Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Similar documents
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk

Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Industrial Cyber Security Risk

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Payment Card Industry Data Security Standard

Remote Services. Managing Open Systems with Remote Services

Effective Use of Assessments for Cyber Security Risk Mitigation

Fire and Gas Solutions. Improving Safety and Business Performance

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Protecting productivity with Plant Security Services

How To Protect Your Network From Attack From A Network Security Threat

Are you prepared to be next? Invensys Cyber Security

Industrial Security for Process Automation

Process Solutions. Uniformance Process History Database (PHD) Product Information Note

Verve Security Center

Document ID. Cyber security for substation automation products and systems

Managed Security Services for Data

How To Secure Your System From Cyber Attacks

Effective Defense in Depth Strategies

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Assurance 360 Performa. Ensuring a Secure, Reliable and High-Performing Control System

Proven LANDesk Solutions

Advanced Solutions. Uniformance Suite. Real-time Digital Intelligence Through Unified Data, Analytics and Visualization

Industrial Security Solutions

Preparing for a Cyber Attack PROTECT YOUR PEOPLE AND INFORMATION WITH SYMANTEC SECURITY SOLUTIONS

CyberArk Privileged Threat Analytics. Solution Brief

Delivering operations integrity through better plant safety, availability and compliance across your entire enterprise

Symphony Plus Cyber security for the power and water industries

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Defending Against Data Beaches: Internal Controls for Cybersecurity

Cloud Assurance: Ensuring Security and Compliance for your IT Environment

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

SANS Top 20 Critical Controls for Effective Cyber Defense

Process Solutions. DynAMo Alarm & Operations Management. Solution Note

Ovation Security Center Data Sheet

Industrial Cyber Security 101. Mike Spear

Injazat s Managed Services Portfolio

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

Preemptive security solutions for healthcare

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Data Sheet: Endpoint Security Symantec Protection Suite Enterprise Edition Trusted protection for endpoints and messaging environments

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

External Supplier Control Requirements

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

SYMANTEC MANAGED SECURITY SERVICES. Superior information security delivered with exceptional value.

Cyber Security for NERC CIP Version 5 Compliance

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

RSA envision. Platform. Real-time Actionable Security Information, Streamlined Incident Handling, Effective Security Measures. RSA Solution Brief

McAfee Security Architectures for the Public Sector

BMC s Security Strategy for ITSM in the SaaS Environment

How To Buy Nitro Security

Caretower s SIEM Managed Security Services

The Protection Mission a constant endeavor

Decrease your HMI/SCADA risk

Alcatel-Lucent Services

Invensys Security Compliance Platform

Cisco Advanced Services for Network Security

Innovative Defense Strategies for Securing SCADA & Control Systems

Securing the Service Desk in the Cloud

Cloud Security Trust Cisco to Protect Your Data

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

Address C-level Cybersecurity issues to enable and secure Digital transformation

Security Overview. BlackBerry Corporate Infrastructure

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Q1 Labs Corporate Overview

QRadar SIEM 6.3 Datasheet

Supplier Information Security Addendum for GE Restricted Data

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Securing the Cloud Infrastructure

White Paper: Consensus Audit Guidelines and Symantec RAS

Technology Blueprint. Protect Your Servers. Guard the data and availability that enable business-critical communications

Process Solutions. Mitigating Cyber Security Risks in Legacy Process Control Systems. White Paper

GE Measurement & Control. Cyber Security for NEI 08-09

What is Security Intelligence?

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Endpoint Security for DeltaV Systems

Strengthen security with intelligent identity and access management

Vulnerability Management

HP Security Solutions for Microsoft

Total Protection for Compliance: Unified IT Policy Auditing

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

This is a preview - click here to buy the full publication

How To Manage Security On A Networked Computer System

Cybersecurity and internal audit. August 15, 2014

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Ovation Security Center Data Sheet

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Technology Risk Management

Lumeta IPsonar. Active Network Discovery, Mapping and Leak Detection for Large Distributed, Highly Complex & Sensitive Enterprise Networks

Best Practice Strategies for Managing and Mitigating Key Cyber Risks. Brendan Saunders, Principal Security Consultant - November 2015

Transcription:

Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE EVENTS TO YOUR BUSINESS? IF YOU RE AN INDUSTRIAL MANUFACTURER WITH CRITICAL PLANT ASSETS, THEY RE MORE RELEVANT THAN YOU MAY THINK.

