SlideShare una empresa de Scribd logo
1 de 42
Keyno
te:
Moderator
Don Pearson
Chief Strategy Officer
Inductive Automation
Today’s Agenda
• Introduction to Inductive Automation & Bedrock Automation
• Security Threats
• A Security New Approach
• SCADA Security
• Public-Private Key Infrastructure
• Review of ICS & SCADA Security Best Practices
• Q&A
About Inductive Automation
• Founded in 2003
• HMI, SCADA, MES, and IIoT software
• Installations in 100 countries
• Used by 48% of Fortune 100 companies
• Over 1,700 integrators
• Working with Bedrock Automation to create the
most secure control systems possible
Learn more at: inductiveautomation.com/about
Ignition: Industrial Application Platform
One Universal Platform for SCADA, MES & IIoT:
• Unlimited licensing model
• Cross-platform compatibility
• Based on IT-standard technologies
• Scalable server-client architecture
• Web-managed
• Web-launched on desktop or mobile
• Modular configurability
• Rapid development and deployment
• Incorporated in October 2013
• A subsidiary of Maxim Integrated (Nasdaq: MXIM 1983)
• Combined 200+ man-years of automation and
semiconductor experience
• To date, 107 global patents filed with over 40 granted
• Working with Inductive Automation to create the most
secure control systems possible
Learn more at: bedrockautomation.com
About Bedrock Automation
Presenters
Chris Harlow
Product and Customer
Service Manager,
Bedrock Automation
Travis Cox
Co-Director of Sales
Engineering,
Inductive Automation
Cyber Threats to ICS and SCADA
• Stolen Credentials
• Ransomware
• Human Factors
• Social Engineering
• Root Kit Attacks
• Session Hijacking
• Counterfeiting
• DDoS Sensors/Actuators
Networks
Controllers
Client
Management
Computers
Attack Vectors
• Database attacks
• Escalated privilege exploits
• Network components/
communications hijacking
• ‘Man-in-the-middle’ attacks
• Backdoors and holes in network
perimeter (field devices)
• Attacks that access thru pins
Outcomes
• Denial of Service (DoS): crash the
SCADA server leading to shutdown
condition
• Delete SCADA server system files:
system downtime and loss of
operations
• Plant a Trojan and take complete
control of system
• Log sensitive company operational
data for criminal or competitive use
Attack Vectors and Outcomes
What You Want in a “Secure” System
The Flaw in Typical SCADA Architectures
The Flaw in Typical SCADA Architectures
The Flaw in Typical SCADA Architectures
What if Security Could Be...
Built In versus Bolted On
Then Security Would Be...
Layered and Embedded
And The Result Is...
Security that just happens!
To the Hardware Root of Trust
✓ Authenticated Control, I/O, IIoT Edge
✓ Authenticated Firmware
✓ Authenticated Control Database
✓ Authenticated Applications
✓ Authenticated Workstations
✓ Authenticated Networks
✓ Role-Based Access Authenticated
✓ Biometric Authentication
SCADA Security - Device/PLC Connections
SCADA Security - Device/PLC Connections
Secure Your Device/PLC Connections:
• Native device communication options:
- Keep on a separate, private OT network
- Network segmentation
- VLAN with encryption
- Set up routing rules
- Use an edge gateway as a bridge between device & network
• OPC UA and MQTT communication offers built-in security, and
communications can be encrypted over TLS
SCADA Security - Device/PLC Connections
SCADA Security - Rethink Your Idea of Security
• Understand that no system is inherently secure or insecure
• You cannot eliminate security risk but you can significantly mitigate it
• Focus on preventing intrusion
• Don’t only secure the ICS/SCADA platform itself – you also need to
secure all of the connections from the SCADA to devices,
databases, clients, etc.
SCADA Security - Physical Security
Implement physical security measures:
• Badges & badge readers
• Physical media controls (laptops, phones, USB keys, etc.)
• Video monitoring
• Policies and training
• Guards
SCADA Security - Operating System
