Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
INDUSTRIAL CYBER SECURITY
IT Cyber Security
The Information Technology has themain target to protect theconfidentiality and the integrity ofthe data exchanged and guaranteenetwork availability.
OT Cyber Security
Operation Technology is orientedto protect the infrastructure andits operability. The availability ofoperation infrastructure is themain target.
Information Technology
Cyber security(DATA ORIENTED)
Operational Technology
Cyber security(INFRASTRUCTURE
ORIENTED)
IT vs OT
INDUSTRIAL CYBER SECURITY
Today the Operation Technology is
connected with the IT world in
several ways and the volume of
data exchanged growing up quickly.
The technology used for the
network infrastructure is in
continuously merging between IT
and OT.
2010 Stuxnet
Developed by America’s National Security Agency, working in conjunction with Israeli intelligence, themalware was a computer worm, or code that replicates itself from computer to computer without humanintervention. Most likely smuggled in on a USB stick, it targeted programmable logic controllers whichgovern automated processes, and caused the destruction of centrifuges used in the enrichment ofuranium at a facility in Iran.
2013 Havex
Havex was designed to snoop on systems controlling industrial equipment, presumably so that hackerscould work out how to mount attacks on the gear. The code was a remote access Trojan, or RAT, which iscyber-speak for software that lets hackers take control of computers remotely. Havex targeted thousandsof US, European, and Canadian businesses, and especially ones in the energy and petrochemicalindustries.
OT CYBER ATTACKS
2015 BlackEnergy
BlackEnergy, which is another Trojan, had been circulating in the criminal underworld for a while before itwas adapted by Russian hackers to launch an attack in December 2015 on several Ukranian powercompanies that helped trigger blackouts. The malware was used to gather intelligence about the powercompanies’ systems, and to steal log-in credentials from employees.
2016 CrashOverride
Also known as Industroyer, this was developed by Russian cyber warriors too, who used it to mount anattack on a part of Ukraine’s electrical grid in December 2016. The malware replicated the protocols, orcommunications languages, that different elements of a grid used to talk to one another. This let it dothings like show that a circuit breaker is closed when it’s really open. The code was used to strike anelectrical transmission substation in Kiev, blacking out part of the city for a short time.
OT CYBER ATTACKS
.01
2014-today TRITON – The First ICS Cyber Attack on Safety Instrument Systems
First detected in 2017, when it was targeting the Saudi Arabian petrol company Petro Rabigh, this malwarecould have caused enormous harm, including marine pollution, a spike in petrol prices, and even deaths dueto explosion. It work by reprogramming the controllers of the Triconex Safety Instrumented System (SIS).
OT CYBER ATTACKS
According to the latest reports on this cyberattack, Triton went unnoticedfor three years before being detected. An unsettling piece of news, nowthat the malware seems to have resurfaced in April 2019.
OT CYBER ATTACKS
Many people think that hackers don't understand control systems -this is nolonger true. In addition, hacking is no longer for fun - hackers now sell zero-day exploits to organized crime.
Unintentional80%
Intentional20%
ICS Incident types
Targeted worms for very specific applications or victims are now becomingcommon (and in some cases available for free). SCADA and process controlsystems are now common topics at hacker's "Blackhat" conferences.
You don't have to be a target to be a victim, 80% of actual control systemsecurity incidents are unintentional, and in some cases generated using theprinciple of “ransom”.
OT CYBER ATTACKS
OT CYBER ATTACKS NOW BECOMES KNOWN
The OT cyber attacks victims prefer not to
divulge details about how their systems have
been compromised and the amount of loss are
confidential information, but from 2016 some
cyber attacks have not be contained within the
company limits and had become known. In
some cases the consequences have been of
public domain...
OT CYBER ATTACKS NOW BECOMES KNOWN
Critical infrastructures are one of the first targets ofcybercrime, the attacks on it ramps quickly more than thefinancial sector (banks, atm, credit cards, etc.).
There are important differencesbetween IT systems and IACS.
Problems occur because assumptionsthat are valid in an IT environmentmay not be valid on the plant floor andthe IACS Cyber Security must addressissues of safety, which is not usually anissue with conventional IT CyberSecurity
Pri
ori
ty
Integrity
Availability
Confidentiality
Integrity
Confidentiality
Availability
IACS Cybersecurity IT Information Security
INDUSTRIAL CYBER SECURITY IT vs OT
ANATOMY OF A CYBER ATTACK
A cyber attack generally follows a process
allowing the attacker to perform reconnaissance
or discovery of the targeted business, then
develops and executes the attack, and finally
uses the attacker’s command and control
presence to extract data and/or achieve the
attacker’s goals on the target system.
