Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes



Similar documents
UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

Waterfall for NERC-CIP Compliance

New Era in Cyber Security. Technology Development

Applying NERC-CIP CAN-0024 Guidance for Data Diodes To Unidirectional Security Gateways

CRITICAL INFRASTRUCTURE

White Paper Levels of Linux Operating System Security

CROSS DOMAIN SOLUTIONS

Safe Network Integration

ISACA rudens konference

IT Security and OT Security. Understanding the Challenges

Keeping the Lights On

Redesigning automation network security

Owl Products Help Manage Medical Information Security in Compliance with HIPAA Regulations

Invensys Security Compliance Platform

New Technologies for Substation Cyber Hardening

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Data Communication Networks and Converged Networks

SCADA Security Training

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Recommended IP Telephony Architecture

OWL PERIMETER DEFENSE SOLUTION (OPDS) INSTALLATION AT SAFCO

An Analysis of the Capabilities Of Cybersecurity Defense

Cyber Security Implications of SIS Integration with Control Networks

SCADA/Business Network Separation: Securing an Integrated SCADA System

Cyber Security Summit Milano, IT

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Cyber Security for NERC CIP Version 5 Compliance

Strong Security in NERC CIP Version 5: Unidirectional Security Gateways

NERC CIP Version 5 and the PI System

Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Seven Strategies to Defend ICSs

How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager

District of Columbia Courts Attachment 1 Video Conference Bridge Infrastructure Equipment Performance Specification

Introduction to Waterfall Unidirectional Security Gateways: True Unidirectionality, True Security

Network System Design Lesson Objectives

PR03. High Availability

REFERENCE ARCHITECTURES FOR MANUFACTURING

GE Measurement & Control. Cyber Security for NEI 08-09

Stronger Than Firewalls: Unidirectional Security Gateways

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

OWL PERIMETER DEFENSE SOLUTION INSTALLATION AT SAUDI ARABIAN FERTILIZER COMPANY (SAFCO)

Cybersecurity in a Mobile IP World

Floodgate Security Framework

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Local Area Networks (LANs) Blueprint (May 2012 Release)

Security appliances with integrated switch- Even more secure and more cost effective

FIREWALLS & CBAC. philip.heimer@hh.se

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

An International Perspective on Security and Compliance

Secure Software Update Service (SSUS ) White Paper

Network Security Infrastructure Testing

5 IPTV MONITORING BEST PRACTICES

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

The Internet of Everything:

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet

Implementing Deep-Secure guards in NATO Information Exchange Gateways

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

ACSAC CWID 2007 Data Diode Case Study. toll free

Network Access Control in Virtual Environments. Technical Note

Help for the Developers of Control System Cyber Security Standards

Joint Information Environment Single Security Architecture (JIE SSA)

AURORA Vulnerability Background

Technical Note. ForeScout CounterACT: Virtual Firewall

Chapter 9A. Network Definition. The Uses of a Network. Network Basics

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

DeltaV System Health Monitoring Networking and Security

Secure Networks for Process Control

Resilient and Secure Solutions for the Water/Wastewater Industry

NATIONAL RESEARCH AGENCY CASE STUDY - CCTV NETWORK SERVICES

CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required

Facilitated Self-Evaluation v1.0

Three Simple Steps to SCADA Systems Security

Innovative Defense Strategies for Securing SCADA & Control Systems

HANDBOOK 8 NETWORK SECURITY Version 1.0

An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015

Introduction to Computer Networks and Data Communications

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

ICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection

How are cyber security standards and technologies relevant to Drilling Control Systems?

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

OPC & Security Agenda

Using Tofino to control the spread of Stuxnet Malware

Increasing Situational Awareness and Multi-zone Protection of Utility Infrastructure

NEW GENERATION PROGRAMMABLE AUTOMATION CONTROLLER

Nuclear Plant Information Security A Management Overview

SCADA Cyber Security

Trends, Issues, and New Standards for ICS Security

Verve Security Center

CIP Electronic Security Perimeter (ESP) - Dan Mishra FRCC Compliance Workshop May 09-13, 2011

Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2

Rethinking Cyber Security for Industrial Control Systems (ICS)

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

Transcription:

Meeting the Cybersecurity Standards of ANSI/ISA 62443 with Data Diodes Dennis Lanahan June 1, 2015 Securing the convergence of OT and IT with ST 1

Introduction to Owl US US Owned and & Operated Product Suite Suite of cybersecurity products 1200+ Security Solutions Deployed 2000+ Security Solutions Started 16 years ago with data diode technology from US DOE Sandia National Laboratory Patented and Proprietary DualDiode technology Hardware enforced, network protocol break, One way link (Owl) Over 2000 deployments globally Serve US DoD & Co-Commands, US Intelligence agencies, DISA, DOE, DHS, DOS and many other US Gov. agencies Accredited solutions for unclassified, secret, top secret and coalition partner networks Supporting Critical Infrastructure for 9 years Protecting over 200 process control sites in critical infrastructure Oil & Gas, Nuclear, Fossil, and Hydro power generation, T&D, petrochemical, water/wastewater, mining Rockwell Encompass Partner since 2013 2

