Publicidad

CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e criptografia de comunicações em ambientes industriais

Diretor Executivo en TI Safe
11 de Jul de 2022
Publicidad

Más contenido relacionado

Similar a CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e criptografia de comunicações em ambientes industriais(20)

Más de TI Safe(20)

Publicidad

CLASS 2022 - Abilio Franco e Bryan Rivera (Thales) - Privacidade de dados e criptografia de comunicações em ambientes industriais

  1. 1 SecuringCriticalInfrastructure whileEnabling Innovation, Transformation,and Resiliency
  2. 2 From the Bottom of the Oceans… to the Depths of Space & Cyberspace Over 80,000 employees 68 Countries Global presence 1bn € Self-funded R&D* *Does not include externally financed R&D Sales in 2019 19bn € € Digital Identity and Security Defence and Security Aerospace Space z Ground Transportation Thales Global Business Areas #1 Worldwide in data protection #1 Worldwide in air traffic management #2 Worldwide in civil satellite systems #2 Worldwide in rail signaling #2 Worldwide in inflight entertainment #3 Worldwide in commercial avionics #1 European provider of advanced sensors #1 Worldwide in safe & smart airport solutions
  3. 3 World Leader in Data Protection 130+ PARTNERS PARTNERSHIPS WITH LEADING PROVIDERS OF CLOUD COMPUTING, DIGITAL PAYMENTS AND MORE DATA PROTECTION FOR 21NATO COUNTRIES PROTECTION OF THE WORLD’S BANKING TRANSACTIONS 80% SECURITY FOR 19OF THE 20 LARGEST BANKS YEARS OF SECURING THE WORLD’S MOST SENSTIVE DATA DEEP EXPERTISE AND TRACK RECORD IN APPLIED CRYPTOGRAPHY 40+ SECURITY FOR 4OF THE 5 LARGEST ENERGY COMPANIES LONGSTANDING HISTORY OF INDUSTRY CERTIFICATIONS AND VALIDATION
  4. 4 Thales Group Open An Unrivalled Data Protection Portfolio for Encrypting Everything The Market Leading Data Encryption Products in Support of your Data Security Strategy payShield HSM Luna Network HSM Thales Cloud HSM On Demand #1 #1 #1 Payment HSMs General Purpose HSMs Cloud HSMs #1 Key Management #1Data Encryption Thales CN Series High-Speed Network Encryptors #1Network Encryption Thales CV1000 Virtual Encryptor CipherTrust Data Security Platform
  5. 5 The nextgenerationof critical infrastructure relies on innovation Technological innovation is driving the next generation of critical infrastructure, allowing enterprises to improve service, optimize operations, and ultimately deliver better value to stakeholders Analyze Optimize Deliver Analyze data in big data repositories and leverage artificial intelligence (AI) to power better decision making. Optimize operations by acting on insights quickly using all digital controls to manage distributed infrastructure such as “Smart Grids”. Deliver on commitments to customers with digital customer experience, better reliability, lower cost, and adoption of renewables. Gather Communicate Aggregate Gather valuable information through sensors, cameras, and drones throughout the infrastructure footprint. Communicate data in real time through IoT and other connected systems. Aggregate data in central management consoles to automate remote production or distribution facilities.
  6. 6 Utilities and energy industries advance digital transformation Critical infrastructure sectors, such as utilities and energy, are adopting new platforms and environments at a fast pace, transforming the capabilities of both their Information Technology (IT) and Operational Technology (OT) platforms. 1: ReportLinker.com: IoT in Utilities Market by Component, Application, Region - Global Forecast to 2024 2: Power-Technology.com: Big data and modelling data: Encoord on data in energy 3: ReportLinker.com: Global Artificial Intelligence (AI) in Energy Market: Focus on Product Type, Industry Applications, Funding – Analysis and Forecast, 2019-2024 4: DailyEnergyInsiderr.com: Utilities increasingly turn to cloud software, despite security concerns Spending on Internet ofThings (IoT) Big Data analytics Spending on Internet of Things (IoT) in the utilities sector is set to grow by 85% in five years, providing connectivity and a host of new possibilities to a widely distributed infrastructure.1 The Big Data analytics market in the energy sector is expected to grow 70% by 2026, allowing enterprises to gain insights faster for better decision making and competitive advantages.2 Artificial Intelligence (AI) Cloudadoption Artificial Intelligence (AI) usage in the energy industry is expected to grow 22.5% a year in the energy sector, helping increase efficiency and automate decentralized power generation.3 Cloud adoption by utilities has grown from 45% to 71% in just 3 years, helping advance customer experience, and address the needs of data management and processing.4 85% Growth in spending on IoT in 5 years 70% Increase in Big Data spending until 2026 22.5% CAGR of AI in the energy sector 71% Adoption of cloud by utilities
