T46 - Integrated Architecture Tools for Securing Your Control System



Similar documents
Industrial Security Solutions

Securing The Connected Enterprise

AUP28 - Implementing Security and IP Protection

Network Security Trends & Fundamentals of Securing EtherNet/IP Networks

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

AUD20 - Industrial Network Security

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Industrial Security in the Connected Enterprise

REFERENCE ARCHITECTURES FOR MANUFACTURING

Securing the Connected Enterprise

ControlLogix and CompactLogix 5370 Segmentation Methods for Plant-wide/ Site-wide Networks with OEM Convergence-ready Solutions

Stratix Industrial Networks Infrastructure At-A-Glance

Computer System Security Updates

PR03. High Availability

Design Considerations for Securing Industrial Automation and Control System Networks

Production Software Within Manufacturing Reference Architectures

Scalable Secure Remote Access Solutions

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cyber Security for NERC CIP Version 5 Compliance

Network & Security Services (NSS) Because Infrastructure Matters

Choosing the correct Time Synchronization Protocol and incorporating the 1756-TIME module into your Application

Recommended IP Telephony Architecture

Achieving Secure, Remote Access to Plant-Floor Applications and Data

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

L03 - Design, Implement, and Manage FactoryTalk Security

Securing Manufacturing Computing and Controller Assets

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Stratix Switches Within Integrated Architecture. Dave VanGompel, Principal Application Engineer

Cisco Certified Security Professional (CCSP)

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

IACS Network Security and the Demilitarized Zone

Designing Innovative Machines with Rockwell Automation Mid-Range Architecture System

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Industrial Security for Process Automation

Physical Infrastructure for a Resilient Converged Plantwide Ethernet Architecture

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

IP Telephony Management

Networking Devices. Lesson 6

RuggedCom Solutions for

Cisco Advanced Services for Network Security

Implementing Cisco IOS Network Security v2.0 (IINS)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014

Simplifying the Transition to Virtualization TS17

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

SonicWALL PCI 1.1 Implementation Guide

Network Virtualization Network Admission Control Deployment Guide

Plant-wide Network Infrastructure. Copyright 2012 Rockwell Automation, Inc. All rights reserved.

CISCO IOS NETWORK SECURITY (IINS)

State of Texas. TEX-AN Next Generation. NNI Plan

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Scalable Secure Remote Access Solutions for OEMs

Building Secure Networks for the Industrial World

Dr. György Kálmán

GE Measurement & Control. Cyber Security for NEI 08-09

Chapter 1 The Principles of Auditing 1

Avaya G700 Media Gateway Security - Issue 1.0

APPENDIX 3 LOT 3: WIRELESS NETWORK

Scalable, Secure Remote Monitoring Solutions Stay a step ahead by remotely monitoring your critical assets

Securing Process Control Systems

Stratix 5700 Network Address Translation. Quick Start

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

- Introduction to PIX/ASA Firewalls -

ICANWK406A Install, configure and test network security

Deploying Firewalls Throughout Your Organization

13 Ways Through A Firewall

Best Practices for Outdoor Wireless Security

Chapter 4 Customizing Your Network Settings

Implementing Cisco IOS Network Security

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Designing a security policy to protect your automation solution

Avaya TM G700 Media Gateway Security. White Paper

IINS Implementing Cisco Network Security 3.0 (IINS)

Network Security. Mike Trice, Network Engineer Richard Trice, Systems Specialist Alabama Supercomputer Authority

Manufacturing and the Internet of Everything

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Achieving PCI-Compliance through Cyberoam

Using a VPN with Niagara Systems. v0.3 6, July 2013

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

CCNA Security v1.0 Scope and Sequence

Securing SIP Trunks APPLICATION NOTE.

Cisco Router and Security Device Manager (SDM)

CCNA Security. IINS v2.0 Implementing Cisco IOS Network Security ( )

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Lab Configuring Access Policies and DMZ Settings

Securing Networks with PIX and ASA

PCI Compliance for Branch Offices: Using Router-Based Security to Protect Cardholder Data

Using a VPN with CentraLine AX Systems

Network & Security Services Rockwell Automation s Specialist team of Network & Security Specialists

INTRODUCTION TO FIREWALL SECURITY

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

How To Protect Your Network From Attack From A Network Security Threat

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Network Access Control ProCurve and Microsoft NAP Integration

Securing Cisco Network Devices (SND)

CCNA Security v1.0 Scope and Sequence

Transcription:

T46 - Integrated Architecture Tools for Securing Your Control System PUBLIC PUBLIC - 5058-CO900G Copyright 2014 Rockwell Automation, Inc. All Rights Reserved.