Introduction to Owl US Owned & Operated Product Suite Suite of cybersecurity products 1200+ Security Solutions Deployed 2000+ Security Solutions Started 16 years ago with data diode technology from US DOE Sandia National Laboratory Patented and Proprietary DualDiode technology Hardware enforced, network protocol break, One way link (Owl) Over 2000 deployments globally Serve US DoD & Co-Commands, US Intelligence agencies, DISA, DOE, DHS, DOS and many other US Gov. agencies Accredited solutions for unclassified, secret, top secret and coalition partner networks Supporting Critical Infrastructure for 9 years Protecting over 200 process control sites in critical infrastructure Oil & Gas, Nuclear, Fossil, and Hydro power generation, T&D, petrochemical, water/wastewater, mining Rockwell Encompass Partner since 2013 3

Enabling the Connected Enterprise Securing the convergence of OT and IT with ST Owl DualDiode is Security Technology (ST) Designed and Deployed at the intersection of OT and IT Hardware Enforced Security Policy cannot change Ethernet connectivity for ease of implementation in networks Rack-mounted & DIN Rail appliance utilize DualDiode technology 4

Why we need Cybersecurity * Common Criteria Part 1: Introduction and general model, 2005, v2.3 5

Cybersecurity Standards ANSI/ISA-62443 NERC CIP 002-009 NIST SP800-82 API Standard 1164 ChemITC AWWA G430-09 Owl has mapped solutions to the various standards Same implementation process applies 6

Definitions (ANSI/ISA 62443) Security Zone: A logical grouping of physical, informational and application assets sharing common security requirements. Conduit: Communication flows that represent information exchanges between security zones. Defining Security Zones: In building a security program, zones are one of the most important tools for program success and proper definition of the zones is the most important aspect of the process. 7

How to Approach a Standards Based Security Implementation 1) Define the network security zones OT Network (plant) Corporate Network 2) Define work, workflows and data needed within and between zones 3) Define security policies for network zones 4) Define security solutions that enable and enforce requirements 8

Typical Industrial Network EXCELLENT BUSINESS CONTINUITY LIMITED CYBER SECURITY Gateway RSLinx Classic Historian DMZ End Users End Users OT Network Intersection of IT and OT Corporate IT Network 9

Air gap network security EXCELLENT CYBER SECURITY LIMITED, OR NO, BUSINESS CONTINUITY RSLinx Classic Gateway Historian Air gap End Users End Users OT Network Corporate IT Network 10

The Connected Enterprise requires both EXCELLENT BUSINESS CONTINUTIY AND EXCELLENT CYBER SECURITY How do you Achieve this? 11

Key Decisions to Remedy Business Challenges 1. Define security zones High Security Zone Prevent outside access Business Security Zone Enable plant support operations RSLinx Classic DMZ Gateway Historian End User End User Plant OT Network Corporate IT Network 12

Key Decisions to Remedy Business Challenges 1. Define security zones 2. Define work zones, workflows and data transfers within the zones High Security Zone Prevent outside access Business Security Zone Enable plant support operations RSLinx Classic Gateway Historian Historian End User End User Plant OT Network Corporate IT Network 13

Key Decisions to Remedy Business Challenges 1. Define security zones 2. Define workflows and data transfers within the zones 3. Define security policy data transfers out, no attack vectors in High Security Zone Prevent outside access Business Security Zone Enable plant support operations RSLinx Classic Gateway Historian Historian End User End User Plant OT Network Corporate IT Network 14

Key Decisions to Remedy Business Challenges 1. Define security zones 2. Define workflows and data transfers within the zones 3. Define security policy data transfers out, no attack vectors in 4. Define security solution to support all requirements High Security Zone Prevent outside access Business Security Zone Enable plant support operations RSLinx Classic Gateway Historian Owl Data Diode Historian End User End User Plant OT Network Convergence of IT and OT protected by ST Corporate IT Network 15

Features = Benefits Well defined security zones and policies = Security standards met Separation of network domains = Improved cyber security OT Network secured = Increased Plant Reliability 1200+ Security OT data flows to IT = End users Product in IT domain Suite have data so they can work Solutions Deployed Business continuity = Improved business operations Owl s Security Technology = Enables the Convergence of OT and IT 16

Data Diode Hardware Security Policy Hardware enforced one-way only data transfer One-way data flow out of secure network zone No external access into the secure network zone No bidirectional TCP/IP connection Software attack can not modify hardware security policy Network Confidentiality Network protocol break = Asynchronous Transmission Mode (ATM) Source Network IP data -> ATM -> Destination Network IP data Only the payload of IP data packets cross the DualDiode Data Diode remains invisible on the network Data Diode has no IP or MAC address Protects all IP and MAC addresses of the source network devices No external network scanning or mapping of secure network 17

DualDiode Operational Architecture OT Network DualDiode hardware enforced security solution Two diodes, in series, enforce air gap network separation One-way hardware constrained by single fiber optic cable Source DualDiode Technology Air Gap Destination Ethernet Ethernet Server Server Diode server terminates each network endpoint Hardened Linux OS further secures each server Servers only support specific & whitelisted data transfer applications IT Network 18

Data Transfer Applications Owl Supports Rockwell Applications RSLinx Classic Gateway Historian Owl Supports other Transfer Applications Historian replication SQL Database replication Syslog transfer Email Alerts and events Remote HMI Screen replication UDP, multicast, broadcast, unicast (video surveillance) TCP/IP transfers Remote File Transfer for Reporting, Alarms, Events, any file OPC Foundation certified, supporting DA, A&E, UA Modbus Others 19

Enterprise Wide Deployment Locations Product Suite 1200+ Security Solutions Deployed 20

Summary 1. Pick a cybersecurity standard 2. Define your network security zones 3. Define work, workflows and data transfers needed 4. Define network security policies 5. Define security solution to support all requirements Owl Secures the convergence of OT and IT with ST 21

22