Security Solutions Assisting Social Infrastructure Digitalization

Similar documents
Disaster Management and Security Solutions to Usher in the IoT Era

Hitachi s Social Infrastructure Defenses for Safety and Security through Collaborative Creation with Customers

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Information Security and Cyber Security

Information and Control Systems

Featured Articles II Security Research and Development Research and Development of Advanced Security Technology

Overall View and Collaborative Creation Activities for a Safe and Secure Society

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

Maintenance Support Technology for Water Supply and Sewerage

Provisional Translation

Social Innovation -New Value through Collaborative Creation

O&M Service for Sustainable Social Infrastructure

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

Infrastructure for Multilayer Interoperability to Encourage Use of Heterogeneous Data and Information Sharing between Government Systems

Establish a new company to foster human resource for the global rollout of the Social Innovation Business using digital technologies

FOR IMMEDIATE RELEASE

Fiscal 2015 Activities Review and Plan for Fiscal 2016

National Institute of Information and Communications Technology. Cybersecurity Laboratory Security Fundamentals Laboratory Planning Office

Control System Security for Social Infrastructure

Launch of Power & Energy Solution Business - ENERGY CLOUD TM Service -

Hitachi Group IT Performance Report 2017

Cybersecurity for Health Care Providers

Digitalizing the Manufacturing Workplace Know-How Using Advanced Image Analysis and Other Technologies

ARC VIEW. Critical Industries Need Active Defense and Intelligence-driven Cybersecurity. Keywords. Summary. By Sid Snitkin

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

The NIST Cybersecurity Framework

NATIONAL CYBER SECURITY STRATEGY. - Version 2.0 -

Information Security Policies in Japan

Featured Articles AI Services and Platforms A Practical Approach to Increasing Business Sophistication

The Information Security Guideline for SMEs in Korea

MHPS-TOMONI: Thermal Power Generation Digitalization Platform Cloud/Edge Service and System Architecture

Thailand Digital Government Development Plan Digital Government Development Agency (Public Organization) (DGA)

Connected Car Solutions Based on IoT

How Cybersecurity Initiatives May Impact Operators. Ross A. Buntrock, Partner

NEC Australia Overview. au.nec.com

U.S. Japan Internet Economy Industry Forum Joint Statement October 2013 Keidanren The American Chamber of Commerce in Japan

News Release October 17, 2018 New Energy and Industrial Technology Development Organization Hitachi, Ltd. Hitachi India Pvt. Ltd.

THE ACCENTURE CYBER DEFENSE SOLUTION

TD01 - Enabling Digital Transformation Through The Connected Enterprise

Cloud for Government: A Transformative Digital Tool to Better Serve Communities

Canada Highlights. Cybersecurity: Do you know which protective measures will make your company cyber resilient?

Overview of PBI-blockchain cooperation technology

Continuity of Business

FOR IMMEDIATE RELEASE

Featured Articles I Process Industry Examples Control Security Support in Hitachi Instrumentation Systems

Implementation and Future Plans for Global IoT Maintenance System

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

The NIS Directive and Cybersecurity in

1. Advice, coordination, and other assistance

Understanding Holistic Effects of Cyber Events on Critical Infrastructure

Cybersecurity Training

Energy Assurance State Examples and Regional Markets Jeffrey R. Pillon, Director of Energy Assurance National Association of State Energy Officials

PROTECTING NATIONAL CRITICAL INFRASTRUCTURE AGAINST CYBER ATTACKS BEST PRACTICES RELATED TO TECHNOLOGY AND STANDARDS FROM EUROPE BANGKOK

Cybersecurity in Asia-Pacific State of play, key issues for trade and e-commerce

Attractive Urban Developments Achieved through Fusion of OT, IT, and Products Hitachi s Urban Solutions

CSIRT in general CSIRT Service Categories Reactive Services Proactive services Security Quality Management Services CSIRT. Brmlab, hackerspace Prague

Hitachi Work Life Innovation

The Republic of Korea. economic and social benefits. However, on account of its open, anonymous and borderless

