Cisco Secure Ops Solution

Similar documents
Internet of Things. The Digital Oilfield: Security in SCADA and Process Control. Mahyar Khosravi

Cyber Risk Program Maturity Assessment UNDERSTAND AND MANAGE YOUR ORGANIZATION S CYBER RISK.

Protecting productivity with Industrial Security Services

Mike Spear, Ops Leader Greg Maciel, Cyber Director INDUSTRIAL CYBER SECURITY PROGRAMS

Carbon Black PCI Compliance Mapping Checklist

AUTHORITY FOR ELECTRICITY REGULATION

locuz.com SOC Services

One Hospital s Cybersecurity Journey

LESSONS LEARNED IN SMART GRID CYBER SECURITY

Certified Information Systems Auditor (CISA)

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

ABB Ability Cyber Security Services Protection against cyber threats takes ability

Cisco Connected Factory Accelerator Bundles

2018 WTA Spring Meeting Are You Ready for a Breach? Troy Hawes, Senior Manager

Cyber Security Solutions Mitigating risk and enhancing plant reliability

Solution Pack. Managed Services Virtual Private Cloud Security Features Selections and Prerequisites

BUILDING CYBERSECURITY CAPABILITY, MATURITY, RESILIENCE

ANATOMY OF AN ATTACK!

Industrial Defender ASM. for Automation Systems Management

ISO/IEC Solution Brief ISO/IEC EventTracker 8815 Centre Park Drive, Columbia MD 21045

AT&T Endpoint Security

Lindström Tomas Cyber security from ABB System 800xA PA-SE-XA

Reinvent Your 2013 Security Management Strategy

Industrial Security Co-Sourcing: Shifting from CapEx to OpEx Presented by Vinicius Strey Manufacturing in America 03/22-23/2017

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

T22 - Industrial Control System Security

IBM Security Intelligence on Cloud

Service. Sentry Cyber Security Gain protection against sophisticated and persistent security threats through our layered cyber defense solution

A company built on security

Information Security Controls Policy

Mark Littlejohn June 23, 2016 DON T GO IT ALONE. Achieving Cyber Security using Managed Services

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

External Supplier Control Obligations. Cyber Security

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

Server Hardening Title Author Contributors Date Reviewed By Document Version

Security Metrics Framework

Future Proofing your IT Infrastructure

Introduction to Business continuity Planning

IBM Global Technology Services Provide around-the-clock expertise and protect against Internet threats.

WITH ACTIVEWATCH EXPERT BACKED, DETECTION AND THREAT RESPONSE BENEFITS HOW THREAT MANAGER WORKS SOLUTION OVERVIEW:

align security instill confidence

TRACKVIA SECURITY OVERVIEW

2017 Annual Meeting of Members and Board of Directors Meeting

Cyber security - why and how

"Charting the Course... Certified Information Systems Auditor (CISA) Course Summary

SYMANTEC: SECURITY ADVISORY SERVICES. Symantec Security Advisory Services The World Leader in Information Security

The New Normal. Unique Challenges When Monitoring Hybrid Cloud Environments

eguide: Designing a Continuous Response Architecture 5 Steps to Reduce the Complexity of PCI Security Assessments

ARC VIEW. Critical Industries Need Continuous ICS Security Monitoring. Keywords. Summary. By Sid Snitkin

2018 IT Priorities: Cybersecurity, Cloud Outsourcing & Risk Management. Follow Along

Defense-in-Depth Against Malicious Software. Speaker name Title Group Microsoft Corporation

FFIEC Cyber Security Assessment Tool. Overview and Key Considerations

Enhancing the Cybersecurity of Federal Information and Assets through CSIP

A Guide to Ensuring Security and Resiliency

Juniper Vendor Security Requirements

Addressing Vulnerabilities By Integrating Your Incident Response Plans. Brian Coates Enaxis Consulting

Critical Hygiene for Preventing Major Breaches

Criminal Justice Information Security (CJIS) Guide for ShareBase in the Hyland Cloud