• Characterize the system
• Find exploitable vulnerabilities
• Exploit vulnerabilities (people, system and components)
• Data extraction
• Compromise Functionality
• Uncontrolled shutdown
ANATOMY OF A CYBER ATTACK
Threat:
Circumstance or event with the potential to
adversely affect operations (including mission,
functions, image or reputation), assets, control
systems or individuals via unauthorized access,
destruction, disclosure, modification of data
and/or denial of service (IEC 62443-2-1 3.1.46).
Control Systems are more vulnerable today than
ever before because:
• Now use commercial technology (COTS)
• Highly connected
• Offer remote access
• Technical information is publically available
• Hackers are now targeting control systems
OT VULNERABILITIES
The OT vulnerabilities affect more or less allindustrial control system platformindependently from the manufacturer, brand ortechnology used.
This list is an extract, only for the 2019, of allvulnerability advice listed by The Cybersecurityand Infrastructure Security Agency (CISA).
https://www.us-cert.gov/ics/advisories?page=0
OT VULNERABILITIES
OT VULNERABILITIES
System vulnerabilities are related tointerconnecting and how the equipment hasbeen set up. Firewall, layer 3 switches, routeretc. are often misconfigured allowingunauthorized access or network misuse.
Vulnerabilities are also hidden into thearchitecture, think that one firewall on accesspoint could be enough is one of the mostcommon vulnerabilities put in place.
THE HUMAN FACTOR
The first one weakness or vulnerability for an ICS are the humans.
Humans are a vulnerability that can be exploited. The social engineer is able
to take advantage of people to obtain information with or without the use
of technology.
A Social Engineering attack is articulated in 4 steps:
1. Footprinting
2. Establishing Trust
3. Psychological Manipulation
4. The Exit
Now, after all the actual informationhas been extracted, the Social Engineerhas to make a clear exit in such a wayso as not to divert any kind ofunnecessary suspicion to himself.
TRUSTEDDCS login
credentials
OR
Social Engineering
From: [email protected]: [email protected]: New Career Opportunities
Gain network login
credentials
THE HUMAN FACTOR
Attacks directly from Internet to Internet-connected ICSdevices.
Establish direct access deep into the ICS systems.
Attacks initiated using remote access credentials stolenor hijacked from authorized ICS organization users.
Establish direct access deep into the ICS systems.
Attacks on the external business web interface.
Leverage exploits to vulnerabilities existing in the webservices.
CYBER PROTECTION PRINCIPLES
TOPICS
• Introduction: Worldwide Laws and Applicable Standards for OT Cyber Security
• The ISA / IEC 62443 standard as a method
• Risk Assessment
• Addressing risk with a Cyber Security Management System (CSMS)
• Security Levels allocation
• Systems: Foundational & System requirements
• Equipment: Security Lifecycle and requirements
• Monitoring and improving with a CSMS
POTENTIAL CONSEQUENCES
One of the main difference between Cyber Security and Information Security lies on potential
consequences. The consequences of a Cyber Attack on OT infrastructures may have impacts on a larger
scope than IT. Among others, the standards gathers the following:
• Health and Safety
• Environment
• Social utilities availability
• Financial loss or impacts
• Damages to company image
• Loss on production
• Products quality
• ….
