SlideShare una empresa de Scribd logo
1 de 36
Operational Technology (OT)
Network Security Challenges
and Solutions
© Global Knowledge Training LLC. All rights reserved. Page 2
Webinar Agenda
• Operational Technology (OT) Networks Overview
• The Evolution of Operational Technology (OT) Networks in the Enterprise
• Risks associated with OT Networks
• Challenges faced with OT Networks
• Technology Solutions and Strategies for Securing OT Networks
• ACME Manufacturing Inc. - Mini Case Study
© Global Knowledge Training LLC. All rights reserved. Page 3
Operational Technology (OT) Networks Overview
What is an Operational Technology (OT) Network?
In order to have a meaningful discussion about OT Networks it is important to clearly
define terminology related to OT Networks.
© Global Knowledge Training LLC. All rights reserved. Page 4
Operational Technology (OT) Networks Overview
Gartner Defineitions:
Operational Technology (OT)
Hardware and software that detects or causes a change through the direct
monitoring and/or control of physical devices, processes and events in the
enterprise.
Information Technology (IT)
This is the common term for the entire spectrum of technologies for
information processing, including software, hardware, communications
technologies and related services. In general, IT does not include embedded
technologies that do not generate data for enterprise use.
Source: https://www.gartner.com
© Global Knowledge Training LLC. All rights reserved. Page 5
Operational Technology (OT) Networks Overview
Although OT is a generic term that is often used differently depending on the
industry / organization, other terms that fall under OT include:
• Industrial Control Systems (ICS)
• Industrial Automation (IA)
• Process Control Networks (PCN)
• Supervisory Control and Data Acquisition (SCADA)
Example: SCADA is a subset of ICS and they both fall under OT. Note that
these terms are often used loosely.
© Global Knowledge Training LLC. All rights reserved. Page 6
Operational Technology (OT) Networks Overview
For the sake of this Webinar we will make the following distinctions between IT
and OT for simplicity:
• IT refers to systems that primarily deal with the Business and Administrative
processes in the Enterprise.
• OT refers to systems that are used to manage Industrial Operations as
opposed to Business and Administrative operations. Operational Systems
include production line management in Manufacturing, Mining Operations
Control, Oil & Gas monitoring etc.
© Global Knowledge Training LLC. All rights reserved. Page 7
Operational Technology (OT) Networks Overview
Internet of Things (IoT) and Industrial Internet of Things (IIoT)
• The Internet of Things (IoT) is a system / device typically embedded with
sensors, software, electronics and connectivity to allow it to perform
better by exchanging information with other connected devices, the
operator or the manufacturer. Extends Internet connectivity beyond
conventional computing platforms such as personal computers etc.
• The term Industrial Internet of Things (IIoT) refers to systems connecting
business systems with automation and control.
Just as there is sometimes a fine line between IT and IoT the same is true for
OT and IIoT.
© Global Knowledge Training LLC. All rights reserved. Page 8
Evolution of OT Networks in the Enterprise
Traditionally OT systems were siloed and were managed by teams dedicated
to the OT infrastructure.
In recent years Industrial Systems and Appliances have been brought online
in large numbers to deliver “Smart Analytics” - using Data generated from the
machines to modify and optimize the manufacturing process.
Because of the need to capture, process and integrate with Logistics and
Business Systems for enterprise use the functionality began to merge with IT.
© Global Knowledge Training LLC. All rights reserved. Page 9
Evolution of OT Networks in the Enterprise
IT and OT have always had fairly separate roles within an organization.
However, with the emergence of the Industrial Internet and the integration of
complex physical machinery with networked sensors and software, the lines
between the two teams are blurring.
© Global Knowledge Training LLC. All rights reserved. Page 10
Risks associated with OT Networks
OT Networks typically run the Critical Infrastructure that organization
depend on to produce a Product or Services.
Any impact on OT operations could be financially
devastating for an organization.
Although the same is true for IT, the impact is
greater for OT networks.
Disruptions related to these systems could also
be devastating to the supply chain of products
and services or even cause harm to patients as in
the case of the Health Care Industry; not to
mention the fallout from the publicity it generates.
© Global Knowledge Training LLC. All rights reserved. Page 11
Risks associated with OT Networks
OT Networks have a different set of requirements and challenges that the IT
Governance team must address to secure the enterprise.
