cybersecurity in manufacturing operations - map your show
TRANSCRIPT
Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Cybersecurity in Manufacturing Operations
Anthony BakerPortfolio Manager, CybersecurityOctober 16th, 2018
3Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
IMPROVED TIME TO MARKET
REDUCTION IN CAPITAL EXPENDITURES
30% 10%REDUCTION IN INVENTORY
IMPROVED PRODUCTIVITY
30% 4%
4Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Threat Vectors
DMZ
Email, Intranet, Business Planning & Logistics Network
IT Network
OT Network
ICS Supply Chain
wwwSIEM/SOC Servers
Remote Maintenance
SCADAServer HistorianHMI
PLC
Pump
EngineeringStation
OperatorWork Station
PLC
Actuator
PLC
Valve
PLC
Sensor
On-Site Maintenance
Direct Attackon Plant Network
Direct Attack via IT Network
USB Indirect Attack
(Compromised VPN) (Compromised Device)
VPN DeviceExternal
Adversaries
Insider Threat
5Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Insiders Cyber CriminalsHacktivistsNation States Terrorists
Threat Actors
6Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Evolving Threats
2011
-201
7
2007
-201
4
2016
-201
7
2017
-201
8
INCREASEDRISK
7Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
IT/OT Convergence
Lack of comprehensive Asset Inventory
Integration of new technologies
Integrate: customer demand, supply chain and industrial processes
Inflexibility
Low Adoption of Risk Management Processes
Shadow/Stealth IT Lack of tools to manage
Infrastructure Too Much Data, Lack of
Actionable Information
Skills Gap Vulnerability
Security is an after thought Aging Industrial Control
Systems and Protocols Lack of proper policies and
procedures Evolving Industrial Security
Standards
Dearth of qualified personnel 1
Achieving productivity goals
Lack of staffing to expand operations 2
(1) ARC Supplier Provided Automation Services(2) Aberdeen Group
Challenges Facing Industrial Infrastructure
9Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
BEFORE DURING AFTER
IDENTIFY DETECTPROTECT RECOVERRESPOND
Attack Continuum
10Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Compliance & StandardsCertified Products, Architectures and Solution Delivery
ISA/IEC 62443: Series of standards that define procedures for implementing electronically secure Industrial Automation and Control Systems (IACS).
Applies to those responsible for designing, manufacturing, implementing, or managing industrial control systems:
End-users (i.e. asset owner)
System integrators
Security practitioners
ICS product/systems vendors*Equivalence to ISO 27001 and NIST Cybersecurity Framework
12Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Rockwell Automation Cybersecurity Program Vision
12
NIST CSF
HOW WE MEASURE PROGRESS
ISO 270001 IEC 62443
SECURE OUR PRODUCTS SECURE OUR INFRASTRUCTURE SECURE OUR SOLUTIONS
Supply Chain Manufacturing InformationTechnology
Third Parties Solutions ConnectedServices
Merges andPartnerships
Third Parties ProductSecurity
Rockwell Automation Customers
To ensure that Rockwell Automation and our Connected Enterprise ecosystem are safe, secure, and resilient from the ever-changing global cybersecurity threat landscape.
13Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Risk Assessment
Cloud Governance Council
Mandatory TrainingSecure
Development Environment
Insider Risk Program
Cyber Tabletop Exercises
Product Security Office
Third Party Risk Management Program
Enabled By The Connected Enterprise
SMARTMANUFACTURING
14Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Getting StartedBasic Steps to Reduce Risk
Know your assets and their potential risk
Authentication and authorization
Implement patch management policies and procedures
Computer and mobile endpoint protection
Disaster recovery (Backup and Restore)
Raise awareness to personnel
Leverage networking to implement basic network
security capabilities
15Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
Converged Plant-wide EthernetReference Architectures
As plants invest in the modernization of their network architectures, internal and external security drivers are pushing companies to invest in pervasive security solutions beyond the traditional firewall.
• Extend proven IT security technologies and processes to the OT network.
• Leverage IT competencies of existing team with tools they know and trust.
• Enable alignment between not only IT and OT, but also with solution and machine providers.
PARTNERSLEVERAGING
16Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
v vv v
PEOPLE,PROCESS &
TECHNOLOGY
StrategicAdvisor
IT/OT SecurityPractitioner
TrustedSupplier
Industry-LeadingPartners
The Rockwell Automation Integrated ArchitectureAddresses OT Cybersecurity, Leveraging a Multi-layer, Risk Based Approach
BEFORE DURING AFTER
Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC Copyright © 2018 Rockwell Automation, Inc. All Rights Reserved.PUBLIC
www.rockwellautomation.com
Enjoy the show!