15
Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved. PUBLIC Cybersecurity in Manufacturing Operations Anthony Baker Portfolio Manager, Cybersecurity October 16 th , 2018

Cybersecurity in Manufacturing Operations - Map Your Show

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Cybersecurity in Manufacturing Operations

Anthony BakerPortfolio Manager, CybersecurityOctober 16th, 2018

3Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

IMPROVED TIME TO MARKET

REDUCTION IN CAPITAL EXPENDITURES

30% 10%REDUCTION IN INVENTORY

IMPROVED PRODUCTIVITY

30% 4%

4Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Threat Vectors

DMZ

Email, Intranet, Business Planning & Logistics Network

IT Network

OT Network

ICS Supply Chain

wwwSIEM/SOC Servers

Remote Maintenance

SCADAServer HistorianHMI

PLC

Pump

EngineeringStation

OperatorWork Station

PLC

Actuator

PLC

Valve

PLC

Sensor

On-Site Maintenance

Direct Attackon Plant Network

Direct Attack via IT Network

USB Indirect Attack

(Compromised VPN) (Compromised Device)

VPN DeviceExternal

Adversaries

Insider Threat

5Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Insiders Cyber CriminalsHacktivistsNation States Terrorists

Threat Actors

6Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Evolving Threats

2011

-201

7

2007

-201

4

2016

-201

7

2017

-201

8

INCREASEDRISK

7Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

IT/OT Convergence

Lack of comprehensive Asset Inventory

Integration of new technologies

Integrate: customer demand, supply chain and industrial processes

Inflexibility

Low Adoption of Risk Management Processes

Shadow/Stealth IT Lack of tools to manage

Infrastructure Too Much Data, Lack of

Actionable Information

Skills Gap Vulnerability

Security is an after thought Aging Industrial Control

Systems and Protocols Lack of proper policies and

procedures Evolving Industrial Security

Standards

Dearth of qualified personnel 1

Achieving productivity goals

Lack of staffing to expand operations 2

(1) ARC Supplier Provided Automation Services(2) Aberdeen Group

Challenges Facing Industrial Infrastructure

9Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

BEFORE DURING AFTER

IDENTIFY DETECTPROTECT RECOVERRESPOND

Attack Continuum

10Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Compliance & StandardsCertified Products, Architectures and Solution Delivery

ISA/IEC 62443: Series of standards that define procedures for implementing electronically secure Industrial Automation and Control Systems (IACS).

Applies to those responsible for designing, manufacturing, implementing, or managing industrial control systems:

End-users (i.e. asset owner)

System integrators

Security practitioners

ICS product/systems vendors*Equivalence to ISO 27001 and NIST Cybersecurity Framework

11Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

12Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Rockwell Automation Cybersecurity Program Vision

12

NIST CSF

HOW WE MEASURE PROGRESS

ISO 270001 IEC 62443

SECURE OUR PRODUCTS SECURE OUR INFRASTRUCTURE SECURE OUR SOLUTIONS

Supply Chain Manufacturing InformationTechnology

Third Parties Solutions ConnectedServices

Merges andPartnerships

Third Parties ProductSecurity

Rockwell Automation Customers

To ensure that Rockwell Automation and our Connected Enterprise ecosystem are safe, secure, and resilient from the ever-changing global cybersecurity threat landscape.

13Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Risk Assessment

Cloud Governance Council

Mandatory TrainingSecure

Development Environment

Insider Risk Program

Cyber Tabletop Exercises

Product Security Office

Third Party Risk Management Program

Enabled By The Connected Enterprise

SMARTMANUFACTURING

14Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Getting StartedBasic Steps to Reduce Risk

Know your assets and their potential risk

Authentication and authorization

Implement patch management policies and procedures

Computer and mobile endpoint protection

Disaster recovery (Backup and Restore)

Raise awareness to personnel

Leverage networking to implement basic network

security capabilities

15Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

Converged Plant-wide EthernetReference Architectures

As plants invest in the modernization of their network architectures, internal and external security drivers are pushing companies to invest in pervasive security solutions beyond the traditional firewall.

• Extend proven IT security technologies and processes to the OT network.

• Leverage IT competencies of existing team with tools they know and trust.

• Enable alignment between not only IT and OT, but also with solution and machine providers.

PARTNERSLEVERAGING

16Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC

v vv v

PEOPLE,PROCESS &

TECHNOLOGY

StrategicAdvisor

IT/OT SecurityPractitioner

TrustedSupplier

Industry-LeadingPartners

The Rockwell Automation Integrated ArchitectureAddresses OT Cybersecurity, Leveraging a Multi-layer, Risk Based Approach

BEFORE DURING AFTER