Management

BOOST YOUR BUSINESS WITH M2M TECHNOLOGY

Cisco Fog Computing Solutions: Unleash the Power of the Internet of Things

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

SECURITY IN THE INTERNET OF THINGS

IoT Edge Processing. Evolution of edge computing analytics and long-term data retention. JEFF KIBLER VP Tech Services, Infobright

Scalable, Secure Remote Monitoring Solutions Stay a step ahead by remotely monitoring your critical assets

Performance Management for Enterprise Applications

Database Security in Virtualization and Cloud Computing Environments

of The New England Water Works Association

INSERT COMPANY LOGO HERE. Solutions for Discrete Product Industries Leadership New Product Award Innovation Award

Architecting an Industrial Sensor Data Platform for Big Data Analytics

Zendesk + Salesforce. Step-by-Step Guide to Integrating Zendesk and Salesforce.

Enterprise Security Architecture

IBM QRadar Security Intelligence April 2013

Impact of OPC UA and Information Modeling on Monitoring Solutions. Ron DeSerranno, Founder / CEO rdeserranno@b-scada.com

The Growing Need for Real-time and Actionable Security Intelligence Date: February 2014 Author: Jon Oltsik, Senior Principal Analyst

How To Manage Security On A Networked Computer System

A Peek into the Future-''Internet of Things''

USERS CONFERENCE Copyright 2016 OSIsoft, LLC

Requirements When Considering a Next- Generation Firewall

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Disrupting The Market: Predictive Analytics As A Service

VCE SUPPORT OVERVIEW. Investment Protection and Welcome Peace of Mind

Building Smarter Manufacturing With The Internet of Things (IoT)

RSA Identity Management & Governance (Aveksa)

Cisco Advanced Malware Protection

API Management: Powered by SOA Software Dedicated Cloud

Critical Security Controls

Cisco Cyber Threat Defense Solution: Delivering Visibility into Stealthy, Advanced Network Threats

Cisco Advanced Malware Protection for Endpoints

GE Fanuc Production Management Software

Active Visibility for Multi-Tiered Security. Juergen Kirchmann Director Enterprise Sales EMEA

Information Management & Data Governance

Cisco Secure BYOD Solution

NCTA Cloud Architecture

THE BLUENOSE SECURITY FRAMEWORK

Proactive Asset Management with IIoT and Analytics

IT Architecture Review. ISACA Conference Fall 2003

The Need for Intelligent Network Security: Adapting IPS for today s Threats

Transcription:

SESSION ID: ECO-F03 A Case Study for Building Cybersecurity Policies for Industrial Robots Francis Cianfrocca Bryce Barnes Founder & CEO Bayshore Networks @BayshoreNet @cianfrocca 2015: Managing OT in a Digital Business IoT Solutions Architect, Manufacturing & Energy Cisco @Cisco

What IT Professionals Need to Know About OT Security A new reality for industrial enterprises Data capture from OT (Operational Technology) environments Operational and SCADA visibility Predictive analytics Continual process optimization 2

Why It Matters A competitive advantage: Intelligent capture, Aggregation, Inspection, and Analysis It s necessary for survival 3

Why It s Hard Security Security Security 4

What s Hard About OT Security It s less about CIA It s more about Availability, Uptime and Safety You can t just shut down or update machines to remediate security problems 5

OT Security Is Fundamentally Different A holistic approach is needed Point solutions are not the answer Visibility (thru authentication and authorization) plus content inspection Holistic policy frameworks Manageability at scale Pervasive enforcement 6

A Broader View for Enterprise IT Computers, apps and networks are managed by IT Arrgh! Who will help me figure this out? As assets within Information Security, computers, apps and networks are managed by IT As assets within an Operations Center, their productivity efficiencies and use, computers, apps and networks are managed by IT How are they to be reconciled/converged? 7

Toward a Solution IT and OT people need to be deeply conscious of security 8

Experience and Learnings We ll present an extended example Discrete manufacturing The general problems are broadly applicable 9

The Business Driver Predictive analytics A classic Industrial Internet application: Cuts production downtime Provides secure remote access Cuts maintenance costs 10

Here s the Architecture 11

The Technical Objective Transmit fine-grained SCADA telemetry to a cloud-based application Permit intermittent access by remote access service personnel 12

The Security Problems Requires a new integration between IT and OT networks 13

Industrial Networking Is Different Transmit identity and contextual-based access controls Enforcing who, what, where and their role Enforce content-based policy constraints 14

The Security Risks Bad things can happen, particularly if PLCs (Programmable Logic Controllers) or control loops or machines are written to. 15

Here s the Solution Architecture Fine- grained, contextually aware access control functions. Tags Tags Tag Propagation 16

Why It Works Unsafe transactions are blocked and machine access is restricted to specific user roles 17

Holistic Policy Many policy frameworks are possible, but you just need one. 18

How It Helps IT People Holistic management Solves the scale problem New, OT-aware security products fill the knowledge gap 19

How It Helps OT People Addresses the business driver. Presents minimal risk to availability and uptime. The ideal solution bridges IT and OT. 20

How You Can Use This The basic technique in OT security is to maintain the aspects of closed system while permitting communications. This means that identity-based security and encryption are inadequate, because identity-based controls are inadequate. Network-based controls are challenging in the OT space. Content-based controls are required to prevent unsafe operations. All three are needed for a holistic solution. 21

Apply What You Have Learned Today Next week you should: Schedule an IT/OT planning meeting to get ahead of your organization s industrial IoT security questions. In the first three months following this presentation you should: Identify the roles of IT and OT with regards to your organization s cybersecurity strategy. Within six months you should: Select a cybersecurity solution which allows proactive operational, security and safety policy to be set according to your organization s needs Drive an implementation project to protect your industrial infrastructure. 22