The Connected Enterprise PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 2

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 3 Risks and Threats to Control Systems Application of Security patches Natural or Man-made disasters Worms and viruses Sabotage Theft Unauthorized access INFORMATION Denial of Service Business Risk Unauthorized actions by employees Unauthorized remote access Unintended employee actions OPERATIONS Security risks increase potential for disruption to System uptime, improve safety operation, and a loss of IP

ICS Security in the News PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 4

ICS Security in the News PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 5

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 6 What is Industrial Security? Seeks to reduce risks associated with unintended or malicious actions Seeks to improve ability to be free from danger, injury or loss Seeks to help protect key assets from disruption, loss or damage Help Protect People, Property and Proprietary Information from unintended or malicious actions taken against it

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 7 Innovative Approach to Industrial Security Build in Security Quality Create Security Value

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 8 Security Quality Product Design Approach Develop Specifications Audit and Identify Gaps Enhance & Improve

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. Security Quality Product Resiliency & Robustness (R&R) Testing Key part of our Industrial Security Team Help reduce customer risk Critical to our Industrial Security Goals Identify weaknesses and vulnerabilities Improve product resiliency & robustness Evaluation of all company products Leveraging ISA Security Compliance Institute (ISCI) approved tools and test suites Achilles test tool & Level-2 test suite fulfills technical aspects of ISA99 and IEC-62443 standard for ICS cyber security Evaluates resiliency of Ethernet protocol suite Results provide concrete facts about product resiliency to simplistic attacks driving continuous improvement.

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 10 Security Quality Incident Response Process Receive Evaluate and Assess Mitigate and Remediate Close Product Vulnerabilities: We expect them. We plan for them. We work to avoid them. We support our customers. Communications See Rockwell Automation Knowledgebase article 54102 for up to date information on product vulnerabilities

Security Value Core Tenets Secure Network Infrastructure Tamper Detection Content Protection Access Control & Policy Management Control access to the network, and detect unwanted access or activity Detect and record unwanted activity & modifications to the application Help protect viewing, editing, and use of specific pieces of control system content Control who, what, where & when access is allowed to which application or device 11 PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 11

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 12 Security Value: Secure Network Infrastructure Secure Network Infrastructure helps enable secure enterprise connectivity, remote manufacturing and remote engineering Rockwell Automation solutions available today include: Stratix Portfolio of Routers & Switches Stratix 5900 Services Router Architectural Guidelines Network and Security Services

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 13 The Stratix Portfolio Securing the Infrastructure Products that offer: Layer 2 and Layer 3 switching for simple to complex networks applications Advanced security services Plant-floor and Enterprise integration On-Machine Connectivity Wireless integration in hard-to-wire and remote areas Technology that offers: Advanced switching, routing and security features Common tools for Controls & IT Improved Maintainability Flexible design Customization based on your plant s needs Addressing the needs of Automation Stratix 8000 / Stratix 8300 Layer 2, Layer 3 Stratix 5900 Services Router ArmorStratix 5700 Stratix 5100 Wireless Access Point/Workgroup Bridge Stratix 2000 Unmanaged as well as Operations Stratix 5700 Layer 2 Stratix 6000 Layer 2 Stratix ETAPs and IT

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. The Stratix Engine Cisco IOS Software is the most widely leveraged network infrastructure software in the world Currently operating on millions of active systems, ranging from the small home office router to the core systems of the world's largest service provider networks Cisco's leadership in switching, routing and security now in Rockwell Automation industrial Ethernet products and solutions

The Stratix Value Designed & developed for Industrial EtherNet/IP applications Optimize network performance QoS Quality of Service - default configurations are set to ODVA standards for EtherNet/IP industrial applications for discrete, motion, safety and process applications IEEE1588 (CIP Sync) - ODVA implementation of the IEEE 1588 precision time protocol helps ensure performance when connecting EtherNet/IP devices Simplify design, deployment and maintainability DHCP per port - assign a specific IP address to each port, helping ensure that the device attached to a given port will get the same IP address Broken Wire Detection - detect cabling problems like, open, broken, cut or shorted twisted-pair wires, with status availability in Logix Network Address Translation NAT A 1:1 IP address translation to help segment machine level network devices from the plant network, translate only the devices that need to be visible to the plant network PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 15

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 16 The Stratix Value Helping protect the assets Application/Project (CIP) based port access Controller based port control (on/off) Port access based on controller mode (idle/fault) Unauthorized device identification (tags) per port Configurable port security Preconfigured port security set-up via Smartports Configure number of devices allowed per port Configurable device MAC ID authentication Helping protect the plant Encrypted administrative traffic VPN, SSHv2, SNMPv3, and HTTPS Advanced security features 802.1x for user authentication Multiple layers of password protection Access Control Lists (ACLs) to apply security policies per port TACACS+ and Radius for centralized authentication Simplified tools to help protect assets. Advanced feature set to help meet IT standards and policy