Security Demands from the Control Room to the Board Room Today s Industrial Automation and Control System (IACS) is more advanced and complicated than ever before. No longer are plant automation assets and critical infrastructure truly isolated. With automation suppliers implementing new open technologies and communication protocols, controls systems are increasingly vulnerable to attack, disruption and damage. Information derived from the IACS is invaluable to plant managers to ensure efficient processes and safe operations. It also assists company executives in decision making to advance their profitability and gain an advantage in a competitive marketplace. However, the growth of data acquisition systems accessing this information, coupled with the adoption of open architectures, increases risks to the control network. For Industrial Sites, Vulnerabilities Can Include: Lack of defined security zones, and insecure conduits/connections between zones Unsecured staff access for internal maintenance, retrieval of historian data, etc. Remote third-party contractor and vendor access Removable media brought onto the site, including USB drives, external hard drives, and even laptops and smart phones Out-of-date malware signatures Obsolete or unpatched operating systems Poorly configured, inadequate or missing cyber security countermeasures. Industry-Leading Experience and Expertise As new threats emerge and the cyber security landscape evolves, you need an experienced and trusted partner to help protect the availability, reliability and safety of your control system assets, as well as safeguard people and processes involved in all facets of your operation. Honeywell s Industrial Cyber Security Solutions are specifically designed to defend your IACS and plant operations. These solutions leverage our process control and cyber security experience, expertise and advanced technology to provide industry-leading offerings. Strategic relationships with technology players including Intel Security, Cisco, Microsoft and others, further extend the value of these solutions. Honeywell has a 50-year history as a leader in industrial safety and security, and as an innovator in the field of plant automation. Years of providing industrial cyber security solutions have resulted in proprietary methodologies, best practices, and a comprehensive understanding of cyber security requirements for the process control domain. When it comes to applying technology to solve some of the most critical challenges related to safety and security, few companies can claim Honeywell s record of achievement: The International Society of Automation (ISA) ISA99 active committee participation for 10+ years Honeywell best practices incorporated into ISA standards First Supplier to Earn ISA Secure Embedded Device Security Assessment (EDSA) Certification Founding Member of ISA Security Compliance Institute (ISCI). CERTIFIED IN SAFETY & SECURITY Honeywell Industrial Cyber Security professionals have an unrivaled track record in process control and operational technology, cyber security and IT an essential skill set combination for protecting plants and critical infrastructure. Certifications held by our global team include Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Cisco Information Security Specialist (CISS), Certified Ethical Hacker (CEH) and GIAC Certified Incident Handler (GCIH).

Proven Know-How to Protect Your Organization From refining, petrochemicals, power and oil and gas, to pulp and paper and metals and mining, Honeywell is committed to helping customers anticipate and resist future classes of cyber attacks. Indeed, cyber security is a key element of Honeywell s entire product development strategy. We re foremost in the automation industry in our investment in cyber security technology for process control systems, including our state-of-the-art Industrial Cyber Security Lab. This investment enables us to maintain our leadership in the industry, serving as a single source for protection at all levels of the IACS infrastructure. Honeywell Industrial Cyber Security Lab, Atlanta, Georgia, USA: A world-class environment for proprietary cyber security research and development, test and certification, training and collaboration with partners and educators. Honeywell leverages a long history in plant safety and physical security to offer comprehensive cyber security solutions that ensure multiple layers of defense to help organizations: Meet regulatory compliance requirements Defend against emerging cyber security threats specific to the IACS Establish secure connections between plant networks and the IT network Extend internal staffs with industrial control system cyber security expertise Ensure ongoing awareness of new vulnerabilities and Advanced Persistent Threats (APTs) Improve production performance and reduce plant downtime Timely response to, and fast recovery from, cyber incidents.