Technical Conference on Critical Infrastructure Protection Supply Chain Risk Management

Advancing the MRJ project

CYBER SECURITY. formerly Wick Hill DOCUMENT* PRESENTED BY I nuvias.com/cybersecurity I

Securing Industrial Control Systems

Energy Assurance Energy Assurance and Interdependency Workshop Fairmont Hotel, Washington D.C. December 2 3, 2013

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

Why you should adopt the NIST Cybersecurity Framework

Cybersecurity Risk Management:

Development of Information Platform Service for Facilitating Reform of Work Practices and User Value Maximization

Today s cyber threat landscape is evolving at a rate that is extremely aggressive,

ACTIVITIES1. Growth in Potential of Service Robots through Collaborative Creation Haneda Robotics Lab Demonstration Project at Airport

Cybersecurity Presidential Policy Directive Frequently Asked Questions. kpmg.com

FOR IMMEDIATE RELEASE

EU policy on Network and Information Security & Critical Information Infrastructures Protection

Services & Platforms

Department of Homeland Security Updates

STRATEGIC PLAN. USF Emergency Management

Doug Couto Texas A&M Transportation Technology Conference 2017 College Station, Texas May 4, 2017

Framework for Improving Critical Infrastructure Cybersecurity

with environments a comprehensive against cyber combination attack. of technology, experience, and experts. NEC Cyber Security Solutions

COUNTERING IMPROVISED EXPLOSIVE DEVICES

The Cyber/Physical Security Framework (Draft) Cyber Security Division Commerce and Information Policy Bureau Ministry of Economy, Trade and Industry

OA Cyber Security Plan FY 2018 (Abridged)

National Cyber Security Strategy - Qatar. Michael Lewis, Deputy Director

Management Frameworks

Disaster Recovery Is A Business Strategy

Mapping Your Requirements to the NIST Cybersecurity Framework. Industry Perspective

Using Data to Accelerate Work Style Reform

Contributes to Improving Efficiency of Repair Work and More Stable Operation

Concept. A Strong, Resilient, and Sustainable World Perspectives of Resilience Common to the Water Environment, Disaster Prevention, and Security

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

Cybersecurity and Hospitals: A Board Perspective

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Defensible and Beyond

ENISA EU Threat Landscape

HITACHI Social Innovation & OSS

Overview of NIPP 2013: Partnering for Critical Infrastructure Security and Resilience October 2013

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Unauthorized Access

Emerging Issues: Cybersecurity. Directors College 2015

Cybersmart Buildings: Securing Your Investments in Connectivity and Automation

Bradford J. Willke. 19 September 2007

International Policy Division, Global ICT Strategy Bureau

Transcription:

FEATURED ARTICLES Social Infrastructure and its Digitalization Overview Solutions Assisting Social Infrastructure Digitalization Takeshi Miyao Junichi Tanimoto 1. Digitalization and Threats The rise of the Internet of Things (IoT) is creating a world in which any object can be connected to the Internet. Using smartphones, sensors, and cameras, the behaviors of objects and people are being converted to data and connected to the Internet. By digitally modeling the real world and analyzing and trialing it in cyberspace, digitalization can uncover new value and feed back results to the real world at an unprecedented rate. It is on the brink of creating major changes that will reshape the world s industries and social infrastructure itself. While the changes being brought by this digitalization will create new value, this positive aspect will come at the price of new security threats. Governments and industry bodies are responding to this societal challenge by working on problemsolving initiatives. For example, Japan s Ministry of Economy, Trade and Industry is working on identifying the challenges facing cybersecurity and drafting relevant policies by creating an organization of industry leaders and Internet innovators called the Study Group for Industrial Cybersecurity (1). Collaborative public/private-sector efforts are also on the rise, with the Japan Business Federation releasing a statement entitled A Call for Reinforcement of Cybersecurity To Realize Society 5.0. It sets forth approaches to solving cybersecurity problems by outlining the issues for industry to tackle and making government policy recommendations (2). These moves come in the wake of security threats that have surfaced recently, such as the WannaCry ransomware attack that wreaked worldwide havoc in 2017. 2. Hitachi Initiatives and Vision Hitachi was one of the victims of the WannaCry ransomware attack and suffered actual damage as a result. Responding to the attack has revealed the need for the following two activities: (1) Reviewing how large-scale systems are used in the IoT era (2) Examining business continuity plans from the standpoint of both natural disasters and cyberattacks The fact that IoT devices were the entry points for the attack on Hitachi led to a number of realizations: Control units running on infrastructure systems are just as exposed to security threats as IT devices. When incidents occur, it is important to consider how to respond to them from a business continuity perspective instead of just creating protections against cyberattacks. Planning how to create preventive measures in advance is also important. Turning these realizations Hitachi Review Vol. 67, No. 5 590 591 83.