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 17 Stratix 8000 and Stratix 8300 Layer 2 and Layer 3 Modular Managed Configurable up to 26 ports Base unit - 6 or 10 port Expansion Modules Copper, Fiber, SFP & PoE extensions SFP for multi and single mode fiber Wide variety of SFPs available Power over Ethernet (PoE) PoE & PoE+ port configurable CompactFlash card Stores configuration and IOS for easy device replacement Advanced feature set to address: EtherNet/IP applications Security Resiliency & Redundancy Operating Temp: -40ºC to 60ºC Dual Purpose Uplink Ports 10/100/1000 Copper or SFP Data Ports 10/100 Copper SFP Fiber Transceiver 100M and 1G Multi mode and Single mode Copper, fiber, SFP & PoE Expansion Modules Ideal for connecting into a higher level of the network infrastructure architecture

Stratix 5700 Family Layer 2 Managed Fixed Port 3 base platforms offering 20 configurations 6, 10 & 20 port base units 2 Gig port option SFP slots support multi and single mode fiber Wide variety of SFPs available SecureDigital flash card (optional) Stores configuration and IOS of switch Two software packages Lite & Full software versions Advanced feature set Same feature set as the Stratix 8000 Integrated NAT functionality Simple static routing Power over Ethernet (PoE) PoE & PoE+ port configurable *Combo ports can be either copper or SFP SD card for back up Ideal for connecting machines into the plant networks Converged Networks PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 18

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 19 Stratix 5900 Layer 2 and Layer 3 Services Router Premiere routing and security services for Layer 2 or Layer 3 Router + Firewall Virtual Private Network (VPN) Network Address Translation (NAT) Access Control Lists (ACL) Intrusion Prevention Systems (IPS) Connections: 1 Gigabit WAN 4 Fast Ethernet Industrially hardened, DIN rail mountable Ideal for Site to Site Connections, Cell/Zone Area Firewall and OEM Integration Ideal for helping protect communications through secure channels & restricting unwanted communications by policy and inspection

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 20 Stratix 5900 Services Router Network Security Framework Enterprise-wide Business Systems Levels 4 & 5 Data Center Enterprise Zone Level 3.5 - IDMZ Site-to-Site Connection Stratix 5900 1) Site-to-Site Connection Stratix 5900 2) Cell/Area Zone Firewall Plant-wide Site-wide Operation Systems Level 3 - Site Operations Physical or Virtualized Servers Industrial Zone FactoryTalk Application Servers & Services Platform Network Services for example DNS, AD, DHCP, AAA Remote Access Server (RAS) Call Manager Storage Array Levels 0-2 Cell/Area Zones Stratix 5900 3) OEM Integration Remote Site #1 Local Cell/Area Zone #1 Local OEM Skid / Machine #1

Converged Plant-wide Ethernet (CPwE) Reference Architectures Structured and Hardened IACS Network Infrastructure Industrial security policy Pervasive security, not a bolt-on component Security framework using defense-in-depth approach Industrial DMZ implementation Remote partner access policy, with robust & secure implementation Network Security Services Must Not Compromise Operations of the IACS Standard DMZ Design Best Practices Enterprise Zone Levels 4-5 Industrial Demilitarized Zone (IDMZ) Physical or Virtualized Servers Patch Management Remote Gateway Services Application Mirror AV Server AAA - Application Authentication Server, Active Directory (AD), AAA - Network Remote Access Server Level 3 Site Operations FactoryTalk Client Client Hardening Level 2 Area Supervisory Control Controller Hardening, Encrypted Communications VLANs, Segmenting Domains of Trust Unified Threat Management (UTM) Controller Hardening, Physical Security Level 1 - Controller Catalyst 3750 StackWise Switch Stack Enterprise WAN PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 21 VLANs Cisco ASA 5500 Firewall (Active) Network Status and Monitoring Catalyst 6500/4500 Controller Controller Controllers, I/O, Drives Firewall (Standby) I/O HMI Level 0 - Process Plant Firewall: Inter-zone traffic segmentation ACLs, IPS and IDS VPN Services Portal and Terminal Server proxy Drive Network Device Resiliency Network Infrastructure Access Control and Hardening Physical Port Security MCC Soft Starter

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 22 Network & Security Services: Lifecycle Approach to Services and Solutions ASSESS DESIGN IMPLEMENT VALIDATE MANAGE