Complete Solutions for Industrial Environments and Critical Infrastructure Leading companies worldwide partner with Honeywell to achieve robust cyber security capabilities enabled by advanced technology, comprehensive training, and best practices. With recognized domain expertise in the process industries, we deliver end-to-end solutions designed for the specific needs of control system environments and critical infrastructure sectors. Honeywell s industrial cyber security know-how encompasses automation assets and their integrated communication networks a distinct advantage in control system security. The Honeywell Cyber Security Architecture and methodology support IEC 62443 concepts, continually addressing cyber security throughout the IACS lifecycle from design and implementation to commissioning with vendor-agnostic solutions that include security assessments and audits, architecture and design, network security, endpoint protection, situational awareness, and response and recovery. Complete Industrial Cyber Security Solutions Response & Recovery Backup & Restore Incident Response Situational Awareness Continuous Monitoring Compliance & Reporting Security Analytics Security Information & Event Management (SIEM) Security Awareness Training Endpoint Protection Patching & Anti-Virus Application Whitelisting End Node Hardening Portable Media & Device Security Response & Recovery Situational Awareness Assessments & Audits PEOPLE PROCESS TECHNOLOGY Endpoint Protection Architecture & Design Network Security Assessments & Audits Security Assessments Network & Wireless Assessments Security Audits Architecture & Design Current State Documentation Design & Optimization Zones & Conduits Network Security Firewall Intrusion Prevention Access Control Policy Development When faced with conducting a cyber security vulnerability assessment for a power generation facility, the in-house audit team lacked the right combination of process control and IT security experience. This required a third-party expert with knowledge in both worlds. Honeywell assisted with a collaborative review of IACS and SCADA risk assessment policies and procedures. This process identified high-level risks, with the information used to estimate, prioritize, and coordinate ongoing risk mitigation activities.

Advanced Technology and Unmatched Expertise to Defend Your Plant The government is imposing comprehensive security regulations on high-risk chemical facilities. For many plants, this requires a security vulnerability assessment and site security plan. Honeywell executed a highly detailed security audit and assessment, and delivered a remediation proposal for a large chemical complex. This included solutions for endpoint protection, historian and multi-factor authentication, and security information and event management. Assessments and Audits Customers rely on Honeywell s comprehensive cyber security assessments to identify and evaluate their current security posture, and then prioritize efforts to reduce risks. Recurring assessments allow cyber security teams to track their milestones and the maturity of their security program over time to indicate progress toward achieving their desired assurance level. In addition to cyber security assessments, Honeywell offers network and wireless assessments aligned with leading standards and designed to satisfy the requirements of multiple security assurance levels, providing the right depth and detail to meet your specific needs. Honeywell also conducts independent audits, which provide a review and examination of records and activities to assess the adequacy of system controls, determine compliance with established policies and operational procedures, and recommend necessary changes. Results from periodic audits provide a view of trends and are presented in the form of performance against predefined metrics. Architecture and Design Architecture design decisions determine system configurations and impact the performance characteristics of an automation system. For this reason, Honeywell s products are designed with built-in security, and our secure architecture approach serves as a long-term baseline for availability, reliability and safety. We provide consultation on possible cyber security architectures and advise customers on the advantages and disadvantages of each topology based on proper segmentation of security zones and conduits. Network Security Network security is the first line of defense in providing industrial cyber security to an entire plant or site. But a number of potential pitfalls may arise if it is not implemented properly. Applying a solid understanding of IACS requirements, Honeywell s network security services result in more secure perimeters and higher reliability for industrial process operations. For instance, Honeywell offers turnkey solutions for the latest cyber security counter-measures, including next-generation firewalls, advanced threat detection, and security analytics. Honeywell will install, configure and validate the right security for your network. We also help customers develop their own policies and procedures to restrict unauthorized access to system resources and specify authorized users, programs and processes. Controls are set up to manage access, including establishing, activating, modifying, reviewing, disabling and removing access privileges. Endpoint Protection Within an industrial control system, every device is a potential entry point for security threats. Endpoint protection is designed to secure each endpoint on the network before device access is granted. Honeywell s Endpoint Protection solutions include a suite of services that fortify the network through patching and anti-virus protection, application whitelisting, end node hardening, and portable media security. Our tested and qualified signature files and patches reduce or eliminate time spent evaluating files and patches to verify release versions and correct configurations. We provide protection management services that deliver qualified patches for Microsoft operating systems and Distributed Control System (DCS) software, as well as anti-malware signature file updates for McAfee and Symantec programs.

