cyber security - how to optimize your plant production? mark bakker.pdf · technology every day. at...
TRANSCRIPT
![Page 1: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/1.jpg)
![Page 2: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/2.jpg)
© 2013 Invensys. All Rights Reserved. The names, logos, and taglines identifying the products and services of Invensys are proprietary marks of Invensys or its subsidiaries. All third party trademarks and service marks are the proprietary marks of their respective owners.
© Invensys 04/09/13 Invensys proprietary & confidential Slide 2
Cyber Security - How to optimize your plant production?
Safety Event 2013
Mark Bakker (Sr. CSE)
05/14/13
![Page 3: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/3.jpg)
Who is Mark Bakker?
Lectures/articles:
• Safety Event (NL) – 14 May 2013
• Cyb.Sec. workshop PMA – Mar 2013
• Aandrijftechniek (NL) – Oct 2012
• Alfa Laval (S) – Sept 2011
• Rockwell (D) – June 2011
• Cyb.Sec. workshop PMA – Mar 2011
Memberships:
Slide 3
Career:
![Page 4: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/4.jpg)
1 What is the impact of Cyber Crime?
Slide 4
![Page 5: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/5.jpg)
Cisco Confidential © 2012 Cisco and/or its affiliates. All rights reserved. 5
“Our lives are becoming more and more connected to
technology every day. At the same time, the threat to our
information systems from hackers and bad actors is increasing just as rapidly.”
National Security Agency, December 2010
![Page 6: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/6.jpg)
Threats are nearer than we expect
1. March 2000, Australia - raw sewage spilled out into environment
2. January 2003, USA – First energy (OH): Slammer worm
3. January 2008, Poland – 4 trams in Lodz got off track
4. January 2009, USA – Carrell Memorial Hospital hacked
5. December 2010, USA – MasterCard website down by DoS
6. March 2011, USA – RSA: Hackers stole security data
7. April 2011, JPN – SONY: Hackers stole data from gaming site
8. November 2011, WW – Duqu virus destroyed Word files
9. August 2012, NL – “Dorifel” malware infected >3000 PCs in NL
Slide 6
![Page 7: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/7.jpg)
Virus 2.0 – ex. 1: Stuxnet
Iran, December 2010
• Stuxnet is a sophisticated worm that
selectively targets ICS from Siemens
• Sabotage - Natanz
Slide 7
![Page 8: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/8.jpg)
Virus 2.0 – ex. 2: Shamoon
Saudi Arabia & Quatar, August 2012
• Modular computer virus
• Windows OS
• Cyber espionage – energy sector
• Middle-East focus
• 30,000 pcs infected
• 1 week restoring services
Slide 8
![Page 9: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/9.jpg)
Critical National Infrastructure
Slide 9
![Page 10: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/10.jpg)
Cyber Security Agency - NL
• Information Center Cybercrime
(NCSC) – part of TNO
• National Trend Report Cybercrime:
– Process Automation is more at risk
Slide 10
Loss to cyber crime in NL:
2010: $ 1.8b Source: security.nl
![Page 11: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/11.jpg)
Cost of cyber crime – USA only
Slide 11
![Page 12: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/12.jpg)
Cost of cyber crime – data loss
Slide 12
Ponemon Institute, 2010
![Page 13: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/13.jpg)
Do you have a Cyber Security Plan?
Slide 13
![Page 14: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/14.jpg)
• “Our production systems are completely isolated from outside access”
• “Our system is secure as it would be impossible for an outsider to understand it.”
• “We’re not a likely target. We’re not important or interesting enough to attract hackers.”
• “We’ve never had a problem: no intrusion or disruption in our production network.”
• “We can’t justify the expense and manpower.”
Objections to protect systems
![Page 15: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/15.jpg)
Pre-warning
Pro-ACT:
It is always best to take measures to
prevent the house from burning.
Re-ACT in case there is a Cyber
Security Attack:
call our Computer Incident Response
Team to reduce the impact.