Protect your OS by:
• Removing any unnecessary programs.
• Keeping OS patches & service packs up-to-date.
• Disabling remote services on Windows.
• Setting up firewalls to restrict network traffic; close all ports and
only reopen necessary ports.
• Setting up firewalls on redundant servers.
• Getting a VPN device with good multi-factor authentication if remote
access is required.
SCADA Security - Databases
SCADA Security - Databases
Protect the database connection with the SCADA software:
• Use TLS encryption if your database supports it.
• Create a separate user account with limited privileges, instead of using a
database owner account such as root or sa.
SCADA Security - Encryption
Use encryption to:
• Protect all data sent over HTTP
• Protect against snooping & session hijacking
• Protect the SCADA gateway
• Encrypt OPC UA communication
• Help secure databases that support TLS/SSL
• Secure native device communication by using with a VLAN
SCADA Security - Databases
SCADA Security - Server & Clients
SCADA Security - Authentication
Use authentication for:
• Username/password (No default passwords or sticky notes)
• User- and role-based security (Principle of Least Privilege)
• Biometrics (fingerprints, retina scans)
• Public Key Infrastructure (PKI)
• Key cards
• USB tokens
• Application security (role-based application settings/permissions)
• Database connection encryption
• OPC UA connections
SCADA Security - Roles
Security roles:
• Security is based on roles assigned to specific users
• You can create structure or hierarchy for roles (not default)
• Users can have access to many roles or none
• Be sure to think about how different roles affect the security of the project
SCADA Security - Zones
Security zones:
• Lists of gateways, computers, or IP addresses that are defined and
grouped together
• Place additional policies and restrictions on defined zones
• Provide read-only and read/write access to specified locations
• Help keep different areas of the business separate while
allowing them to interconnect
SCADA Security - Audits
Auditing:
• Record details about specific events
• Track down who did what from where
• Helpful in deterring attacks by SCADA insiders
• Use audit logs, trails, profiles
SCADA Security - Secure Standard Architecture
SCADA Security - Secure Hub & Spoke Architecture
Public-Private Key Infrastructure
How to Manage Keys
• A Cloud SaaS is deployed for managing and administering cyber keys and certificates
• User security administrator tool to define role-based access control
• Keys embedded in the controller, no need for persistent cloud connection
Securing ICS – Best Practices
Use a secure CPU with a
secure RTOS
Use physically secure controllers
Use encryption between ICS
and SCADA
Use a PKI for role based access
Sign and Encrypt ICS
application code
Use mutual authentication
between ICS and SCADA
Use ICS hardware with built in
Anomaly Detection
Ask your vendors what they’re doing
to secure their products
Securing SCADA – Best Practices
Secure PLC and device connections
Implement physical security measures
Protect the operating system
Use encryption
Use authentication
Protect the database connection
Use role-based security
Use security zones
Closing Discussion Question
To wrap up the discussion, what are your thoughts about how Inductive
Automation and Bedrock Automation can help industrial organizations
improve their security, both now and in the future?
Sept. 17-19, 2018
Today is the last day to buy early-bird
tickets at: icc.inductiveautomation.com
Jim Meisler x227
Vannessa Garcia x231
Vivian Mudge x253
IA Account Executives
Myron Hoertling x224
Shane Miller x218
Ramin Rofagha x251
Maria Chinappi x264
Kristin Azure x260
Lester Ares x214
800-266-7798 x247
Melanie Moniz
IA Director of Sales:
Guest Presenter:
Chris Harlow
Chris.Harlow@BedrockAutomation.com
Visit: BedrockAutomation.com
Call: 781.821.0280
Questions & Comments
Thank You