LAWS AND STANDARDS
Several countries are adopting at law level OT Cyber Security frameworks. A few examples:
The State of Art
COUNTRIES ACT AUTHORITY WEB
EUROPENIS DIRECTIVE 2016/1148Cybersecurity Act 2019/881 ENISA https://www.enisa.europa.eu/
ITALY D.Lgs. 65/2018 Several https://www.csirt-ita.it/
RUSSIAN FEDERATIONFZ-187/2017Order 239/2017 FSTEC https://fstec.ru/
UNITED STATESCybersecurity and Infrastructure Security Agency Acts of 2013/18
CISANIST
https://www.cisa.gov/https://www.nist.gov/
AUSTRALIASecurity of Critical Infrastructure Act2018 (No. 29, 2018) Australian Gov. -
CHINA Cybersecurity Law - 2017 CAC http://www.cac.gov.cn/
INTERNATIONAL STANDARDS FOR CYBER SECURITY
International Electrotechnical Commission
IEC 62443 (series) Industrial Communication Networks -
Network and System Security
International Society for Automation
ISA 99 (series) Industrial Automation and Control
System (IACS) Security
SP 800-82 Guide to Industrial Control System (ICS) Security
NISTIR 7628 Guidelines for Smart Grid Cyber Security
Critical Infrastructure Protection (CIP) -002
through -011
Guidance for Addressing Cyber Security in the
Chemical Industry
Protecting Industrial Control Systems
Recommendations for Europe and Member States
Guidance of Security for Industrial Control Systems
CYBER SECURITY LIFECYCLE
The IEC 62443-2-1 specifies the elements required for a CSMS. The Cyber
Security Management Systems is divided in three categories:
• ASSESS
• IMPLEMENT
• MAINTAIN
Each of these is further divided into elements group and/or elements.
ASSESS
IMPLEMENT
MAINTAIN
MAIN STEPS OF A CSMS
Each of these is further divided into elements group.
ASSESS
IMPLEMENTMAINTAIN
The first main category of the CSMS is Risk Assessment.
Security policy,
organization and
awareness
Organize for security
Staff training and
security awareness
Business continuity
plan
Security policies and
procedures
Selected security
countermeasures
Personnel security
Physical and
environment
Network
segmentation
Access control:
Account admin
Access control:
Authentication
Access control:
Authorization
Implementation
Risk Management
and implementation
System development
and maintenance
Information
Management
Incident planning
and response
Risk Analysis
Addressing risk with the CSMS
Monitoring & Improving
CSMS Scope
Review, improve and
maintainConformance
Business RationaleRisk identification/
assessment
SYSTEMATIC APPROACH
The first category contains much of the background
information that feeds into many of the other
elements in the CSMS.
The first set of requirements presents the actions
an organization takes to carry out both a High Level
and a Detailed Risk Assessment that incorporates
vulnerability assessment in a chronological order.
Security policy,
organization and
awareness
Selected security
countermeasuresImplementation
Risk Analysis
Monitoring & Improving
Risk identification/
assessmentBusiness Rationale
Addressing risk with the CSMS
Risk Assessment
BUSINESS RATIONALE
The organization should develop a Business Rationale
as a basis:
• Prioritized Business Consequences (as potential
consequences).
• Prioritized Threats (as potential and credible
threats).
• Estimated Business Impact (the highest priority
items and estimate of the annual business
impact).
Security policy,
organization and
awareness
Selected security
countermeasuresImplementation
Risk Analysis
Monitoring & Improving
Risk identification/
assessmentBusiness Rationale
Addressing risk with the CSMS
HIGH LEVEL AND DETAILED RISK ANALYSIS
Risk Analysis identifies:
• Assets
• Threats (from BR and expanded)
• Vulnerabilities
• Consequences (from BR)
• Likelihood of Successful Attack
• Countermeasures
Security policy,
organization and
awareness
Selected security
countermeasuresImplementation
Risk Analysis
Monitoring & Improving
Risk identification/
assessment
Addressing risk with the CSMS
Business Rationale
HIGH LEVEL AND DETAILED RISK ANALYSIS
Risk is formally defined as an expectation of loss expressed as the probability that a particular threat will exploit a
particular vulnerability with a particular consequence.
RISK = THREAT x VULNERABILITY x CONSEQUENCE
Risk assessment can be carried out at several levels. The standard IEC 62443-2-1 requires risk assessment at two levels of
detail, called High Level Risk Assessment and Detailed Risk Assessment.
CYBER SECURITY MANAGEMENT SYSTEM
An IACS cannot be safe at 100%Security is really a balance of Risk versus Cost.
The foundation of any CSMS or security program
is to maintain risk at an acceptable level.
.
CSMS
ADDRESSING RISKS WITH THE CSMS
Standards typically provide guidance on what should be
included in a Management System, but do not provide
guidance on how to go about developing the Management
System.
Security policy,
organization and
awareness
Security policies and
procedures
Selected security
countermeasures
Personnel security
Physical and
environment
Network
segmentation
Access control:
Account admin
Access control:
Authentication
Access control:
Authorization
Implementation
Risk Management
and implementation
System development
and maintenance
Incident planning
and response
Organize for security
Staff training and
security awareness
Business continuity
plan
CSMS Scope
Information
Management
Addressing Cyber Security on an organization-wide basis
can be seen like a daunting task.