Because of the inherent differences in how these
systems operate and the risk factors associated
with them, industry had drawn a clear line between
what is considered the traditional IT Network (office
support systems) and the OT Network that houses
the OT/IIoT Systems.
© Global Knowledge Training LLC. All rights reserved. Page 12
Risks associated with OT Networks
The Information Technology (IT) Governance team within an Organization
must develop a better understanding of OT Networks and must stay abreast
of threats associated with OT Environments to assure that the Organization
is protected.
Organization must put in place Processes, Procedures and Technologies to
protect the critical OT assets of the Organization.
© Global Knowledge Training LLC. All rights reserved. Page 13
Challenges faced with OT Networks
• OT Networks and Devices tend to use legacy Plant Control Systems often
running outdated Operating Systems that cannot easily be swapped out or
a custom configuration that isn’t compatible.
• Because of the High Availability of Production Schedules, it is often
difficult to stop production to upgrade these systems.
• OT System are typically upgraded when they are no longer functional for
the task at hand.
• Industrial environments tend to be more systemic where one small change
can trigger a negative domino effect that could disrupt the system.
© Global Knowledge Training LLC. All rights reserved. Page 14
Solutions & Strategies for Securing OT Networks
Traditionally OT networks have adopted various Models, Architectures and
Systems to secure the OT Infrastructure. An example is the Purdue Model
for Control Hierarchy.
© Global Knowledge Training LLC. All rights reserved. Page 15
• The Purdue Model for Control
Hierarchy is a common and well-
understood Model in the
Manufacturing Industry that
provides a Blueprint to segments
Devices and Equipment into
hierarchical functions.
• Developed in the 1990s at Purdue
University Consortium for
Computer Integrated
Manufacturing.
Solutions & Strategies for Securing OT Networks
© Global Knowledge Training LLC. All rights reserved. Page 16
Solutions & Strategies for Securing OT Networks
Models, such as the Perdue Model, are implemented using Technologies
such as Firewalls, VLAN and other tools to segment the Infrastructure into
hierarchies based on levels of operations.
• Some Manufacturers develop
Equipment and Devices designed to
specifically provide Security in the
OT space.
• Other Manufacturers have Equipment
and Devices with Dual purpose; IT
and OT Security capabilities.
© Global Knowledge Training LLC. All rights reserved. Page 17
Solutions & Strategies for Securing OT Networks
Specialized OT Security Products:
OPshield is an OT Firewall (and related tools) developed by Wurldtech, a GE-
owned Company.
• Organization specializing in Operational
Technology (OT) solutions.
• The Firewall is specifically designed to
provide protection for Industrial Controls
and Critical Infrastructure Networks.
© Global Knowledge Training LLC. All rights reserved. Page 18
Solutions & Strategies for Securing OT Networks
Cisco Products designed for OT Networks:
Cisco’s line of Industrial Switches designed for OT Networks.
Cisco Catalyst IE3300 Rugged Series
• Run Industrial Protocols such as Common
Industrial Protocol (CIP) – an Industrial
Protocol for Automation.
• Hardened for harsh Industrial Environments.
• Also provide traditional IT Technologies
such as VLANs, Port Security, 802.1x etc.
© Global Knowledge Training LLC. All rights reserved. Page 19
Solutions & Strategies for Securing OT Networks
Cisco Products designed for OT Networks:
The Cisco Industrial Network Director (IND) is a management tools built
for managing Industrial Networks.
Designed to help Operations Teams
gain full visibility into the
Automation Network for improved
system availability and increase
Overall Equipment Effectiveness
(OEE).
© Global Knowledge Training LLC. All rights reserved. Page 20
Solutions & Strategies for Securing OT Networks
Using VLANs and Firewalls for Securing OT Networks does not provide
Micro Segmentation.
A major concern for may Organizations is the impact a breach can cause to
the Manufacturing lines on the OT Network.
• A breach on a VLAN could potentially
impact the entire VLAN.
• A Breach in a Security Zone separated by a
Firewall could potentially impact the entire
Security Zone.
© Global Knowledge Training LLC. All rights reserved. Page 21
Solutions & Strategies for Securing OT Networks
Single VLAN / Multiple Cells.
© Global Knowledge Training LLC. All rights reserved. Page 22
Solutions & Strategies for Securing OT Networks
Multiple VLANs / Multiple Cells.
© Global Knowledge Training LLC. All rights reserved. Page 23
Solutions & Strategies for Securing OT Networks
Multiple VLANs / Multiple Cells (Repurposing of Equipment)
© Global Knowledge Training LLC. All rights reserved. Page 24
Solutions & Strategies for Securing OT Networks