Table 1 Challenges for Carrying out Cyberattack-ready Business Continuity Plans Putting lessons learned from the ransomware attack into practice will require responses involving the areas of governance, organizations, technology, and human resources. Governance Organizations Technology Creating business continuity plans anticipating cyberattacks as well as natural disasters; carrying out risk assessments Enabling business continuity decisions when incidents arise by creating cross-departmental structure enabling collaboration between information/site departments Helping to monitor, detect, analyze, and deal with incidents; creating security systems designed for business continuity and rapid recovery Human resources Staff training providing expertise in both security and business and control systems into actual security measures will require responses involving the areas of governance, organizations, technology, and human resources (see Table 1). Governance measures will need to augment business plans created to anticipate natural disasters to develop plans that include contingencies for cyberattacks. For organizational measures, an important requirement will be enabling business continuity Figure 1 Hitachi s Vision The diagram illustrates the three initiatives Hitachi is using to make advances in security designed to help ensure business continuity for infrastructure. Evolving for Changing IoT World Hitachi s security work to assist social infrastructure in the IoT era Initiative 1: From IT security to OT/IoT security OT Track record/expertise in creating/running social infrastructure systems Advances Enabling safe/secure use of IoT Cyber-physical security technologies Initiative 2: Providing clients with security solutions verified repeatedly by Hitachi in-house System development/ manufacturing Social infrastructure system manufacturing line/ development environment Initiative 3: Transforming security measure costs into investments that assist management problem-solving data such as video data and logs Advances Application to client systems Advances Management problem-solving operation/training IT + OT + security operation/ training environment AI Effective use/analysis of security data IoT: Internet of Things OT: operational technology AI: artificial intelligence decisions when incidents occur by creating a crossdepartmental structure enabling collaboration between the information departments in possession of the security technology and the front-line departments doing the actual work. For technology measures, the key will be to contain self-replicating viruses by helping to monitor, detect, analyze, and deal with them, and creating security systems designed for business continuity and rapid recovery. The major requirement for human resources measures will be staff training that provides expertise in both security and business and control systems, enabling responses that make sense from a business continuity standpoint when incidents occur. To deal with the issues above, Hitachi has created a vision of security entitled Evolving for Changing IoT World. This vision is designed to create security advances using the initiatives described below (see Figure 1). 2. 1 Initiative 1: From IT to OT/IoT Hitachi has created several infrastructure systems for customers in areas such as power, rail transport, gas, water, manufacturing, ICT, finance, and public utilities. The experience and track record it has accumulated in these areas are important resources for implementing security measures. But creating useful social infrastructure system security measures requires more than just an understanding of the security technologies themselves. It is also essential to understand how systems are operated and how those operations should be protected. Safety and business continuity are the key elements of operational technology (OT)/IoT security. It is important for systems to work 84.