IPMA State of Washington. Disaster Recovery in. State and Local. Governments

Total Security Management PCI DSS Compliance Guide

INCIDENTRESPONSE.COM. Automate Response. Did you know? Your playbook overview - Malware Outbreak

IC32E - Pre-Instructional Survey

Back to the Future Cyber Security

RSA IT Security Risk Management

Industrial Cyber Security. ICS SHIELD Top-down security for multi-vendor OT assets

QuickBooks Online Security White Paper July 2017

Transforming Security from Defense in Depth to Comprehensive Security Assurance

Ensuring Desktop Central Compliance to Payment Card Industry (PCI) Data Security Standard

Defensible Security DefSec 101

Core Services for ediscovery Perfection

NETWORKING &SECURITY SOLUTIONSPORTFOLIO

Cyber Defense Maturity Scorecard DEFINING CYBERSECURITY MATURITY ACROSS KEY DOMAINS

ITSM SERVICES. Delivering Technology Solutions With Passion

Symantec Security Monitoring Services

NORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers

Changing face of endpoint security

Information Technology General Control Review

CAPABILITY STATEMENT

BUILDING AND MAINTAINING SOC

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

HP Fortify Software Security Center

Continuous protection to reduce risk and maintain production availability

GDPR Update and ENISA guidelines

Deliver End-to-End Systems Management for Cisco Data Centers That Run Microsoft Applications

Managed Security Services - Endpoint Managed Security on Cloud

Ransomware. How to protect yourself?

Virtustream Cloud and Managed Services Solutions for US State & Local Governments and Education

The Common Controls Framework BY ADOBE

Online Services Security v2.1

SFC strengthens internet trading regulatory controls

: Administration of Symantec Endpoint Protection 14 Exam

Safdar Akhtar, Cyber Director Sema Tutucu, Ops Leader 27 September CYBER SECURITY PROGRAM: Policies to Controls

AZURE CLOUD SECURITY GUIDE: 6 BEST PRACTICES. To Secure Azure and Hybrid Cloud Environments

Cisco SP Wi-Fi Solution Support, Optimize, Assurance, and Operate Services

Enabling Security Controls, Supporting Business Results

THE POWER OF TECH-SAVVY BOARDS:

K12 Cybersecurity Roadmap

ISO27001 Preparing your business with Snare

Information Technology

Cyber Criminal Methods & Prevention Techniques. By

Transcription:

Brochure Cisco Secure Ops Solution Cisco Secure Ops Solution supports cyber-security risk management and compliance for industrial automation environments. It is a combination of on premise technology, processes, and managed services that helps companies implement and maintain perimeter security between enterprise and operational networks, as well as layered security controls. Through increased organization transparency, central leadership is able to better understand risks and compliance, as well as make informed investment decisions. Cisco Secure Ops delivers a standardized, comprehensive and integrated approach to security. It is supported and embraced by automation suppliers such as Yokogawa and Rockwell, and technology providers such as McAfee and Symantec, and provides a framework for a wide range of partners to participate. Challenges Operators of industrial control networks have historically relied on a combination of security by obscurity and physical segmentation to protect their networks against cyber-attack. More recently, this viewpoint has begun to evolve as: Interconnecting industrial systems, networks, and data applications to enable better information flow and decision-making opportunities have become highly desirable. Proactive monitoring is needed to avoid risks impacting process control networks, such as device failures. Operational costs for site personnel to implement and maintain security controls are high, impacting overall productivity. It s clear that a more robust, fleible, and secure solution is required. The solution must connect networks, and enable monitoring and data flow over a secure network. It must be fleible and capable of being deployed in legacy environments. Most importantly, it must deliver defense-in-depth features to organize, harden, defend, and respond to threats. 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 9

