22
#RSAC SESSION ID: Francis Cianfrocca Bryce Barnes A Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect, Manufacturing & Energy Cisco @Cisco Founder & CEO Bayshore Networks @BayshoreNet @cianfrocca 2015: Managing OT in a Digital Business

SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

  • Upload
    lamdang

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

SESSION ID:

Francis Cianfrocca Bryce Barnes

A Case Study for Building Cybersecurity Policies for Industrial Robots

ECO-F03

IoT Solutions Architect, Manufacturing & Energy

Cisco

@Cisco

Founder & CEO

Bayshore Networks

@BayshoreNet @cianfrocca 2015: Managing OT in a Digital Business

Page 2: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC What IT Professionals Need to Know About OT Security

A new reality for industrial enterprises

Data capture from OT (Operational Technology) environments

Operational and SCADA visibility

Predictive analytics

Continual process optimization

2

Page 3: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Why It Matters

A competitive advantage:

Intelligent capture,

Aggregation,

Inspection, and

Analysis

It’s necessary for survival

3

Page 4: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Why It’s Hard

Security

Security

Security

4

Page 5: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

What’s Hard About OT Security

It’s less about CIA

It’s more about Availability, Uptime and Safety

You can’t just shut down or update machines to remediate security

problems

5

Page 6: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

OT Security Is Fundamentally Different

A holistic approach is needed

Point solutions are not the answer

Visibility (thru authentication and authorization) plus content

inspection

Holistic policy frameworks

Manageability at scale

Pervasive enforcement

6

Page 7: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

A Broader View for Enterprise IT

Computers, apps and networks are managed by IT

Arrgh! Who will help me figure this out?

As assets within Information Security, computers, apps and networks

are managed by IT

As assets within an Operations Center, their productivity efficiencies

and use, computers, apps and networks are managed by IT

How are they to be reconciled/converged?

7

Page 8: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Toward a Solution

IT and OT people need to be deeply conscious of security

8

Page 9: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Experience and Learnings

We’ll present an extended example

Discrete manufacturing

The general problems are broadly

applicable

9

Page 10: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

The Business Driver

Predictive analytics

A classic Industrial Internet application:

Cuts production downtime

Provides secure remote access

Cuts maintenance costs

10

Page 11: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Here’s the Architecture

11

Page 12: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

The Technical Objective

Transmit fine-grained SCADA telemetry to a cloud-based

application

Permit intermittent access by remote access service personnel

12

Page 13: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

The Security Problems

Requires a new integration between IT and OT networks

13

Page 14: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Industrial Networking Is Different

Transmit identity and contextual-based access controls

Enforcing who, what, where and their role

Enforce content-based policy constraints

14

Page 15: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

The Security Risks

Bad things can happen, particularly if PLCs (Programmable Logic

Controllers) or control loops or machines are written to.

15

Page 16: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

16

Fine- grained, contextually aware access control functions.

Tags

Tags Tag Propagation

Here’s the Solution Architecture

Page 17: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Why It Works

Unsafe transactions are blocked and machine access is restricted

to specific user roles

17

Page 18: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Holistic Policy

Many policy frameworks are possible, but you just need one.

18

Page 19: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

How It Helps IT People

Holistic management

Solves the scale problem

New, OT-aware security products fill the knowledge gap

19

Page 20: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

How It Helps OT People

Addresses the business driver.

Presents minimal risk to availability and uptime.

The ideal solution bridges IT and OT.

20

Page 21: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

How You Can Use This

The basic technique in OT security is to maintain the aspects of

closed system while permitting communications.

This means that identity-based security and encryption are

inadequate, because identity-based controls are inadequate.

Network-based controls are challenging in the OT space.

Content-based controls are required to prevent unsafe operations.

All three are needed for a holistic solution.

21

Page 22: SESSION ID: ECO-F03 A Case Study for Building ... · PDF fileA Case Study for Building Cybersecurity Policies for Industrial Robots ECO-F03 IoT Solutions Architect ... 2015: Managing

#RSAC

Next week you should:

Schedule an IT/OT planning meeting to get ahead of your organization’s

industrial IoT security questions.

In the first three months following this presentation you should:

Identify the roles of IT and OT with regards to your organization’s

cybersecurity strategy.

Within six months you should:

Select a cybersecurity solution which allows proactive operational, security

and safety policy to be set according to your organization’s needs

Drive an implementation project to protect your industrial infrastructure.

22

Apply What You Have Learned Today