FEATURED ARTICLES normally and to provide services securely and continuously. Applying infrastructure-building experience to security is crucial. 2. 2 Initiative 2: Providing Clients with Solutions Verified Repeatedly by Hitachi In-house Hitachi has constructed and possesses a wide range of security verification environments. It verifies IT security by operating IT infrastructure used internally by about 300,000 Hitachi Group users, performing security operations and monitoring on a routine basis. Hitachi also provides a security operations center () service to clients in 45 countries. It is provided through four worldwide bases and supports four languages (English, French, Spanish, and Japanese). Hitachi is also working to improve its in-house infrastructure in response to the lessons learned from the recent ransomware attack. By developing and manufacturing social infrastructure systems, Hitachi is building up a track record and expertise in OT security as well, through repeated verification in-house. 2. 3 Initiative 3: Transforming Measure Costs into Investments that Assist Management Problem-solving By applying artificial intelligence (AI) and analytics technology to security, Hitachi is transforming security from something previously only considered a cost, into an investment in management problem-solving enabled by means such as improvements in business efficiency. For example, monitoring operations involve the labor-intensive task of continually checking massive volumes of log information, and are difficult to handle by staff who are unskilled in security. Applying AI technology to log analysis can increase the efficiency of that work. Similarly, real-time monitoring of large volumes of simultaneously generated video data is difficult for human operators, but can be done in real time using AI technology. This technology can be used to analyze human behaviors to increase security and improve work efficiency. AI technology-driven predictive detection and behavior analysis will make it possible to have responses to security incidents ready in advance. System and service shutdowns after incidents incur massive costs for restoring and recovering of routine quality. Detecting small anomalies and responding to them proactively will increase business continuity and preserve management quality. 3. Cyber-physical Solutions To benefit from the lessons learned from the recent ransomware attack, Hitachi is implementing its security vision by starting to provide security solutions that incorporate both cyber and physical elements. To execute business continuity plans that anticipate cyberattacks and protect IoT devices from these attacks, Hitachi is providing solutions for integrated security monitoring, IoT security (IoT device management), and area security. Integrated security monitoring is a solution designed to assist with the business continuity of infrastructure business areas. The security operations it implements cover both IT systems and OT/IoT systems. It starts by defining the division of duties between the central organization and site organizations. The central organization s duties are to execute governance, monitor conditions at multiple sites, and gather intelligence information and security staff. The duties of the sites are to assess business continuity (site operation) by adding security monitoring to previous monitoring operations, and to work on site security transparency. To carry out these duties, Hitachi has started providing solutions in the form of integrated /Computer Incident Response Team (CSIRT) and on-site s (see Figure 2). The challenge facing IoT device management done for IoT security is determining how to execute security responses under conditions of long life cycles with 24-hour operation, which makes shutdowns difficult. The recommended solution for this is a zone design approach (see Figure 3) that anticipates such as devices to prevent intrusion and detects unauthorized connections being installed in a way that includes control unsuited to issuing Hitachi Review Vol. 67, No. 5 592 593 85.

Figure 2 Center and Site Duties for Integrated Monitoring Hitachi provides an integrated /CSIRT solution for performing center duties, and an on-site solution for performing site duties. Control system Add-on monitoring Monitoring sensor Integrated /CSIRT Incidents occurring at multiple sites are identified in an integrated manner, Companywide governance is executed. Control system alert analysis, configuration management Site 1 Site 2 Site 3 Integrated / CSIRT Center monitoring + monitoring sensor array Added on to control systems; designed for on-site security transparency; gathers information enabling business continuity (site operation) decisions. : security operations center CSIRT: Computer Incident Response Team patches. Figure 4 illustrates an example system configuration for the manufacturing industry. Area security is a solution that protects a given region (area) by applying technologies such as video and biometric authentication to gather and store security information for crime/disaster applications. It can be used to enable greater transparency in the entire area, to improve security through image analysis and AI coordination, and to help ensure security and optimize business operations (management problem-solving efforts). Hitachi s finger vein recognition technology is one of the elemental technologies used in this solution. It has been well received for benefits such as its authentication accuracy and authentication speed, and is being used increasingly overseas for physical security applications. Figure 3 Example of the Zone Design in the zone is ensured by installing such as intrusion devices and detecting unauthorized connections in a way that includes control that is unsuited to normal security measures such as operating system updates and issuing of security patches. Cyberattack from outside Entrance/exit point security measures, preventing spread within the zone Zone Unauthorized connection detection Control Network behavior detection Unregistered USB device security measures Preventing unauthorized connection from USB device/terminal System anomaly detection Network communication problem detection USB: universal serial bus 86.