Micro Segmentation allows VLANs and Security zones to be further
segmented to contain potential breaches.
Micro Segmentation limits the impact of the breach to a smaller
footprint should a VLAN or a Security Zone is compromised.
• Micro Segmentation solution must allow for
easy deployment of new OT Devices in the
production lines (minimal configuration).
• Micro Segmentation solution must allow for
easy repurposing of OT Devices between
production lines (minimal configuration).
© Global Knowledge Training LLC. All rights reserved. Page 25
Solutions & Strategies for Securing OT Networks
Cisco TrustSec provides the capabilities to Micro Segment OT network
providing enhanced security to compliment the security provided by VLANs
and Firewalls.
• Dynamically assigning Security Group Tags (SGTs) to
the traffic of a device that connects to the network
based on it’s identity.
• Access Policies can be implemented to limit
communication between devices with different SGTs.
© Global Knowledge Training LLC. All rights reserved. Page 26
Solutions & Strategies for Securing OT Networks
One VLAN with Multiple Cells with Security Group Tags (SGTs).
© Global Knowledge Training LLC. All rights reserved. Page 27
Solutions & Strategies for Securing OT Networks
Cisco TrustSec is implemented and managed using the Cisco Identity
Services Engine (ISE).
• When OT devices connect to the network, Cisco ISE
authenticates the devices and assigns all traffic sent
on the network by the device an SGT.
• Cisco ISE manages and distributes TrustSec policies.
• Switch, Routers and Firewalls enforce TrustSec
policies by using the SGT embedded in the traffic.
© Global Knowledge Training LLC. All rights reserved. Page 28
Solutions & Strategies for Securing OT Networks
Example of a Design based on the
Purdue Model.
© Global Knowledge Training LLC. All rights reserved. Page 29
ACME Inc. Manufacturing Inc. – Mini Case Study
ACME Inc. Manufacturing was concerned about OT Network Security.
• OT space is secured using VLANs and Firewalls only
• No Micro Segmentation in place on the OT Networks
• Cybersecurity attack could impact entire Factory
• Concerned about the risk of Intellectual Property theft as a result of a
Cybersecurity breach
© Global Knowledge Training LLC. All rights reserved. Page 30
ACME Inc. Manufacturing Inc. – Mini Case Study
ACME Inc. Manufacturing deployed Cisco TrustSec with the Identity Services
Engine (ISE) to Micro Segment their OT Networks using Security Group Tags
(SGTs) in addition to the use of VLAN and Firewall Segmentation.
Each Manufacturing Cell was completely isolated
using SGTs and device in a Cell limited to
communicating only within the Cell and to specific
Services in the DMZ.
© Global Knowledge Training LLC. All rights reserved. Page 31
ACME Inc. Manufacturing Inc. – Mini Case Study
A major challenge encountered by ACME Inc. Manufacturing is the process
of classifying a device to place it in a Manufacturing Cell / Production Line.
• Cisco ISE has the ability to dynamically profile
devices (based on device attributes) in the IT space.
• Classification for this OT requirement was based on a
“Functional Attribute” and not an Identity embedded
in the device.
• Example of “Functional Attribute” - “Heat Treat” vs.
“Coating”.
** A control device can be used in either a “Heat Treat” or “Coating” Process
and typically the Control Engineer makes the determination.
© Global Knowledge Training LLC. All rights reserved. Page 32
ACME Inc. Manufacturing Inc. – Mini Case Study
Cisco Industrial Network Director (IND) was considered for the classification
process in the design,
• Cisco IND includes a Self-Service Portal to
assign devices to a group; did not fulfil the
customer requirements.
• Customer is considering IND for managing
Cisco Industrial Ethernet (IE) Switches and
other Management functions related to the
Industrial Space.
© Global Knowledge Training LLC. All rights reserved. Page 33
ACME Inc. Manufacturing Inc. – Mini Case Study
Cisco ISE is extremely
flexible.
Can integrate with a variety of
systems through an Open
Standard interface (REST API
/ PxGrid).
Customer worked with a
Company that has an IOT
Application that was
customized for the
Classification process.
© Global Knowledge Training LLC. All rights reserved. Page 34
ACME Inc. Manufacturing Inc. – Mini Case Study
• Control Engineer uses a “Self
Service Portal” to assign an
OT device to a Cell –meets
customer requirements.
• Application was Leveraged for
visibility related to Asset
Management.
• Provides HA of Database.
Some features of the Custom Application:
© Global Knowledge Training LLC. All rights reserved. Page 35
Courses
Implementing and
Configuring Cisco Identity
Services Engine v3.0
Introduction to 802.1X
Operations for Cisco
Security Professionals
© Global Knowledge Training LLC. All rights reserved. Page 36
Learning More
GlobalKnowledge.com
For additional on-demand and live webinars,
white papers, courses, special offers and
more, visit us at…

