Securing Industrial Control Systems in the Age of IoT

Similar documents
Introducing the 9202-ETS MTL Tofino industrial Ethernet security appliance

Machine-Based Penetration Testing

CyBot Suite. Machine-based Penetration Testing

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Machine-Based Penetration Testing

IC32E - Pre-Instructional Survey

Cybersecurity Training

Industry Best Practices for Securing Critical Infrastructure

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

Cyber security - why and how

Presenter Jakob Drescher. Industry. Measures used to protect assets against computer threats. Covers both intentional and unintentional attacks.

STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Securing Industrial Control Systems

Using ANSI/ISA-99 Standards to Improve Control System Security

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

Alternatives to Patching for more Secure and Reliable Control Systems

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Expanding Cyber Security Management for Critical Infrastructure

Symantec Network Access Control Starter Edition

Business Strategy Theatre

Symantec Network Access Control Starter Edition

Indegy. Industrial Cyber Security. Matt Petrauskas Regional Director.

PROTECTING MANUFACTURING and UTILITIES Industrial Control Systems

Security in a Converging IT/OT World

Manufacturing security: Bridging the gap between IT and OT

IEC A cybersecurity standard approaching the Rail IoT

People risk. Capital risk. Technology risk

Practical SCADA Cyber Security Lifecycle Steps

Symantec Network Access Control Starter Edition

Emerging Issues: Cybersecurity. Directors College 2015

WHITE PAPER. Vericlave The Kemuri Water Company Hack

T22 - Industrial Control System Security

DEFINING SECURITY FOR TODAY S CLOUD ENVIRONMENTS. Security Without Compromise

Cyber Risk and Networked Medical Devices

The Connected Water Plant. Immediate Value. Long-Term Flexibility.

Protecting productivity with Industrial Security Services

CYBER SECURITY AIR TRANSPORT IT SUMMIT

Rethinking Security: The Need For A Security Delivery Platform

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Sage Data Security Services Directory

Evolution of Cyber Security. Nasser Kettani Chief Technology Officer Microsoft, Middle East and Africa

Industrial Defender ASM. for Automation Systems Management

FIREWALL BEST PRACTICES TO BLOCK

White Paper. Why IDS Can t Adequately Protect Your IoT Devices

Building Intrinsically Secure Control and Safety Systems

APPLYING VLAN INSERTION IN ICS/SCADA

IoT and Smart Infrastructure efforts in ENISA

21ST CENTURY CYBER SECURITY FOR MEDIA AND BROADCASTING

TRAINING DAYS 2017 Using the ISA/IEC Standards to Secure Your Control Systems (IC32) Milan, July 3th 4th

European Union Agency for Network and Information Security

HOLISTIC NETWORK PROTECTION: INNOVATIONS IN SOFTWARE DEFINED NETWORKS

System Wide Awareness Training. your cyber vulnerabilities. your critical control systems

Network Security. White Paper. Design Patterns for Increased Security in Industrial Networks. Table of Contents

EXPERT SERVICES FOR IoT CYBERSECURITY AND RISK MANAGEMENT. An Insight Cyber White Paper. Copyright Insight Cyber All rights reserved.

A Measurement Companion to the CIS Critical Security Controls (Version 6) October

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

No compromises for secure SCADA Communications even over 3rd Party Networks

Who Goes There? Access Control in Water/Wastewater Siemens AG All Rights Reserved. siemens.com/ruggedcom

AT&T Endpoint Security

Safety Systems are the New Target Design Security Using Safety Methods

Measuring and Evaluating Cyber Risk in ICS Components, Products and Systems

Digital Wind Cyber Security from GE Renewable Energy

Introduction to ICS Security

Innovation policy for Industry 4.0

One Hospital s Cybersecurity Journey

Intrusion prevention systems are an important part of protecting any organisation from constantly developing threats.

NETWORK FORENSIC ANALYSIS IN THE AGE OF CLOUD COMPUTING.