Slide 15
![Page 16: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/16.jpg)
IT vs. IA
Slide 16
![Page 17: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/17.jpg)
2 Cyber Security Plan
Slide 17
![Page 18: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/18.jpg)
How to protect your systems 1
Policy & Organisation:
• Priority
• Responsibility
• Collaboration
• Software
Risk Management:
• Security Audit
• Recovery plan
• External Expertise
Slide 18
![Page 19: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/19.jpg)
How to protect your systems 2
Secure Access:
• Secure Mobility
• Secure User Identity
• Internet / Intranet
• Overall network security
Threat Protection:
• Back-up data
• Encrypt Data
Slide 19
![Page 20: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/20.jpg)
How to protect your systems 3
Monitoring & Control:
• Identify
• Information
• Membership
Slide 20
![Page 21: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/21.jpg)
The Security Challenge
How do I secure?
• Any device, anywhere
• New collaboration and social media
applications
• Data moving to the cloud
• Data center and virtualization
• Against increasing complex threats
Slide 21
![Page 22: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/22.jpg)
3 Secure Architecture
Slide 22
![Page 23: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/23.jpg)
ISA-99 Guidelines
Security for Industrial
Automation and Control
Systems
Establishing an IACS Security
Program
Slide 23
![Page 24: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/24.jpg)
Guidelines
Typical architecture
for Security for
Industrial Automation
and Control Systems
Slide 24
AW
Factory Application Servers • SCADA/HMI • Historian • AssetCentre • Transaction Manager
Factory Services Platform • Directory • Security/Audit
Data Servers
Gbps Link for Failover Detection
Firewall (Active)
Firewall (Standby)
DIO
Levels 0–2
HMI
Cell/Area #1 Redundant Star Topology Flex Links Resiliency
Cell/Area #3 Bus/Star Topology
Cell/Area Zones
Demilitarized Zone (DMZ)
Demilitarized Zone (DMZ)
Enterprise Zone Levels 4 and 5
Enterays Layer 2 Access Switch
Switch
Manufacturing Zone Site Manufacturing
Operations and Control Level 3
Remote Access Server
Firewall
Patch Management Terminal Services Application Mirror AV Server
ERP, Email,
Wide Area Network (WAN)
Network Services • DNS, DHCP, syslog server • Network and security mgmt
Drive
Controller
HMI
DIO
Controller
Drive
Controller
Drive
HMI
Cell/Area #2 Ring Topology Resilient Ethernet Protocol (REP)
DIO DIO
![Page 25: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/25.jpg)
4 Time to optimize
Slide 25
![Page 26: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/26.jpg)
Lipman Report, October 2010
“We can no longer afford to ignore the threat from these increasingly advanced governments or terrorist groups aiming to disarm us or fund their activities, to individual hackers looking for money and information.
The time for urgency is now.”
Slide 26
Invensys can help you!
![Page 27: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/27.jpg)
Q&A
Slide 27
![Page 28: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/28.jpg)
Confucious, 551 – 479BC
Slide 28
“I hear, I know.
I see, I remember.
I do, I understand.”
Thank you,
Let’s secure
![Page 29: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/29.jpg)
Our offerings
Cyber Security
Assessment
Security Architecture
And Policy Development
Cyber Security Implementation
Cyber Security Management
And Optimization
Site Security Design
System Security Design
Managed Site Security
IOM Cyber Security
Serv
ices
Ele
men
ts
So
luti
on
s
Installation & Configuration
Secure Design Implementation
Knowledge Transfer
Procedure Creation
Security Policy Creation
System Hardening System Assessment
Vulnerability Scanning
Incident Response
Security Planning Workshop
Penetration Testing
Penetration Testing
Compliance Evaluation
Managed System Security
Policy Assessment
Procedure Assessment
Site Assessment
Compliance Assessment
Vulnerability Assessment
Risk Assessment
Security Baseline testing
![Page 30: Cyber Security - How to optimize your plant production? Mark Bakker.pdf · technology every day. At the ... production network.” • “We can’t justify the expense and manpower](https://reader033.vdocument.in/reader033/viewer/2022060521/6050295884fb45058f3c8d80/html5/thumbnails/30.jpg)