Más contenido relacionado

Más de Global Knowledge Training

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Global Knowledge Training
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyGlobal Knowledge Training
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksGlobal Knowledge Training
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Global Knowledge Training
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationGlobal Knowledge Training
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationGlobal Knowledge Training
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?Global Knowledge Training
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success Global Knowledge Training
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementGlobal Knowledge Training
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouGlobal Knowledge Training
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityGlobal Knowledge Training
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireGlobal Knowledge Training
 

Más de Global Knowledge Training (20)

Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
Exploring the Upgrade from VMware vSphere: Install, Configure, Manage 6 5 to 6 7
 
What’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification JourneyWhat’s Next For Your Azure Certification Journey
What’s Next For Your Azure Certification Journey
 
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined NetworksCisco's Intent-Based Networking and the Journey to Software Defined Networks
Cisco's Intent-Based Networking and the Journey to Software Defined Networks
 
How to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity TeamHow to Build a Winning Cybersecurity Team
How to Build a Winning Cybersecurity Team
 
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
Why It’s Critical to Apply the Risk Management Framework to Your IT Moderniza...
 
How to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS LambdaHow to Build a Web Server with AWS Lambda
How to Build a Web Server with AWS Lambda
 
The Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your OrganizationThe Essence of DevOps: What it Can Mean for You and Your Organization
The Essence of DevOps: What it Can Mean for You and Your Organization
 
How to Migrate a Web App to AWS
How to Migrate a Web App to AWSHow to Migrate a Web App to AWS
How to Migrate a Web App to AWS
 
How to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your OrganizationHow to Make Agile Project Management Work in Your Organization
How to Make Agile Project Management Work in Your Organization
 
What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?What is Cryptojacking and How Can I Protect Myself?
What is Cryptojacking and How Can I Protect Myself?
 