How to Underpin Security Transformation With Complete Visibility of Your Attack Surface

Data Security and Privacy : Compliance to Stewardship. Jignesh Patel Solution Consultant,Oracle

Addressing Cyber Threats in Power Generation and Distribution

Medigate and Palo Alto Networks Integration

Connect Securely in an Unsecure World. Jon Clay Director: Global Threat

Cyber Security for Process Control Systems ABB's view

Visibility: The Foundation of your Cybersecurity Infrastructure. Marlin McFate Federal CTO, Riverbed

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

SonicWALL UTM Overview. Jon Piro NA Channel SE

Revenue Management as a Customer Service. Ed Hackney

NIST Cybersecurity Framework Protect / Maintenance and Protective Technology

Siemens Research Cyber Security

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

The Internet of Things. Presenter: John Balk

Process System Security. Process System Security

Chapter 18 SaskPower Managing the Risk of Cyber Incidents 1.0 MAIN POINTS

The Value of Automated Penetration Testing White Paper

Meeting PCI DSS 3.2 Compliance with RiskSense Solutions

The Art and Science of Deception Empowering Response Actions and Threat Intelligence

Express Monitoring 2019

SANS SCADA and Process Control Europe Rome 2011

Safdar Akhtar, Cyber Director Sema Tutucu, Ops Leader 27 September CYBER SECURITY PROGRAM: Policies to Controls

TARGET, PROTECT. your cyber vulnerabilities

Cybersecurity Vulnerabilities and Process Frameworks for Oil and Gas

Detecting Internal Malware Spread with the Cisco Cyber Threat Defense Solution 1.0

Activating Intrusion Prevention Service

Security Issues and Best Practices for Water Facilities

Gujarat Forensic Sciences University

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

Fundamentals of Information Systems Security Lesson 5 Auditing, Testing, and Monitoring

Combating Cyber Risk in the Supply Chain

Security by Default: Enabling Transformation Through Cyber Resilience

Transcription:

Securing Industrial Control Systems in the Age of IoT Jeff Lund October 2016 2016 Belden Inc. belden.com @BeldenInc info.beldon.com/iiot

Control System Security Is Gaining Public Recognition 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 2

Control System Security Is Gaining Public Recognition 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 3

Control System Security Is Gaining Public Recognition 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 4

Reported Vulnerabilities & Incidents are Increasing Source: FireEye isight Intelligence 2016 ICS Vulnerability Trend Report 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 5

But ICS Cybersecurity Is Much More than Hackers <10% of issues are related to hackers Most attacks are device or human errors 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 6

But ICS Cybersecurity Is Much More than Hackers <10% of issues are related to hackers Most attacks are device or human errors ICS cybersecurity is about Improving system reliability Reducing down time Increasing productivity Decreasing operating costs Ensuring safety 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 7

But ICS Cybersecurity Is Much More than Hackers <10% of issues are related to hackers Most attacks are device or human errors ICS cybersecurity is about Improving system reliability Reducing down time Increasing productivity Decreasing operating costs Ensuring safety And protecting from hackers 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 8

Industrial Systems Bring Unique Security Challenges Most of the devices are preexisting, don t speak IP, use inherently insecure protocols and live in the field for decades Configuration, testing and maintenance must be done without shutting down the network Patching is usually not practical Active scans can damage systems Systems must keep running even if under attack or impaired 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 9

Real World Example: The Problem Regional wastewater treatment plant Mid-sized city in the Eastern U.S. 24 buildings / 500 pieces of equipment 15 treatment processes 13 million gallons of wastewater daily Runs 24 hours a day every day Little protection or separation of the SCADA network from the city s IT network Even the city s high school students could gain access if they tried 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 10

The Requirements Protect critical plant infrastructure from malware, traffic storms, errors and attacks Without giving up the ability to share data interdepartmentally or remote support and maintenance capabilities While increasing system reliability by following ISA/IEC 62443 cybersecurity standards Partition into zones; secure through conduits Security embedded throughout the system, not just as the perimeter 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 11

The Approach Engaged ICS security consultant to analyze system and partition into zones per ISA/IEC 62443 cybersecurity standard Each zone protected by a specialized industrial security appliance Field-level firewall Transparent to the network (no IP address) Easy to install, hard to attack No changes required to network or subnet addressing Deep Packet Inspection for industrial protocol communications Protects against all malformed packet attacks even ones that have yet to be discovered Enforces use-case driven security policy 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 12

The Solution: Final Application 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 13

The Results Tofino Security Appliances were easily wired into the network No disruption to the active network during configuration New system uses custom rules to manage network traffic Tofino Security Appliances block unneeded/unwanted traffic Protects and strengths system Allows access to all needed business and maintenance information Network is on the forefront of industrial cybersecurity 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 14

Key Points to Take With You Most IIoT systems are brown field with existing devices using insecure protocols Safety and reliability are job #1 in industrial IoT systems Cyber security has a major role to play in ensuring these goals Security is not just perimeter protection or air gaps; security needs to be woven throughout the network fabric 2016 Belden Inc. belden.com @Belden Inc info.belden.com/iiot 15

info.belden.com/iiot Belden.com @Belden Inc. 2016 Belden Inc.