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

Top 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA SystemTop 10 Design & Security Tips to Elevate Your SCADA System
Top 10 Design & Security Tips to Elevate Your SCADA System
 
Design Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise ArchitecturesDesign Like a Pro: Essential Steps for Enterprise Architectures
Design Like a Pro: Essential Steps for Enterprise Architectures
 
Get More Data Into Your SCADA
Get More Data Into Your SCADAGet More Data Into Your SCADA
Get More Data Into Your SCADA
 
4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization4 Keys to Removing Friction in Your Industrial Organization
4 Keys to Removing Friction in Your Industrial Organization
 
Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016Get More Data Into Your SCADA 2016
Get More Data Into Your SCADA 2016
 
Fixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces FrustrationFixing SCADA: How Ignition Reduces Frustration
Fixing SCADA: How Ignition Reduces Frustration
 
Design Like a Pro: Planning Enterprise Solutions
Design Like a Pro: Planning Enterprise SolutionsDesign Like a Pro: Planning Enterprise Solutions
Design Like a Pro: Planning Enterprise Solutions
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
 
Design Like a Pro: Alarm Management
Design Like a Pro: Alarm ManagementDesign Like a Pro: Alarm Management
Design Like a Pro: Alarm Management
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 
Industrial Internet
Industrial InternetIndustrial Internet
Industrial Internet
 
IIOT on Variable Frequency Drives
IIOT on Variable Frequency DrivesIIOT on Variable Frequency Drives
IIOT on Variable Frequency Drives
 
Cybernetyx introduction
Cybernetyx introductionCybernetyx introduction
Cybernetyx introduction
 
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With EaseThe New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
The New Ignition v7.9 - See, Maintain, and Manage Your Enterprise With Ease
 
The Path to a Pain-Free Control System Upgrade
The Path to a Pain-Free Control System UpgradeThe Path to a Pain-Free Control System Upgrade
The Path to a Pain-Free Control System Upgrade
 
Et software brochure
Et software brochureEt software brochure
Et software brochure
 
Design Like a Pro - Best Practices For IIoT
Design Like a Pro - Best Practices For IIoTDesign Like a Pro - Best Practices For IIoT
Design Like a Pro - Best Practices For IIoT
 
Design Like a Pro: Scripting Best Practices
Design Like a Pro: Scripting Best PracticesDesign Like a Pro: Scripting Best Practices
Design Like a Pro: Scripting Best Practices
 
Bringing Digital Transformation Into Focus
Bringing Digital Transformation Into FocusBringing Digital Transformation Into Focus
Bringing Digital Transformation Into Focus
 
ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016ServiceDesk Plus Overview - Des 2016
ServiceDesk Plus Overview - Des 2016
 

Similar a Open and Secure SCADA: Efficient and Economical Control, Without the Risk

Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
Desmond Devendran
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
Amazon Web Services
 

Similar a Open and Secure SCADA: Efficient and Economical Control, Without the Risk (20)

Chapter08
Chapter08Chapter08
Chapter08
 
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
DTS Solution - Crypto Flow Segmentation addressing NESA IAF and ISO27001 comp...
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
PLNOG15: Simplifying network deployment using Autonomic networking and Plug-a...
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Cloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hackedCloak your critical industrial control systems before they get hacked
Cloak your critical industrial control systems before they get hacked
 
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...Defending Applications In the Cloud: Architecting Layered Security Solutions ...
Defending Applications In the Cloud: Architecting Layered Security Solutions ...
 
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
BIG IRON, BIG RISK? SECURING THE MAINFRAME - #MFSummit2017
 
Hybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptxHybrid - Seguridad en Contenedores v3.pptx
Hybrid - Seguridad en Contenedores v3.pptx
 
Trust No-One Architecture For Services And Data
Trust No-One Architecture For Services And DataTrust No-One Architecture For Services And Data
Trust No-One Architecture For Services And Data
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
CipherGraph Cloud VPN
CipherGraph Cloud VPNCipherGraph Cloud VPN
CipherGraph Cloud VPN
 
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
AWS Summit 2013 | India - Extend your Datacenter in the Cloud and achieve Hig...
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
Why integration is key in IoT solutions? (Sam Vanhoutte @Integrate2017)
 
Cloud security privacy- org
Cloud security  privacy- orgCloud security  privacy- org
Cloud security privacy- org
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
Social Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity RiskSocial Distance Your IBM i from Cybersecurity Risk
Social Distance Your IBM i from Cybersecurity Risk
 
IoT Integration in the Air conditioning, Heating and Refrigeration industry ...
IoT Integration in the Air conditioning, Heating and  Refrigeration industry ...IoT Integration in the Air conditioning, Heating and  Refrigeration industry ...
IoT Integration in the Air conditioning, Heating and Refrigeration industry ...
 