Unfortunately, there is no simple cookbook for security and
there is not a one-size-fits-all set of security practices.
SAFETY LEVELS (SL)
SLs have been broken down into 3 different types:
1. Target SLs (SL-T) which are the desired level of security for a
particular system, usually determined by performing a risk
assessment.
2. Achieved SLs (SL-A) which are the actual level of security for a
particular system used to establish whether a security system is
meeting the goals.
3. Capability SLs (SL-C) which are the security levels that components or
systems (in general a subsystem) can provide when properly
configured. These levels state that a component or system can meet
the target SLs natively.
SECURITY LEVELS (SL)
IEC 62443-3-3 expands 7 Foundational
Requirements (FR) into System Requirements (SR).
Each SR has further Requirement Enhancements
(REs) for stronger security. All 7 FRs have a defined
set of 4 SLs.
SAFETY LEVELS (SL)
As defined in IEC-62443-1-1 there are a total of 7 FRs:
1. Identification and authentication control (lAC),
2. Use control (UC),
3. System integrity (SI),
4. Data confidentiality (DC),
5. Restricted data flow (RDF),
6. Timely response to events (TRE), and
7. Resource availability (RA).
FOUNDATIONAL REQUIREMENTS (FR)
These seven requirements are the
foundation for control system capability
SLs, SL-C (control system).
The IEC 62443-3-3 provides detailed
technical control System Requirements
(SRs) associated with this seven
Foundational Requirements (FRs).
SAFETY LEVELS (SL)
System integrators, product suppliers and service providers shall evaluate
whether products and services can provide the Functional Security
Capability that meets the asset owner's target security level (SL-T)
requirements.
SECURITY LEVELS SYSTEM REQUIREMENTS
As with the assignment of SL-Ts, the applicability of individual control system
requirements (SRs) and Requirement Enhancements (REs) needs to be
based on an asset owner's security policies, procedures and risk assessment
in the context of their specific site.
SAFETY LEVELS (SL)EXAMPLES OF SL SYSTEM REQUIREMENTS
SRs and REs SL 1 SL 2 SL 3 SL 4
FR 1 - Identification and authentication control (IAC)
SR 1.1 -Human user identification and authentication X X X X
RE (1) Unique identification and authentication X X X
RE (2) Multifactor authentication for untrusted networks X X
RE (3) Multifactor authentication for all networks X
SR 1.2 - Software process and device identification and authentication X X X
RE (1) Unique identification and authentication X X
SR 1.3- Account management X X X X
RE (1) Unified account management X X
SR 1.4 - Identifier management X X X X
SR 1.5 - Authenticator management X X X X
RE (1) Hardware security for software process identity credentials X X
SAFETY LEVELS (SL)
The IEC 62443-4-1 provides a framework to address a secure by
design, approach to defense-in-depth designing, maintaining and
retiring products.
EQUIPMENT SECURITY LIFECYCLE AND EVALUATION TECHNIQUES
Security Management
Security guidelines
Specification of security
requirements
Security V&V
testing
Secure Implementation
Security by design
Defense – In –Depht
StrategyThe framework is composed by 8 practices.
The standard defines the requirements to align the development
process with the elevated security needs of product users of IACS.
SAFETY LEVELS (SL)
• Practice 1 – Security management
• Practice 2 – Specification of security requirements
• Practice 3 – Secure by design
• Practice 4 – Secure implementation
• Practice 5 – Security verification and validation testing
• Practice 6 – Management of security-related issues
• Practice 7 – Security update management
• Practice 8 – Security guidelines
EQUIPMENT SECURITY LIFECYCLE AND EVALUATION TECHNIQUES
SAFETY LEVELS (SL)
• Component Requirements (CR)
• Software Application Requirements (SAR)
• Embedded Device Requirements (EDR)
• Host Device Requirements (HDR)
• Network Device Requirements (NDR)
TECHNICAL SECURITY REQUIREMENTS FOR IACS COMPONENTS
MAINTAIN AND IMPROVING THE CSMS
The last category is the monitoring and improving the CSMS.
ASSESS
IMPLEMENTMAINTAIN
This category is important to ensure the safety
performance along the entire system life.