Solution Overview Cisco has developed Secure Ops to provide an integrated and standardized solution for securing industrial automation environments, protect against risks, improve efficiency, and reduce site downtime. Customers can choose to implement security controls using a building block approach that allows them to address various attack vectors as their business demands. Cisco Secure Ops Key Benefits Lowered risk to Process Control environment Reduced cost of delivering PCN Security Brings new services that improve productivity and reduce cost of production Real ROI - an independent customer study found approimately $700,000 savings per site over a 5 year period. Business Benefits Cisco Secure Ops delivers a wide range of benefits across the organization: Business leaders gain situational awareness for security maturity and compliance within various parts of the business. Site leadership and management benefit from reduced management compleity and increased consistency across individual sites, leading to optimized operational costs. Site technical leaders are provided with a technical solution to help manage security and compliance on a per-site basis as well as valuable tools to increase it through standardized interfaces and capabilities Corporate risk and compliance leaders receive near real time information on operational risks associated with cybersecurity threats and adherence to compliance policies. 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 9

Business Results Cisco Secure Ops Solution provides critical infrastructure security as-a-service, and customers who implement the solution have eperienced: A consistent, integrated solution for addressing security and other risks found in the process control domain Increased site productivity and significantly lower operational costs Improved, and in some cases, automated compliance Solution Components Cisco Secure Ops is comprised of tightly integrated Cisco and third party products and services, and is unique in several ways: It is designed to be dropped in to the DMZ, between the enterprise and process control domains. The solution has been architected to be easily deployed in either eisting or new environments. The integration goes beyond the technology, and etends into commercial arrangements with automation suppliers for services like qualified patches and anti-virus updates. Cisco delivers Secure Ops as a service, including future-proofing for fleibility. Key features Include: Situational awareness dashboards (network status, access/inventory management, security compliance and assurance) High-availability infrastructure (for system-to-system and user-to-system connectivity) Secure process control access Asset discovery and inventory On-premise backup/restore capabilities Automated Windows and automation vendor qualified patches 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 9

Automated signature update, approved by automation suppliers Automated, daily log collection and management Globally supported 24 hours a day, 365 days a year using a follow the sun support model Proactive performance and fault monitoring Global security incident response and monitoring services Security event correlation and incident notifications Network availability and performance monitoring and reporting Cisco Secure Ops Services SecureOps consists of a SecureCenter and SecureSite. SecureCenter Services include: Table 1. Description of SecureCenter Services SecureCenter Data Center Planning, Design, Implementation - HLD, LLD, etc. Customer Hosted Customer Hosted, Cisco Managed Cisco Owned & Managed (Virtual Cloud) Cisco Virtual Cloud (Hosted) Operational Readiness Testing Application Monitoring Services Services Transition/Activation Technology/Architecture High-level Architecture Build Customer Selected, Cisco Validated Virtual Cloud Identity Services/Policy Management Service Operations Incident Management Break/fi 3 rd Party Escalation Management Situation Management (Critical Issue with Defined Process) Problem Management Change Management Customer Requested Policy Updates (Standard Changes) Firmware updates Maintenance Window Management & Release Planning Track Change History Business Continuity Plan (BCP) Disaster Recovery Service Management Service Levels Reporting Tracking and Demand Generation Business Level Escalations Service Upgrade Management Ticketing Integration/E-bonding 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 9

SecureCenter Customer Hosted, Cisco Managed Cisco Owned & Managed (Virtual Cloud) Services Dashboard Services Catalogue Solution Management Solution Evergreening/Lifecycle Management Core Solution Architecture Validation Through ORT Customer Environment Validation Through ORT Network Optimization Services (Secure Ops Scope) Solution Roadmap Reviews (4 annually) Detailed Release Planning Supplier Management Sandbo Monitoring for Testing Configuration Management Asset Reporting Asset Management Security Bundle Password Change Management Two Factor Authentication Security Monitoring PCN Access PCN Host Asset inventory/compliance Anti-virus Management OS & Automation Supplier Patch Management Access/Inventory Management & Status Dashboard Situational Analysis Dashboard (PCN/IT Network Status) Compliance Reporting & Dashboard Log collection and Management Identity Services and Policy Management Vulnerability Scans Advanced Malware Detection Cyber Threat Defense (Managed Threat Defense) Backup/Recovery & Redundancy VM Replication, Backup and Restore Geo-Redundancy Service Levels Service Window 724 724 Time to Notify (TTN) Time to Respond (TTR) 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 9