How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success How the Channel Can Break Down the Barriers to Cloud Success
How the Channel Can Break Down the Barriers to Cloud Success
 
How to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration PitfallsHow to Avoid Cloud Migration Pitfalls
How to Avoid Cloud Migration Pitfalls
 
Tackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People ManagementTackling 5 Taboo Topics in Cybersecurity People Management
Tackling 5 Taboo Topics in Cybersecurity People Management
 
Using Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS ModelerUsing Apache Spark with IBM SPSS Modeler
Using Apache Spark with IBM SPSS Modeler
 
How the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts YouHow the New PMP Exam and PDU Structure Impacts You
How the New PMP Exam and PDU Structure Impacts You
 
The Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business CybersecurityThe Unpleasant Truths of Modern Business Cybersecurity
The Unpleasant Truths of Modern Business Cybersecurity
 
What's New in Windows 10
What's New in Windows 10What's New in Windows 10
What's New in Windows 10
 
Aligning IT and Business for Better Results
Aligning IT and Business for Better ResultsAligning IT and Business for Better Results
Aligning IT and Business for Better Results
 
Building Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and SourcefireBuilding Up Network Security: Intrusion Prevention and Sourcefire
Building Up Network Security: Intrusion Prevention and Sourcefire
 
Proving Project Value
Proving Project ValueProving Project Value
Proving Project Value
 

Último

Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMartaLoveguard
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa494f574xmv
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxDyna Gilbert
 

Último (20)

Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
Magic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptxMagic exist by Marta Loveguard - presentation.pptx
Magic exist by Marta Loveguard - presentation.pptx
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Film cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasaFilm cover research (1).pptxsdasdasdasdasdasa
Film cover research (1).pptxsdasdasdasdasdasa
 
Top 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptxTop 10 Interactive Website Design Trends in 2024.pptx
Top 10 Interactive Website Design Trends in 2024.pptx
 