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 23 Security Value: Tamper Detection Tamper Detection allows customers to quickly detect if something in their system has been modified Rockwell Automation solutions available today include: Firmware Digital Signatures FactoryTalk AssetCentre Auditing Controller Change Detection and Logging High Integrity AOIs

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 24 Tamper Detection Firmware Digital Signatures Purpose of digital signature Help protect firmware from accidental and malicious corruption Help ensure firmware was generated by Rockwell Automation How they re being introduced New products have their firmware digitally signed from day 1 (L7x, Micro800 ) Digitally signed versions of existing products released as feasible (EN2T, DNB ) How they work Rockwell Automation digitally signs firmware kits with a private key when they are released Devices locally check the signature with a corresponding public key Any change to the firmware kit will cause the signature check to fail in device

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 25 Tamper Detection: FactoryTalk AssetCentre Auditing Centrally collect records of all interactions with the control system

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 26 Tamper Detection: Controller Change Detection Every Logix Controller exposes a Change Detection Audit Value When something happens that can impact the behavior of the controller, the value changes Audit Value is available in RSLogix 5000, in other software applications and in other controllers via Message instruction The set of events that causes the Audit Value to change can be configured

Tamper Detection: Controller Change Detection The Audit Value is stored in every Controller Log entry FactoryTalk AssetCentre (in version 4.1), can monitor the Audit Value and read in the Controller Log PUBLIC Copyright 2011 Rockwell Automation, Inc. All rights reserved. Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 27 27

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 28 Tamper Detection: High Integrity Add-on Instructions (AOIs) High Integrity AOIs allows you to generate a signature for an AOI definition Use High Integrity AOIs to: Address the needs of regulated industries for auditing purposes Maintain consistency and revision control in libraries

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 29 Security Value: Content Protection Content Protection allows customers to control access to specific objects within their controllers and other assets Rockwell Automation solutions available today include: Logix Source Protection

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 30 Content Protection: Source Protection Assign a password to any Routine or Add-On Instruction

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 31 Security Value: Application Access Control Application Access Control allows you to control who can do what from where in your automation system Rockwell Automation solutions available today include: Data Access Control FactoryTalk Security

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 32 Application Access Control: Data Access Control External Access Attribute Read/Write, Read Only, or None Controls which tags can be modified from an HMI or other external application Constant Attribute Controls which tags can be modified by controller logic Changes to Constants bump the Audit Value FactoryTalk Security can control permission to change Constants

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 33 Application Access Control FactoryTalk Security Use FactoryTalk Security to Manage the insider threat by authenticating the user and authorizing the use of Rockwell Automation software applications to access automation devices How does it work? Provides a centralized authority to verify identity of each user and grants or deny user's requests to perform a particular set of actions on resources within the system. FactoryTalk Directory Authenticate the User Authorize Use of Applications Authorize Access to Specific Devices (All FactoryTalk Security enabled software)

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 34 Application Access Control: FactoryTalk Security Administrators can manage User Accounts Windows FactoryTalk User Groups Custom group or role Windows Group Computers Computer Groups System Policies Product Policies Product Actions

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 35 Application Access Control: FactoryTalk Security Security Authority ID = 795D5EF-12... ID = A73R5CG 89... Security Authority PC #1 PC #2 ID= 795D5EF-12.. Logix5000 Project ID = 795D5EF-12 Logix5000 Project Security Administration FactoryTalk Services Security Administration FactoryTalk Services EtherNet/IP ID s Match ID s Don t Match

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 36 Summary Rockwell Automation : Industrial Security Resources Security-enhanced Products and Technologies Rockwell Automation product and technologies with security capabilities that help increase overall control system system-level security. http://www.rockwellautomation.com/security EtherNet/IP Plantwide Reference Architectures Control system validated designs and security best-practices that complement recommended layered security/defense-in-depth measures. http://www.ab.com/networks/architectures.html Network & Security Services (NSS) RA consulting specialists that conduct security risk assessments and make recommendations for how to avert risk and mitigate vulnerabilities. http://www.rockwellautomation.com/services/security

PUBLIC Copyright 2014 Rockwell Automation, Inc. All Rights Reserved. 37 Summary Industrial Security Landing Pad Assessment Services Security Technology Security FAQ Security Services Leadership & Standards http://rockwellautomation.com/security Security Resources Security Advisory Index MS Patch Qualification Reference Architectures Assessment Services secure@ra.rockwell.com Pretty Good Privacy (PGP) Public Key

Thank you PUBLIC www.rockwellautomation.com. Connect with us. PUBLIC - 5058-CO900G Copyright 2014 Rockwell Automation, Inc. All Rights Reserved.