With advancements in process automation for upstream oil and gas come greater cyber security risks. There are concerns about personnel safety, damage to expensive assets, loss of production, and impact on company reputation. On a major upstream project, Honeywell delivered architecture and design solutions such as a DMZ leveraging virtualization, as well as endpoint protection, secure connectivity for vibration monitoring, enhanced network management capabilities, and security controls to reduce risk factors. Situational Awareness Honeywell s goal is to ensure ongoing situational awareness of new vulnerabilities and the latest APTs. We help customers interpret and understand activity in a network through continuous monitoring, compliance and reporting, security analytics, security information and event management, and security awareness training. Our full-day situational awareness workshop is designed to increase the overall security awareness of process control personnel. Three-day advanced training is available with additional material on identifying security violations, incident handling, and reporting. Plus, three-day hands-on training is held in the Honeywell Cyber Security Lab, covering secure network architecture and design, zones and conduits, configuration and use of network and endpoint security controls, and security monitoring. Response and Recovery Honeywell stands ready to assist customers develop a sound backup and restore strategy. Identifying an incident early and responding appropriately can limit the consequences of a cyber security event. Honeywell s automated Response and Recovery Services help users quickly recognize symptoms of an incident such as attempts to reconfigure the IACS software or modify settings which could have various negative effects. Our services help minimize data loss in the event of a cyber incident or other outage. Plus, we assist with incident and disaster recovery planning to increase your resilience and recovery capability. Additionally, these services help users document incident details for future reference and improve their ability to quickly recover and respond to future attacks.

Get Proactive with Risk Manager Honeywell s Industrial Cyber Security Risk Manager is the first solution to proactively monitor, measure and manage cyber security risk for industrial plants and systems, providing users of all levels with real-time visibility, understanding and decision support required for action. With Risk Manager, there s no need to be a cyber security expert. Through a user-friendly interface, Risk Manager allows users to prioritize and focus efforts on managing risks that are most important for reliable plant operations. Risk Manager helps plant managers and engineers answer what now and what to do questions. It offers expert guidance on the potential impact of an event and possible resolutions removing the complexities of cyber security event management. Risk Manager provides users with a real-time assessment of information from devices throughout the process control network, enabling them to monitor, measure and manage their cyber security risks in a way not provided or possible before. Risk Manager user interface

Focused on Industrial Control Systems Risk Manager Focuses Exclusively on Industrial Control System Cyber Security Requirements: Monitors risk continuously, in real-time, to provide immediate notification when unacceptable risk is present Translates complex indicators of vulnerabilities and threats into metrics that can be used by control engineers and operators without cyber security experience Tracks and inventories assets on the network, including infrastructure devices, Windows* PCs and servers Evaluates indicators of risk using patented algorithms to generate accurate risk scores in line with industry risk management standards from ISO, ISA and others. Patented Technologies from People Who Know Industrial Control Monitor Continuously looks for indicators of threats and vulnerabilities, analyzes them, and communicates to plant personnel through real-time warnings and alerts. Measure Powerful algorithms continuously calculate risk, supporting the development of performance and outcomes-based metrics. Manage Supports a risk-based approach for managing overall site risk tied to business priorities and helps plants determine the maturity of their cyber security posture.