Operational Technology (OT) Network Security Challenges and Solutions

  • 1. Operational Technology (OT) Network Security Challenges and Solutions
  • 2. © Global Knowledge Training LLC. All rights reserved. Page 2 Webinar Agenda • Operational Technology (OT) Networks Overview • The Evolution of Operational Technology (OT) Networks in the Enterprise • Risks associated with OT Networks • Challenges faced with OT Networks • Technology Solutions and Strategies for Securing OT Networks • ACME Manufacturing Inc. - Mini Case Study
  • 3. © Global Knowledge Training LLC. All rights reserved. Page 3 Operational Technology (OT) Networks Overview What is an Operational Technology (OT) Network? In order to have a meaningful discussion about OT Networks it is important to clearly define terminology related to OT Networks.
  • 4. © Global Knowledge Training LLC. All rights reserved. Page 4 Operational Technology (OT) Networks Overview Gartner Defineitions: Operational Technology (OT) Hardware and software that detects or causes a change through the direct monitoring and/or control of physical devices, processes and events in the enterprise. Information Technology (IT) This is the common term for the entire spectrum of technologies for information processing, including software, hardware, communications technologies and related services. In general, IT does not include embedded technologies that do not generate data for enterprise use. Source: https://www.gartner.com
  • 5. © Global Knowledge Training LLC. All rights reserved. Page 5 Operational Technology (OT) Networks Overview Although OT is a generic term that is often used differently depending on the industry / organization, other terms that fall under OT include: • Industrial Control Systems (ICS) • Industrial Automation (IA) • Process Control Networks (PCN) • Supervisory Control and Data Acquisition (SCADA) Example: SCADA is a subset of ICS and they both fall under OT. Note that these terms are often used loosely.
  • 6. © Global Knowledge Training LLC. All rights reserved. Page 6 Operational Technology (OT) Networks Overview For the sake of this Webinar we will make the following distinctions between IT and OT for simplicity: • IT refers to systems that primarily deal with the Business and Administrative processes in the Enterprise. • OT refers to systems that are used to manage Industrial Operations as opposed to Business and Administrative operations. Operational Systems include production line management in Manufacturing, Mining Operations Control, Oil & Gas monitoring etc.
  • 7. © Global Knowledge Training LLC. All rights reserved. Page 7 Operational Technology (OT) Networks Overview Internet of Things (IoT) and Industrial Internet of Things (IIoT) • The Internet of Things (IoT) is a system / device typically embedded with sensors, software, electronics and connectivity to allow it to perform better by exchanging information with other connected devices, the operator or the manufacturer. Extends Internet connectivity beyond conventional computing platforms such as personal computers etc. • The term Industrial Internet of Things (IIoT) refers to systems connecting business systems with automation and control. Just as there is sometimes a fine line between IT and IoT the same is true for OT and IIoT.
  • 8. © Global Knowledge Training LLC. All rights reserved. Page 8 Evolution of OT Networks in the Enterprise Traditionally OT systems were siloed and were managed by teams dedicated to the OT infrastructure. In recent years Industrial Systems and Appliances have been brought online in large numbers to deliver “Smart Analytics” - using Data generated from the machines to modify and optimize the manufacturing process. Because of the need to capture, process and integrate with Logistics and Business Systems for enterprise use the functionality began to merge with IT.
  • 9. © Global Knowledge Training LLC. All rights reserved. Page 9 Evolution of OT Networks in the Enterprise IT and OT have always had fairly separate roles within an organization. However, with the emergence of the Industrial Internet and the integration of complex physical machinery with networked sensors and software, the lines between the two teams are blurring.
  • 10. © Global Knowledge Training LLC. All rights reserved. Page 10 Risks associated with OT Networks OT Networks typically run the Critical Infrastructure that organization depend on to produce a Product or Services. Any impact on OT operations could be financially devastating for an organization. Although the same is true for IT, the impact is greater for OT networks. Disruptions related to these systems could also be devastating to the supply chain of products and services or even cause harm to patients as in the case of the Health Care Industry; not to mention the fallout from the publicity it generates.
  • 11. © Global Knowledge Training LLC. All rights reserved. Page 11 Risks associated with OT Networks OT Networks have a different set of requirements and challenges that the IT Governance team must address to secure the enterprise. Because of the inherent differences in how these systems operate and the risk factors associated with them, industry had drawn a clear line between what is considered the traditional IT Network (office support systems) and the OT Network that houses the OT/IIoT Systems.
  • 12. © Global Knowledge Training LLC. All rights reserved. Page 12 Risks associated with OT Networks The Information Technology (IT) Governance team within an Organization must develop a better understanding of OT Networks and must stay abreast of threats associated with OT Environments to assure that the Organization is protected. Organization must put in place Processes, Procedures and Technologies to protect the critical OT assets of the Organization.