Security policy,
organization and
awareness
Selected security
countermeasuresImplementation
Risk Analysis
Monitoring & Improving
Review, Improve and
Maintain the CSMSConformance
Addressing risk with the CSMS
THANK YOU!
H-ON ConsultingPrato | Viadana | Houston | Glasgow
Tel. +39 0574 870 800 [email protected] www.h-on.it
Follow us on
Industrial Security for Digital IndustriesBologna – 03.12.2019
• siemens.com/industrial-networks• Unrestricted © Siemens 2019
Unrestricted © Siemens 2019
Digital Transformation: ne possiamo fare a meno?
Senza dimenticarsi della Security!
Massimizzare la
FlessibilitàIncrementare la
QualitàAumentare l’
EfficienzaRiduzione dei
Costi
Unrestricted © Siemens 2019
Sta cambiando il modo di lavorare …
Dalla produzione tradizionale… …alla produzione IoT-enabled
Unrestricted © Siemens 2019
Edge e IoT mettono a nudo i limiti delle architetturetradizionali…
Maggiore comunicazione = Più complessità da gestire!
Office (IT)
Field
Control
Enterprise
Management
Produzione (OT) Operator
Interoperability
Digital Connectivity
Oggetti Smart / “Things”
Modelli di Business
Applicazioni
Piattaforme
Networking e Security
Key Innovations
Ind
us
tria
l 5
G
5G
Clo
ud
Co
nn
ect
TS
N
TSN
Industrial Security
Ide
nti
fic
ati
on
sys
tem
s
Ind
us
tria
l
Co
mm
un
ica
tio
n
Ne
two
rks
Re
al –
Tim
e
Lo
ca
tin
g
Sys
tem
s
Ne
two
rk M
an
ag
em
en
t
Le reti industriali sono sicure?
Soluzioni Siemens per l’Industrial Security
Unrestricted © Siemens 2019
April 2019Page 65
Unrestricted © Siemens 2019
Industrial
Security
Non tutti gli oggetti dellaproduzione sono nati “Sicuri”!
Impianti obsoleti ma che devonofunzionare!
E gli attacchi si fanno sempre + sofisticati!
Industrial Security vs IT Security
https://www.shodan.io/
Unrestricted © Siemens 2019
• Divieto utilizzo ModbusTCP
• Mandatorio utilizzo switch managed
• Network HardeningPL 1
• OPC UA
• Scalance XC200 e superiori
• Production Backbone
PL 2• Firewall con Scalance S
• Sinec NMS
• Mandatoria la separazione fisica delle reti
• Mandatorio un sistema di gestione dei dispositivi e
l’inventory
• …
PL 3• Tracciamento automatico delle attività di logging e security
per identificare eventi anomali
• …
• Syslog e/o SIEM
• Industrial Anomaly Detection
PL 4• Filtering dei pacchetti a livello applicativo
• …
• Next Generation Firewall
• Intrusion Prevention System
Soluzioni Siemens in funzione del PL
Unrestricted © Siemens 2019
IEC 62443
Plant Security
Network Security
System Integrity
Defense in Depth
Unrestricted © Siemens 2019
Cloud Connect
Enterprise
Network
Production
Backbone
Production
Cell
Core
Layer
Industrial
Network
La Security parte da una corretta architettura di Rete
Industrial Data Center
Backbone
DMZ
Aggregation 1 Aggregation 2 Aggregation n
Syrup Handler Dosing
Syrup Room
Blow Molder Filler Packer
Carbonated Soft Drink PET Line
Filling/Packing
Functional Safety
TIA
Mobile Applications
IoT Connectivity
Network Manage-ment
Remote Communi-cation
Network Security
Process
Unrestricted © Siemens 2019
Factory Automation
Pro-duction 4
Production 3Production 2Production 1
DMZ
Office Network
Plant
Security
Network
Security
System
Integrity
• Physical protection• Security management• Security operation center
Cell 1 Cell 2
Industrial Security
Approccio ”Olistico” alla Security
Network Hardening
Production Backbone
Unrestricted © Siemens 2019
Plant Security
Industrial Security Check
Industrial Network Check
Assessment IEC62443
Risk e Vulnerability Assessment
Vulnerability Risk score
Flat network architecture/No DMZ available
x.x
Flat network architecture/No network segmentation
x.x
Unsecure/Not controlled remote activities
x.x
No system hardening/Unneeded applications and services installed