Más de Inductive Automation

Más de Inductive Automation (20)

De-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
De-Risk Your Digital Transformation — And Reduce Time, Cost & ComplexityDe-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
De-Risk Your Digital Transformation — And Reduce Time, Cost & Complexity
 
Overcoming Digital Transformation Pain Points
Overcoming Digital Transformation Pain PointsOvercoming Digital Transformation Pain Points
Overcoming Digital Transformation Pain Points
 
How Ignition Eases SCADA Pain Points
How Ignition Eases SCADA Pain PointsHow Ignition Eases SCADA Pain Points
How Ignition Eases SCADA Pain Points
 
New Ignition Features In Action
New Ignition Features In ActionNew Ignition Features In Action
New Ignition Features In Action
 
Solving Data Problems to Accelerate Digital Transformation.pptx
Solving Data Problems to Accelerate Digital Transformation.pptxSolving Data Problems to Accelerate Digital Transformation.pptx
Solving Data Problems to Accelerate Digital Transformation.pptx
 
Security Best Practices for Your Ignition System
Security Best Practices for Your Ignition SystemSecurity Best Practices for Your Ignition System
Security Best Practices for Your Ignition System
 
Turn Any Panel PC Into an Ignition HMI
Turn Any Panel PC Into an Ignition HMITurn Any Panel PC Into an Ignition HMI
Turn Any Panel PC Into an Ignition HMI
 
5 Mobile-Responsive Layout Strategies
5 Mobile-Responsive Layout Strategies5 Mobile-Responsive Layout Strategies
5 Mobile-Responsive Layout Strategies
 
Integrators Explore the Road Ahead
Integrators Explore the Road AheadIntegrators Explore the Road Ahead
Integrators Explore the Road Ahead
 
The Art of Displaying Industrial Data
The Art of Displaying Industrial DataThe Art of Displaying Industrial Data
The Art of Displaying Industrial Data
 
Common Project Mistakes: Visualization, Alarms, and Security
Common Project Mistakes: Visualization, Alarms, and SecurityCommon Project Mistakes: Visualization, Alarms, and Security
Common Project Mistakes: Visualization, Alarms, and Security
 
Common Project Mistakes (And How to Avoid Them)
Common Project Mistakes (And How to Avoid Them)Common Project Mistakes (And How to Avoid Them)
Common Project Mistakes (And How to Avoid Them)
 
First Steps to DevOps
First Steps to DevOpsFirst Steps to DevOps
First Steps to DevOps
 
Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era Choosing a SCADA System for the IIoT Era
Choosing a SCADA System for the IIoT Era
 
Design Like a Pro: How to Pick the Right System Architecture
Design Like a Pro: How to Pick the Right System ArchitectureDesign Like a Pro: How to Pick the Right System Architecture
Design Like a Pro: How to Pick the Right System Architecture
 
The Evolution of Industrial Visualization
The Evolution of Industrial VisualizationThe Evolution of Industrial Visualization
The Evolution of Industrial Visualization
 
Historic Opportunities: Discover the Power of Ignition's Historian
Historic Opportunities: Discover the Power of Ignition's HistorianHistoric Opportunities: Discover the Power of Ignition's Historian
Historic Opportunities: Discover the Power of Ignition's Historian
 
Unlocking Greater Efficiency: The Why and How of OEE Implementation
Unlocking Greater Efficiency: The Why and How of OEE ImplementationUnlocking Greater Efficiency: The Why and How of OEE Implementation
Unlocking Greater Efficiency: The Why and How of OEE Implementation
 
Leveraging Ignition Quick Start to Rapidly Build Real Projects
Leveraging Ignition Quick Start to Rapidly Build Real ProjectsLeveraging Ignition Quick Start to Rapidly Build Real Projects
Leveraging Ignition Quick Start to Rapidly Build Real Projects
 
