Security for Industry 4.0 Trends -- Challenges -- Opportunities

Similar documents
Industrial Security - Protecting productivity. Industrial Security in Pharmaanlagen

Innovation policy for Industry 4.0

Cisco Connected Factory Accelerator Bundles

Featured Articles II Security Platforms Hitachi s Security Solution Platforms for Social Infrastructure

Digital Substation Unrestricted Siemens AG 2017 siemens.com/digital-substation

Platform Economy and Trustworthiness Standardization

Siemens view and approach on critical infrastructure resilience against cyberthreats Joint OECD-JRC Workshop, Paris September 2018

Cybersecurity eit. Software. Certification. Industrial Security Embedded System

Security Standardization and Regulation An Industry Perspective

Industrial Network Trends & Technologies

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

End-to-end Safety, Security and Reliability Keys for a successful I4.0 Migration

Cyber Security in Smart Commercial Buildings 2017 to 2021

IPM Secure Hardening Guidelines

The Factory of the future : Collaboration and Digitalization to deliver smarter packaging solutions Hispack 2018

Security and networks

LTI Security Services. Intelligent & integrated Approach to Cyber & Digital Security

ДОБРО ПОЖАЛОВАТЬ SIEMENS AG ENERGY MANAGEMENT

Continuous protection to reduce risk and maintain production availability

Cyber security for digital substations. IEC Europe Conference 2017

Cybersecurity. Securely enabling transformation and change

IEC A cybersecurity standard approaching the Rail IoT

Transformation in Technology Barbara Duck Chief Information Officer. Investor Day 2018

MASP Chapter on Safety and Security

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

Back to the Future Cyber Security

The Connected Water Plant. Immediate Value. Long-Term Flexibility.

Cyber Security for Process Control Systems ABB's view

LESSONS LEARNED IN SMART GRID CYBER SECURITY

DIGITAL TRUST Making digital work by making digital secure

IEC in Digital Substation and Cyber security

Smart Grid Security: Current and Future Issues

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

T28 Introduction to GuardLogix Integrated Safety Systems

IoT, Cloud and Managed Services Accelerating the vision to reality to profitability

The Road to Industry 4.0

Run the business. Not the risks.

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

Cyber Security Panel Discussion Gary Hayes, SVP & CIO Technology Operations. Arkansas Joint Committee on Energy March 16, 2016

PROCESS SAFETY from POINT A to POINT Zed

TD01 - Enabling Digital Transformation Through The Connected Enterprise

Cyber Security Beyond 2020

Internet of Things. Tanja Hess Consulting Systems Engineer 2nd June 2016

Industrial Defender ASM. for Automation Systems Management

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

Transformation Through Innovation

Control System Security for Social Infrastructure

Water Asset Management Conference. Convergence of Water and Data Launches Wave of New Opportunities and Solutions. Boston, MA.

Strengthen your network security with Industrial Security Appliances SCALANCE S siemens.com/scalance-s

Smart Manufacturing and Standards: The NIST Role

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

Virtual Machine Encryption Security & Compliance in the Cloud

Improving Internet of Things Device Certification with Policy Based Management

Cyber Awareness Training Requirements

Cisco Digital Network Architecture The Network Enables Digital Business. Rene Andersen Cisco DK

CYBERSECURITY IN THE INDUSTRIAL INTERNET OF THINGS

ENABLING SECURE CLOUD CONNECTIVITY. Create a Successful Cloud Strategy with Reliable Connectivity Solutions

Critical Infrastructure Protection for the Energy Industries. Building Identity Into the Network

Agile and 360 Digital: Path to the Future of Energy. Michael Carlson

Spotlight Report. Information Security. Presented by. Group Partner

SECURE SYSTEMS, NETWORKS AND DEVICES SAFEGUARDING CRITICAL INFRASTRUCTURE OPERATIONS

How to ensure control and security when moving to SaaS/cloud applications

Secure Product Design Lifecycle for Connected Vehicles

TRENDS IN ACCELERATING PERFORMANCE IMPROVEMENTS

A Smart New Cofely Dutch Data Summit Roland Schneiders

Vulnerability Management. June Risk Advisory

Next Generation Privilege Identity Management

The Benefits of a Modern DCS

Thrive in today's digital economy

Thrive in today's digital economy

Securityconcept fortheprotectionofindustrialplants. Industrial Security. White PaperV1.0

NIS Standardisation ENISA view

ISA99 - Industrial Automation and Controls Systems Security

Combating Cyber Risk in the Supply Chain

STRATEGIC PLAN

Cyber Security of Industrial Control Systems (ICSs)

Summary of Cyber Security Issues in the Electric Power Sector

Accelerating High Performance Manufacturing

Transforming Lives. Global UST

Critical Infrastructure Protection (CIP) as example of a multi-stakeholder approach.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 7

THALES DATA THREAT REPORT

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

Expanding Cyber Security Management for Critical Infrastructure

Time-Awareness in the Internet of Things. ITSF 2014 Marc Weiss, NIST Consultant

Highlights. Learn more: siemens.com/profinet siemens.com/pb2pn siemens.com/opc-ua siemens.com/tsn. Published by Siemens AG 2018

Industry role moving forward

Functional. Safety and. Cyber Security. Pete Brown Safety & Security Officer PI-UK

Cisco Smart Grid. Powering End-to-End Communications. Annette Winston Sr. Mgr., Product Operations Customer Value Chain Management