!! FEATURED ARTICLES Figure 4 Example of Integrated Monitoring for the Manufacturing Industry The example system configuration shown here applies the zone design and integrated security monitoring to the manufacturing industry. Plant control zone (critical) Plant information zone (important) Business information zone (general) Infiltration into control LAN from virus-infected terminal Operator console Virus infiltration from outside using USB memory USB connection management Unauthorized access by spoofing Business server Infiltration of system from outside WAN Integrated /CSIRT Maintenance PC One-way relay Control server Control LAN Manufacturing line Information control LAN Attack on control LAN targeting shutdown Monitoring Control Unauthorized connection detection Control controller Domain controller Unauthorized operation of controller targeting destruction monitoring Information LAN Remote maintenance LAN Remote monitoring laptop Unauthorized operation by insider LAN: local area network WAN: wide area network 4. Human Resources Training and Integrated Cyber Training Initiatives to train security staff are becoming widespread. One example is the Industrial Cyber Center of Excellence (ICSCoE) created in April 2017 by the Information-technology Promotion Agency, Japan (IPA). Actual curriculum-based staff training began in July, and Hitachi is also taking part to provide staff training (3). Staff members are being trained through practical exercises at Hitachi, Ltd. Omika Works that develops and manufactures infrastructure systems. Here, programs that create and use systems simulating the actual systems of infrastructure providers are being used to check and verify improvements in cyberattack-ready business continuity plans covering organizational administration and system operation. Omika Works has also started providing Integrated Cyber Training Services for staff training designed to create experts in both security technologies and business and control systems. 5. Collaborative Creation and Management Problemsolving with Clients Hitachi will continue making advances in security adapted to digitalization, working to protect the services and business areas provided by its clients. This work involves efforts to find genuine solutions to management issues by uncovering how the services provided by the client are created and run, and then working with the client to review and refine them. is not simply a cost. By assisting client problem-solving, it helps increase efficiency and improve quality, creating management returns as a form of investment. To help clients minimize and optimize their investments, Hitachi will continue to draw on its expertise in creating and running corporate infrastructure systems to pitch solutions that outline how far to take security measures over the short, medium, and long terms. The platforms it provides allow clients to start implementing security on a small scale with a low initial investment, enabling progressive system expansion in the future. Hitachi Review Vol. 67, No. 5 594 595 87.

Hitachi will continue to work alongside clients to create business advances by approaching security from a corporate manager s perspective. 6. Conclusions This article has looked at Hitachi s work on the security issues that infrastructure systems need to address in an era of increasing digitalization. The cyber and physical elements of specific solutions that have arisen from this work are described in detail in the other articles of this feature issue. References 1) Ministry of Economy, Trade and Industry News Releases, Study Group for Industrial Cybersecurity to Hold Its First Meeting (December 2017), (Dec. 2017), http://www.meti. go.jp/english/press/2017/1226_004.html 2) Japan Business Federation (Keidanren), A Call for Reinforcement of Cybersecurity To Realize Society 5.0 (December 12, 2017), (Dec. 2017), http://www.keidanren. or.jp/en/policy/2017/103_summary.pdf 3) Information-technology Promotion Agency, Japan (IPA) Press Release, Industrial Cyber Human Resources Development Facility Startup in July, Recruitment of Students Begins February 20, (Feb. 2017), https://www.ipa. go.jp/about/press/20170208.html in Japanese. Authors Takeshi Miyao Businesses Division, Services & Platforms Business Unit, Hitachi, Ltd. Current work and research: General management of security businesses. Junichi Tanimoto Businesses Division, Services & Platforms Business Unit, Hitachi, Ltd. Current work and research: Planning of security businesses. 88.