  7. Ransomwareattacks The averagecost ofcyberattacks Ransomware attacks hit 649 critical infrastructure entities in US alone according to the FBI, and 80% of critical infrastructure organizations experienced a ransomware attack in 2021.7 The average cost of cyber attacks in the energy sector reached US$4.65M according Ponemon Institute cost of data breach report. The largest share of the cost is composed of lost business and reputational damage.8 7 Hacker groups target weaknesses in critical global infrastructure The devastating cyberattack that derailed a pipeline operator for a week and impacted 45% of the U.S. East Coast’s fuel supply in 2020 was an eye opener for the broader public as to the vulnerability of the critical infrastructure sector. 5: World Economic Forum: Protecting critical infrastructure from a cyber pandemic 6: Skybox Security: Cybersecurity risk underestimated by operational technology organizations 7: FBI: Ransomware hit 649 critical infrastructure entities in 2021 8: IBM & Ponemon Institute: Cost of Data Breach Report Cyberattacks OperationalTechnology(OT) Cyber attacks on critical infrastructure organizations in the US alone have increased by 300% in 2021 according to the World Economic Forum.5 Operational Technology (OT) proved a major vulnerability for the critical infrastructure sector, with 83% of organizations suffering OT cybersecurity breaches in the last 36 months.6 300% increase in cyber attacks on critical US infrastructure in 2021 83% of critical infrastructure organizations suffered OT cybersecurity breaches 649 ransomware attacks in 2021 targeted critical infrastructure in the US $4.65m was the average cost of cyber attacks in the energy sector in 2021
  8. 8 Protectingtier 1 data across Hybrid IT for global energy provider Protecting high value data on-premises and in the cloud Challenge • A highly regulated global energy company with operations in multiple countries needed to protect high-value data across multiple platforms. • Even though the customer already had advanced security, it wanted the highest level of security for its most sensitive “tier 1” data to protect against not only external attacks, but also insider privilege abuse and government subpoenas. • The customer also needed to ensure no downtime when protecting production data. Solution • Thales CipherTrust Transparent Encryption was deployed to protect a wide variety of formats and data stores. • Granular controls allowed only specific data to be decrypted when needed by authorized users while keeping encrypted all other data, whether on-premises or in the cloud. • CipherTrust Live Data Transformation allowed the energy company to protect production data with minimum downtime. Results • Addressed Federal Energy Regulatory Commission (FERC) and GDPR regulatory requirements as well as global and regional mandates and standards. • Achieved protection in the cloud against subpoena or external and internal threats with Bring Your Own Encryption (BYOE) platform for multiple cloud instances. • Enabled the protection of live data without moving databases offline for critical with large and essential datasets, such as SAP Hana on premises and in the cloud. Case Study
  9. 9 Protect critical infrastructure communicationsfor major energy operator End-to-end high-speed encryption for critical data in motion during pandemic Challenge • A major UK energy operator needed to connect to other utilities via the National Grid Network. • Data within the network is of critical national importance and mandates stipulate that the highest levels of security be deployed. • High performance end-to-end encryption of data in motion was required to ensure data was secure. • Deployment had to be done remotely because of the start of the COVID 19 pandemic. Solution • Thales CN6010 High Speed Encryptors were deployed by the energy operator to protect sensitive data in motion between the energy utility and the National Grid Network. • The FIPS 140-2 Level 3 and Common Criteria CN6010 provided high speed communication with the highest levels of standards-based security. Results • Protected sensitive data communicated between the utility and the network and was able to immediately detect manipulated data packets and shut down compromised transmissions. • Improved overall resilience of energy infrastructure by delivering large volumes of data at high speed for analysis and action. • Achieved quick deployment by remotely designing, delivering, and deploying the solution within 3 months even with the COVID 19 pandemic in full swing. Case Study
  10. 10 10 Business Challenges Movement of Large Volumes of Sensitive Data Dedicated Layer 2 Network infrastructure Multi-site, hub and spoke topology Physical intrusion safeguards Prevent Data Corruption or Injection Compliance Obligation and Business Continuity
  11. 11 Secure High Speed Communications Ethernet Encryption Between Datacenters Challenge: • Securing the Smart Grid • Safety, traceability & Transparency is vital to business • Risk factors identified include wire tapping and data manipulation • Enable Data Security without compromising performance and data integrity