Putting Innovative Technology to Work Honeywell technology is designed to provide cyber protection at all levels of the IACS infrastructure. Our company was the first to obtain the ISASecure product security certification from the ISA Security Compliance Institute, and we have dedicated a large R&D investment to cyber security solutions and technology. Honeywell s products have cyber security built in and are engineered to improve process control security, performance and management. We also maintain strategic relationships with leading security players such as Intel* Security, Cisco* and Microsoft to extend the value of our solutions. Honeywell s world-class Industrial Cyber Security Lab includes a flexible model of a complete process control network up to the corporate network level. Our cyber security experts leverage this fully- equipped lab for hands-on training and proprietary research, and to develop, test and certify industrial cyber security solutions. The facility also enables us to collaborate with educators and contribute to cyber security-related academic programs around the world. Managed Industrial Cyber Security Services Increase overall security, improve system performance, reduce operational cost and expertly manage the essential elements of your process control infrastructure. For those companies lacking the dedicated staff to fully benefit from real-time security monitoring and analytics, Honeywell offers a suite of Managed Industrial Cyber Security Services. These services provide the information needed to reduce the risk of security breaches and manage the essential elements of your process control infrastructure. Managed Industrial Cyber Security Services Managed Industrial Cyber Security Services Supervising the operation of the DCS, Honeywell s sophisticated analysis and reporting solutions provide the insights needed to quickly ascertain the status of critical control system assets. This approach enhances operating system security, robustness and stability, ultimately contributing to improved production and safety for complex industrial plant operations. Patch & Anti-Virus Automation Protection Management Security & Performance Monitoring Advanced Monitoring & Co-Management Activity & Trend Reporting Secure Remote Access & Support NOTE: Th Manage Cyber S Increase O and Redu

Confidence from Secure Remote Access and Support Honeywell takes your remote access concerns seriously. Our customers are assured of a virtual platform that s secure and 100% owned and centrally managed by Honeywell. This guarantees optimization of resources, security, data protection, virus and patching control. Honeywell s Managed Industrial Cyber Security Services leverage our Secure Remote Access, which provides a customer-initiated connection to the Honeywell Security Service Center (HSSC). This solution employs a certificate-based, two-factor authentication process to create an encrypted tunnel protecting data even through the site s corporate network. Additionally, our Secure Service Node and Relay Server work together for hardened control network security. SITE Encrypted Secure Service Node Fingerprint Key to Read Site Initiates Tunnel (VPN) Key to Read Encrypted The Secure Remote Access can serve as a single point of access for third-party vendors and contractors if desired. Providing policybased, controlled communications with a record of all actions, it can be a useful tool in tracking third-party activities. SITE Encrypted Secure Service Node Fingerprint Key to Read Honeywell Security Service Center, Houston, USA: Site Initiates Tunnel (VPN) Honeywell s Security Service Centers deliver Managed Industrial Cyber Security Services. Centers in Europe and Key to Read Encrypted the U.S. provide global support and are the termination points for Honeywell Secure Remote Access.

Honeywell A Single Source for All Your Needs Honeywell Industrial Cyber Security is the leading provider of cyber security solutions that help protect the availability, safety and reliability of industrial facilities, critical infrastructure and the Industrial Internet of Things (IIoT). Leveraging our industry-leading process control and cyber security experience, our expertise, and technology, Honeywell delivers proven solutions designed for the specific needs of process control environments and critical infrastructure sectors. Our portfolio includes Managed Industrial Services for process control infrastructure protection, and the Industrial Cyber Security Risk Manager solution which proactively monitors, measures and manages industrial cyber security risk. We also offer consulting and remediation services including security assessments and audits, architecture and design, network security, endpoint protection, situational awareness, and response and recovery. These solutions are enabled by innovative technology and delivered by a global team of cyber security experts. Experion is a registered trademark of Honeywell International Inc. *All other trademarks are the property of their respective owners. For More Information To learn more about Honeywell s Industrial Cyber Security Solutions, visit www.becybersecure.com or contact your Honeywell account manager. Honeywell Process Solutions Honeywell 1250 West Sam Houston Parkway South Houston, TX 77042 Honeywell House, Arlington Business Park Bracknell, Berkshire, England RG12 1EB Shanghai City Centre, 100 Zunyi Road Shanghai, China 200051 www.honeywellprocess.com BR-14-28-ENG (Rev.) September 2015 2015 Honeywell International Inc.