Design Like a Pro: Developing & Deploying Perspective Applications as HMIs
Design Like a Pro: Developing & Deploying Perspective Applications as HMIsDesign Like a Pro: Developing & Deploying Perspective Applications as HMIs
Design Like a Pro: Developing & Deploying Perspective Applications as HMIs
 

Último

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Último (20)

Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 

Open and Secure SCADA: Efficient and Economical Control, Without the Risk

  • 2. Moderator Don Pearson Chief Strategy Officer Inductive Automation
  • 3. Today’s Agenda • Introduction to Inductive Automation & Bedrock Automation • Security Threats • A Security New Approach • SCADA Security • Public-Private Key Infrastructure • Review of ICS & SCADA Security Best Practices • Q&A
  • 4. About Inductive Automation • Founded in 2003 • HMI, SCADA, MES, and IIoT software • Installations in 100 countries • Used by 48% of Fortune 100 companies • Over 1,700 integrators • Working with Bedrock Automation to create the most secure control systems possible Learn more at: inductiveautomation.com/about
  • 5. Ignition: Industrial Application Platform One Universal Platform for SCADA, MES & IIoT: • Unlimited licensing model • Cross-platform compatibility • Based on IT-standard technologies • Scalable server-client architecture • Web-managed • Web-launched on desktop or mobile • Modular configurability • Rapid development and deployment
  • 6. • Incorporated in October 2013 • A subsidiary of Maxim Integrated (Nasdaq: MXIM 1983) • Combined 200+ man-years of automation and semiconductor experience • To date, 107 global patents filed with over 40 granted • Working with Inductive Automation to create the most secure control systems possible Learn more at: bedrockautomation.com About Bedrock Automation
  • 7. Presenters Chris Harlow Product and Customer Service Manager, Bedrock Automation Travis Cox Co-Director of Sales Engineering, Inductive Automation
  • 8. Cyber Threats to ICS and SCADA • Stolen Credentials • Ransomware • Human Factors • Social Engineering • Root Kit Attacks • Session Hijacking • Counterfeiting • DDoS Sensors/Actuators Networks Controllers Client Management Computers
  • 9. Attack Vectors • Database attacks • Escalated privilege exploits • Network components/ communications hijacking • ‘Man-in-the-middle’ attacks • Backdoors and holes in network perimeter (field devices) • Attacks that access thru pins Outcomes • Denial of Service (DoS): crash the SCADA server leading to shutdown condition • Delete SCADA server system files: system downtime and loss of operations • Plant a Trojan and take complete control of system • Log sensitive company operational data for criminal or competitive use Attack Vectors and Outcomes
  • 10. What You Want in a “Secure” System
  • 11. The Flaw in Typical SCADA Architectures
  • 12. The Flaw in Typical SCADA Architectures
  • 13. The Flaw in Typical SCADA Architectures
  • 14. What if Security Could Be... Built In versus Bolted On
  • 15. Then Security Would Be... Layered and Embedded
  • 16. And The Result Is... Security that just happens! To the Hardware Root of Trust ✓ Authenticated Control, I/O, IIoT Edge ✓ Authenticated Firmware ✓ Authenticated Control Database ✓ Authenticated Applications ✓ Authenticated Workstations ✓ Authenticated Networks ✓ Role-Based Access Authenticated ✓ Biometric Authentication
  • 17. SCADA Security - Device/PLC Connections
  • 18. SCADA Security - Device/PLC Connections Secure Your Device/PLC Connections: • Native device communication options: - Keep on a separate, private OT network - Network segmentation - VLAN with encryption - Set up routing rules - Use an edge gateway as a bridge between device & network • OPC UA and MQTT communication offers built-in security, and communications can be encrypted over TLS
  • 19. SCADA Security - Device/PLC Connections
  • 20. SCADA Security - Rethink Your Idea of Security • Understand that no system is inherently secure or insecure • You cannot eliminate security risk but you can significantly mitigate it • Focus on preventing intrusion • Don’t only secure the ICS/SCADA platform itself – you also need to secure all of the connections from the SCADA to devices, databases, clients, etc.