  12. 12 Thales High Speed Encryption Thales High Speed Encryption (HSE) protect data in motion across high-speed networks. Dedicated encryption devices offering maximum security without impacting on network or application performance. Features Efficiency • Excellent TCO through a mix of network bandwidth savings, ease of management and longevity • FPGA technology for maximum operational flexibility, including use of custom encryption and in-field upgradability Security • Certified FIPS 140-2 L3, CC, NATO, UC APL • True end-to-end, authenticated encryption • State-of-the-art encryption key management Performance • Operating anywhere from 10 Mbps or 100 Gbps • Zero/Low overhead • Microsecond latency Versatility • Supports any network topology • Flexible, centralized and remote management • Support for flexible encryption at Layer 2,3 & 4 Data-in-Motion Security without Compromise
  13. 13 CV1000 CN4000 Series CN6000 Series • 100 Mbps-1 Gbps Ethernet Encryptor • Certified, low-cost, high-performance • Small form factor ideal for remote locations • Hardened virtual encryption function • Ideal for Software Defined Networks (SDN) and Server-to-Server communications • 1 to 10 Gbps Ethernet Encryptor • Rack-mountable, fully redundant robust design • Ideal for private networks and datacenter interconnects CN9000 Series • Certified mulitpoint 100Gbps encryptors • Designed for next gen datacenters and core networks HSE Products at a Glance
  14. 14 HSE for traditional networks ▌Data Center to Data Center Lowest overhead – up to 100Gbps performance Maximum security ▌SCADA/CCTV/Edge Message Integrity Micro-Second Latency ▌Core Networks Supports full mesh and hub-and-spoke environments All products interoperate
  15. 15 HSE for next generation networks ▌SD-WAN vHSE supports uCPE and VNF environments Concurrent L2/3/4 Support ▌5G Max throughput and low latency VLAN based encryption for network slicing ▌Cloud VPC-to-VPC East West Traffic
  16. 16 Transport Independent Mode by Thales High Speed Encryption Allows to Enable Encryption at Different Network Layers. From Layer 2 up to Layer 4 POLICY TOPOLOGY DESTINATION Multi-layer Encryption Topology-based, Max Load Encryption Destination Defined LAYER 2 Data Link Layer LAYER 3 Network Layer LAYER 4 Transport Layer
  17. 17 17 Transport Independent Mode Benefits Retain traffic visibility even in the presence of encryption Simpler troubleshooting with tunnel free encryption Works on MPLS networks with Carrier/ISP managed CE routers. The flexibility to encrypt where it most makes sense
  18. 18 Crypto Agility – Control and future proof ▌User Control User establishes security policy Full control of keys; lifecycle management Bring your own – Curves, Entropy, AES Modifications Supports Zero Trust architecture ▌Field programmable Field updates w/o performance degradation Post-Quantum Crypto (PQC) Support ▌Separation of Duties Outperforms legacy solutions (i.e. IPSec and MACsec) Extends life of encryption solution and other network elements (routers/switches) Quantum Resistant Algorithms Choice of algorithms Support for customer curves and entropy Quantum-ready (compatible with QKD) Upgradable Ciphers Quantum Entropy sources Hybrid Quantum/Cl assical Certificates In-field programmable FPGA encryption engine
  19. 19 Live Testing – HSE hardware vs. IPsec hardware Measured Throughput (1427 Frame) Toronto to Quebec City through wired ENCQR 5G Transport Core
  20. 20 Packet Comparisons – IPsec vs. Thales HSE Thales AES-256 Encryption Over IP +28 Bytes IP Packet in Ethernet Frame IPsec ESP-AES-256 ESP-SHHA-HMAC +76 Bytes ORIGINAL UNSECURED PACKET ORIGINAL PACKET WITH IPSEC ORIGINAL PACKET with Thales HSE Encryption Difference between Original Packet and IPsec Diff between orig. & Thales DA SA S- tag E- Ty pe IP-Header UDP Header RTP Header UNENCRYPTED PAYLOAD FCS GCM AUTH DA SA S- tag E- Ty pe IP-Header UDP Header RTP Header ENCRYPTED PAYLOAD FCS SHIM Encrypted PAYLOAD DA SA S- tag E- Ty pe IP Tunnel Header ESP Header IP GRE Header IP-Header UDP Header RTP Header ENCRYPTED PAYLOAD FCS ESP Pad and Timer ICV ESP-AES IV Improved Performance & Better Security Common Transport Overhead Additional Security Overhead Data Payload
  21. 21 The Thales HSE Difference – Better Security, Better Performance IPSEC Thales HSE Data Rate through 1Gbps Link 255 Mbps 983 Mbps Average Network Efficiency 45% 93% Average Latency 4.0 MILLI seconds 40 MICRO seconds Average Jitter 15 Microseconds 0 FIPS Certification YES YES Common Criteria Certified YES YES AES 256 Algorithms YES YES Control over Key Material NO YES Quantum Safe NO YES Better Performance Better Security
  22. 22 22 Key Thales HSE Benefits Maximum Security Zero Impact on Network Performance Prevents Injection of Rogue Data Physical Intrusion Safeguards – Tamper Resistant Hardware Scalable and Interoperable Ease of Deployment and Management Versatile, in-field Encryption Low Total Cost of Ownership
Publicidad