O&M Service for Sustainable Social Infrastructure

Digital Renewable Ecosystem on Predix Platform from GE Renewable Energy

Keeping the lid on storage

Digital substations. Introduction, benefits, offerings

COMPANION FINAL EVENT 14 TH & 15 TH September 2016

Transform your bottom line: 5G Fixed Wireless Access

Security in grid control centers: Spectrum Power TM Cyber Security

Build Your Zero Trust Security Strategy With Microsegmentation

No Country for Old Security Compliance in the Cloud. Joel Sloss, CDSA Board of Directors May 2017

GLOBAL PKI TRENDS STUDY

NERC Staff Organization Chart Budget 2018

Transcription:

Security for Industry 4.0 Trends -- Challenges -- Opportunities, Siemens Corporate Technology and Member of the German Platform Industry 4.0 siemens.com/innovation

Increasing intelligence and open communication drive security requirements in various industrial environments Process Automation Factory Automation Urban Infrastructures Building Automation Energy Automation Mobility Systems Page 2

Our industrial society confesses a growing demand for IT-Security IT Security trends are determined by drivers such as Industry infrastructures changes (Digitalization) More networked embedded systems Increasing device-to-device communication Need to manage intellectual property And Increasing international organized crime Privacy Compliance enforcement Cyber war fare Cloud/Virtualization PDAs, Smart Mobiles Social Networks / data mining concepts. Page 3

Productivity, speed and flexibility remain the biggest challenges for production industries Increased competitiveness Quality Productivity Speed Flexibility Closed-loop control and comprehensive traceability become quality characteristics Energy efficiency and resource efficiency are critical competitive factors Shorter innovation cycles for ever more complex products Individualized mass production in increasingly volatile markets but the focal points of these requirements are changing in the wake of digitalization Page 4

Digitalization meets industry: The German concept of Industrie 4.0 Seamlessly connecting and improving all steps along the plant lifecycle Product Design Process and Plant Design Engineering and Commissioning i i Operation Service Industrie 4.0 Merging the real plant with its digital twin consistent data on all levels and throughout all life cycle phases by integrating g engineering g software and plant automation Low CAPEX, optimal OPEX Page 5

The Internet is revolutionizing the business world and creates major challenges and opportunities for manufacturing companies Customers are increasingly able to tell their manufacturers directly via the net, what exactly they want and when Formerly isolated processes are getting connected through internet based services influencing B2C and B2B Page 6

Cyber Physical Systems include physical and digital representation Cyber-Physisches System (CPS) Contains all information on: software / HW geographical information + mechanical devices identities electronics status information automation, HMI release information safety, security interfaces physical production digital model maintenance The digital twin will be updated and maintained across the entire life cycle design production planning production engineering production services Page 7

Security within Industry 4.0: Security by design & security by default Security by design as a superior principle Subsequent enrichment of systems is not sufficient. Security measures have to be integrated (up to application level) level). Adaptive security architectures Agile security profiles have to be adaptable in a dynamic way. Fast configuration must include security. Security for the digital model Security for the physical instance, its digital twin and their interactions must take place in a concerted way. Prevention and reaction are still needed Security will remain moving target target. There will be no final I4.0 security solution without a need for further measures. Page 8

The Future of Industry: Security for Industry 4.0 (some) constraints and requirements Authentication and Secure Identities for Devices Unforgeable identities and trust anchors are needed. y respectively p y security y credentials must be bound to the device. Keys B2B vs. B2C communication Individual and short-term consideration of customer requests ( batch-size 1 ) need enhanced security IT Security as enabler of business models Digitalization of business processes often mandate additional measures regarding IT security. Ease of use and plug & operate are important i pre-requisites i i ffor the h acceptance off security i measures. Standardization enables secure infrastructures Security requires standardized specifications of interfaces and protocols to support requirements and to negotiate and operate security profiles (security semantics) between different domains. Page 9

Different factors are driving the research demand for IT Security New Functionality Eample Example Device connectivity, IP to the field Connectivity of devices and systems to public networks Data analytics, predictive maintenance 5G Security Use Case Eamples Examples Know-how protection Industry 4.0 scenarios, IoT, Discovering new/additional threats Quality of Security Eamples Examples Robust Easy to use Long term security Page 10

German National Funded Project: IUNO Trust in Industry 4.0 requires adequate security measures Basis of the project are four I4.0 application scenarios: Customer individual production Technology market place Remote access and trusted partners Visual security control center for production IUNO follows the security-by-design principle to consider appropriate security measures for the application scenarios from the beginning (threat and risk assessment) until the end (evaluation of integrated security measures). Project result will be transferred to small and medium enterprises. Page 11

Setting standards requires engagement of all stake holders Security standards need global acceptance Increasing need to protect intellectual property and business cases with globally defined and accepted quality Specific standards and guidelines regarding security and privacy are getting established Regulatory: FDA, NERC CIP, CFATS, CPNI, KRITIS Standards relevant for secure automation: ISA 99, IEC 62443, HIS, SAE J 3061, Examples of organizations issuing security standards or guidelines Global Europe Germany EG2 SGIS/M490 Page 12

Industrial Security Enhanced Defense in Depth will be Based on IEC 62443 Control Intelligent of the physical physical + Security management + Self learning security access to to plants buildings or critical and processes management and processes infrastructures plants technical Dynamic measures threat analysis Self synchronizing and adaption access control CPS + Plant security Network security System integrity Network Dynamic, segmentation flexible ti + with network zones architectures and conduits Permanent monitoring of networks and communications Protection and proof of Security Services for + Unambiguous and System integrity with + the integrity of the overall secure integrity of the protection of the plant integrated security system during the hole products, processes and during the hole lifecycle l functions lifecycle machines Page 13

Questions and answers siemens.com/innovation