SecureCenter Customer Hosted, Cisco Managed Cisco Owned & Managed (Virtual Cloud) Change Management Success Rate Remote Service Restoration 4 elapsed hours 4 elapsed hours Service Availability Standard Request (% Completed w/o Error) Depends on Service Provider SLA Depends on Service Provider SLA 99.90% >= 99.75% Aged ticket analysis % Problem Ticket Raised % Problems with Root Cause Found % of Problems w/o Root Cause Found % of Problems Resolved Service Reliability (Clean Days) Operational KPI Report Service Request Fulfilled Report The following table illustrates the services provided for each SecureSite, based on service tier. Table 2. SecureSite - Service Tiers, Levels, and Service Window SecureSite Standard Enhanced High SecureSite - PDI - HLD, LLD and implementation Services Transition/Activation Service Request Management Site Survey Order Equipment (Site Instantiation) Device Staging/Provisioning Build, Configure and Test Hand Over Technology/Architecture High-level Architecture Build Standard High Availability Connectivity Design High Availability Connectivity Design + Active: Standby High Availability Connectivity Design + Active: Active Identity Services/Policy Management Physical Security & Safety Wi-Fi 3G/4G Service Operations Incident Management Break/fi 3 rd Party Escalation Management Situation Management (Critical Issue with Defined Process) Problem Management 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 6 of 9

SecureSite Standard Enhanced High Change Management Customer Requested Policy Updates (Standard Changes) Firmware updates Maintenance Window Management & Release Planning Track Change History Service Management Service Levels Reporting Tracking and Demand Generation Business Level Escalations Service Upgrade Management Services Catalogue Ticketing Integration/E-bonding Services Dashboard Solution Management Solution Roadmap Reviews (4 annually) Core Solution Architecture Validation Sandbo Monitoring for Testing Solution Evergreening/Lifecycle Management Customer Environment Validation Network Optimization Services (Secure Ops scope) Supplier Management Detailed Release Planning Configuration Management Asset Management Asset Reporting Security Bundle L3/L4 Firewall Management (Sites) Password change Management Two Factor authentication Security monitoring PCN Access Network segmentation PCN Host Asset inventory/compliance Anti-virus Management OS & Automation Supplier Patch Management Log collection and Management 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 9

SecureSite Standard Enhanced High Identity Services and Policy Management L2/L3 Firewall Management (Sites) Vulnerability scans Cyber threat defense (Managed Threat Defense) Advanced Malware Detection Intrusion Detection (IDS) White & Black Listing Intrusion Protection Signatures (IPS) Backup/Recovery & Redundancy VM Replication and Data Backups (Site level) Service Levels Service Window 58 724 724 Time to Notify (TTN) Time to Respond (TTR) Change Management Success Rate Deployment Period (3 Months or Less) Remote Service Restoration 8 business hours 8 elapsed hours 4 elapsed hours Service Availability 98.50% 99.50% Standard Request (% Completed w/o Error) >=90% >=95% Aged ticket analysis % Problem Ticket Raised % Problems with Root Cause Found % of Problems w/o Root Cause Found % of Problems Resolved Service Reliability (Clean Days) Operational KPI Report Service Request Fulfilled Report Training PCN IT Teams Remote Training (Twice/Annually) 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 8 of 9

Cisco Services Cisco Services helps to ensure that your epectations are met completely from planning to building and implementing your solution. Consult with Cisco Services to maimize your return on investment and achieve your goals in every phase of your project, even after deployment. For More Information For more information about Cisco Secure Ops, please ask your account manager or visit the Cisco oil and gas website: http://www.cisco.com/web/strategy/energy/eternal_oil.html. Printed in USA C02-732102-00 07/14 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 9 of 9