  • 21. SCADA Security - Physical Security Implement physical security measures: • Badges & badge readers • Physical media controls (laptops, phones, USB keys, etc.) • Video monitoring • Policies and training • Guards
  • 22. SCADA Security - Operating System Protect your OS by: • Removing any unnecessary programs. • Keeping OS patches & service packs up-to-date. • Disabling remote services on Windows. • Setting up firewalls to restrict network traffic; close all ports and only reopen necessary ports. • Setting up firewalls on redundant servers. • Getting a VPN device with good multi-factor authentication if remote access is required.
  • 23. SCADA Security - Databases
  • 24. SCADA Security - Databases Protect the database connection with the SCADA software: • Use TLS encryption if your database supports it. • Create a separate user account with limited privileges, instead of using a database owner account such as root or sa.
  • 25. SCADA Security - Encryption Use encryption to: • Protect all data sent over HTTP • Protect against snooping & session hijacking • Protect the SCADA gateway • Encrypt OPC UA communication • Help secure databases that support TLS/SSL • Secure native device communication by using with a VLAN
  • 26. SCADA Security - Databases
  • 27. SCADA Security - Server & Clients
  • 28. SCADA Security - Authentication Use authentication for: • Username/password (No default passwords or sticky notes) • User- and role-based security (Principle of Least Privilege) • Biometrics (fingerprints, retina scans) • Public Key Infrastructure (PKI) • Key cards • USB tokens • Application security (role-based application settings/permissions) • Database connection encryption • OPC UA connections
  • 29. SCADA Security - Roles Security roles: • Security is based on roles assigned to specific users • You can create structure or hierarchy for roles (not default) • Users can have access to many roles or none • Be sure to think about how different roles affect the security of the project
  • 30. SCADA Security - Zones Security zones: • Lists of gateways, computers, or IP addresses that are defined and grouped together • Place additional policies and restrictions on defined zones • Provide read-only and read/write access to specified locations • Help keep different areas of the business separate while allowing them to interconnect
  • 31. SCADA Security - Audits Auditing: • Record details about specific events • Track down who did what from where • Helpful in deterring attacks by SCADA insiders • Use audit logs, trails, profiles
  • 32. SCADA Security - Secure Standard Architecture
  • 33. SCADA Security - Secure Hub & Spoke Architecture
  • 35. How to Manage Keys • A Cloud SaaS is deployed for managing and administering cyber keys and certificates • User security administrator tool to define role-based access control • Keys embedded in the controller, no need for persistent cloud connection
  • 36. Securing ICS – Best Practices Use a secure CPU with a secure RTOS Use physically secure controllers Use encryption between ICS and SCADA Use a PKI for role based access Sign and Encrypt ICS application code Use mutual authentication between ICS and SCADA Use ICS hardware with built in Anomaly Detection Ask your vendors what they’re doing to secure their products
  • 37. Securing SCADA – Best Practices Secure PLC and device connections Implement physical security measures Protect the operating system Use encryption Use authentication Protect the database connection Use role-based security Use security zones
  • 38. Closing Discussion Question To wrap up the discussion, what are your thoughts about how Inductive Automation and Bedrock Automation can help industrial organizations improve their security, both now and in the future?
  • 39.
  • 40. Sept. 17-19, 2018 Today is the last day to buy early-bird tickets at: icc.inductiveautomation.com
  • 41. Jim Meisler x227 Vannessa Garcia x231 Vivian Mudge x253 IA Account Executives Myron Hoertling x224 Shane Miller x218 Ramin Rofagha x251 Maria Chinappi x264 Kristin Azure x260 Lester Ares x214 800-266-7798 x247 Melanie Moniz IA Director of Sales: Guest Presenter: Chris Harlow Chris.Harlow@BedrockAutomation.com Visit: BedrockAutomation.com Call: 781.821.0280 Questions & Comments