x.x
Unpatched operating system x.x
Obsolete Antivirus database x.x
Windows firewall not active x.x
Uncontrolled USB interfaces x.x
Red (7.5 – 10) = Unaccaptable risk; Urgent action is necessary
Orange (5 – 7.5) = Unaccaptable risk; Acrtion is required
Yellow (2.5 – 5) = Accaptable risk; Subject to management approval
Green (0 – 2.5) = Accaptable risk; No action required
Unrestricted © Siemens 2019
Asset Inventory
e IAD/IDS
Situazione attuale:
Non si conoscono tutti i dispositivipresenti negli impianti
Monitoraggio continuo della rete
Avviso in caso di attacchi e anomalie (interni ed esterni)
Unrestricted © Siemens 2019
Industrial
Security
Solution
Ruggedcom RX1500 + APE
Software di terze parti certificati con funzionalità
quali:• Anomaly Based Intrusion Detection System
• Next Generation Firewalls
https://new.siemens.com/global/en/products/automation/industrial-
communication/rugged-communications/technology-highlights/cybersecurity.html
Soluzione flessibile che va a coprirele esigenze del mercato unendoHW e SW certificati
Soluzione di Automated Network Assessments
Non è la panacea di tutti i mali: la rete deve essere stabile!
Unrestricted © Siemens 2019
Network
Security
GO MANAGED!
Ridondanza
Usare Password
Usare VLAN
Abilitare ACL
Limitare Broadcast (DoS)
Disabilitare porte non utilizzate
Loop Detection
Abilitare SNMP V3
Unrestricted © Siemens 2019
Network
Security
Celle di produzione “protette” tramite Firewall Scalance S
Teleassistenza
Integrazione IT e OT
OT Network
IT Network
Unrestricted © Siemens 2019
Control Center
Machine 1
Machine 2
Machine 3
Office Factory
Factory A
Secure RemoteAccess
Con Sinema Remote Connect
Accesso efficiente a impianti, macchine e applicazioni mobili
Connessione sicura e flessibile alle varie infrastrutture dei clientiSoluzioni versatili alle varie esigenze!
Unrestricted © Siemens 2019
Macchina #1
Macchina #N
OT Network
IT Network
DMZ
Firewall
IT/OT
VPN Tunnel
External
Firewall
esterno
Mobile User
Remote Desktop Session
Scalance SOpen VPN Tunnel
Ethernet
Engineering
Station
Sinema RC
Server
Remote Desktop
Sinema RC Client
TIA
ES Ring
Protection CellProduction
Backbone
Scalance S
Architettura
Unrestricted © Siemens 2019
Network
Monitoring
Con SINEC NMS
Massima trasparenza di tutta la rete industriale
Riduzione dei fermi di rete non preventivati
Configurazione dell’intera rete tramite policies (fino a 12500 dispositivi)
Unrestricted © Siemens 2019
System
Integrity
Controllori con funzionalità di sicurezza integrate
• OPC UA• SSL/TLS• Protezione Accesso• Protezione Know-how• Protezione Copia• Firma digitale
Unrestricted © Siemens 2019
“Le reti industriali sono un tema trasversale. (.....) Siemens ci ha supportato -attraverso corsi di formazione iniziale e poi durante la pianificazione dettagliata, la progettazione e la prima messa in servizio. Questo ci ha permesso di approfondire e ampliare il nostro know-ledge su temi come la sicurezza - e ora siamo in grado di amministrare la rete da soli..”
October 2019Page 82 V2.0
– Sven Ostertag, Plant Engineer,Simon Group
Unrestricted © Siemens 2019
“Con una tecnologia di rete ad alte prestazioni e la competenza di tutte le persone coinvolte, abbiamo raggiunto i nostri obiettivi e implementato una rete di produzione veloce, protetta dall'accesso, a prova di guasti e quindi altamente disponibile..”
October 2019Page 83
Holger Wiedel, Managing Directorof HWI IT
V2.0
Unrestricted © Siemens 2019
Marcello ScalfiSales Specialist
Industrial Networks & SecuritySiemens Spa
Via Vipiteno, 420128 – Milano
mailto: [email protected]
THANK YOU!
H-ON ConsultingPrato | Viadana | Houston | Glasgow
Tel. +39 0574 870 800 [email protected] www.h-on.it
Follow us on