  • 13. © Global Knowledge Training LLC. All rights reserved. Page 13 Challenges faced with OT Networks • OT Networks and Devices tend to use legacy Plant Control Systems often running outdated Operating Systems that cannot easily be swapped out or a custom configuration that isn’t compatible. • Because of the High Availability of Production Schedules, it is often difficult to stop production to upgrade these systems. • OT System are typically upgraded when they are no longer functional for the task at hand. • Industrial environments tend to be more systemic where one small change can trigger a negative domino effect that could disrupt the system.
  • 14. © Global Knowledge Training LLC. All rights reserved. Page 14 Solutions & Strategies for Securing OT Networks Traditionally OT networks have adopted various Models, Architectures and Systems to secure the OT Infrastructure. An example is the Purdue Model for Control Hierarchy.
  • 15. © Global Knowledge Training LLC. All rights reserved. Page 15 • The Purdue Model for Control Hierarchy is a common and well- understood Model in the Manufacturing Industry that provides a Blueprint to segments Devices and Equipment into hierarchical functions. • Developed in the 1990s at Purdue University Consortium for Computer Integrated Manufacturing. Solutions & Strategies for Securing OT Networks
  • 16. © Global Knowledge Training LLC. All rights reserved. Page 16 Solutions & Strategies for Securing OT Networks Models, such as the Perdue Model, are implemented using Technologies such as Firewalls, VLAN and other tools to segment the Infrastructure into hierarchies based on levels of operations. • Some Manufacturers develop Equipment and Devices designed to specifically provide Security in the OT space. • Other Manufacturers have Equipment and Devices with Dual purpose; IT and OT Security capabilities.
  • 17. © Global Knowledge Training LLC. All rights reserved. Page 17 Solutions & Strategies for Securing OT Networks Specialized OT Security Products: OPshield is an OT Firewall (and related tools) developed by Wurldtech, a GE- owned Company. • Organization specializing in Operational Technology (OT) solutions. • The Firewall is specifically designed to provide protection for Industrial Controls and Critical Infrastructure Networks.
  • 18. © Global Knowledge Training LLC. All rights reserved. Page 18 Solutions & Strategies for Securing OT Networks Cisco Products designed for OT Networks: Cisco’s line of Industrial Switches designed for OT Networks. Cisco Catalyst IE3300 Rugged Series • Run Industrial Protocols such as Common Industrial Protocol (CIP) – an Industrial Protocol for Automation. • Hardened for harsh Industrial Environments. • Also provide traditional IT Technologies such as VLANs, Port Security, 802.1x etc.
  • 19. © Global Knowledge Training LLC. All rights reserved. Page 19 Solutions & Strategies for Securing OT Networks Cisco Products designed for OT Networks: The Cisco Industrial Network Director (IND) is a management tools built for managing Industrial Networks. Designed to help Operations Teams gain full visibility into the Automation Network for improved system availability and increase Overall Equipment Effectiveness (OEE).
  • 20. © Global Knowledge Training LLC. All rights reserved. Page 20 Solutions & Strategies for Securing OT Networks Using VLANs and Firewalls for Securing OT Networks does not provide Micro Segmentation. A major concern for may Organizations is the impact a breach can cause to the Manufacturing lines on the OT Network. • A breach on a VLAN could potentially impact the entire VLAN. • A Breach in a Security Zone separated by a Firewall could potentially impact the entire Security Zone.
  • 21. © Global Knowledge Training LLC. All rights reserved. Page 21 Solutions & Strategies for Securing OT Networks Single VLAN / Multiple Cells.
  • 22. © Global Knowledge Training LLC. All rights reserved. Page 22 Solutions & Strategies for Securing OT Networks Multiple VLANs / Multiple Cells.
  • 23. © Global Knowledge Training LLC. All rights reserved. Page 23 Solutions & Strategies for Securing OT Networks Multiple VLANs / Multiple Cells (Repurposing of Equipment)
  • 24. © Global Knowledge Training LLC. All rights reserved. Page 24 Solutions & Strategies for Securing OT Networks Micro Segmentation allows VLANs and Security zones to be further segmented to contain potential breaches. Micro Segmentation limits the impact of the breach to a smaller footprint should a VLAN or a Security Zone is compromised. • Micro Segmentation solution must allow for easy deployment of new OT Devices in the production lines (minimal configuration). • Micro Segmentation solution must allow for easy repurposing of OT Devices between production lines (minimal configuration).
  • 25. © Global Knowledge Training LLC. All rights reserved. Page 25 Solutions & Strategies for Securing OT Networks Cisco TrustSec provides the capabilities to Micro Segment OT network providing enhanced security to compliment the security provided by VLANs and Firewalls. • Dynamically assigning Security Group Tags (SGTs) to the traffic of a device that connects to the network based on it’s identity. • Access Policies can be implemented to limit communication between devices with different SGTs.
  • 26. © Global Knowledge Training LLC. All rights reserved. Page 26 Solutions & Strategies for Securing OT Networks One VLAN with Multiple Cells with Security Group Tags (SGTs).
  • 27. © Global Knowledge Training LLC. All rights reserved. Page 27 Solutions & Strategies for Securing OT Networks Cisco TrustSec is implemented and managed using the Cisco Identity Services Engine (ISE). • When OT devices connect to the network, Cisco ISE authenticates the devices and assigns all traffic sent on the network by the device an SGT. • Cisco ISE manages and distributes TrustSec policies. • Switch, Routers and Firewalls enforce TrustSec policies by using the SGT embedded in the traffic.
  • 28. © Global Knowledge Training LLC. All rights reserved. Page 28 Solutions & Strategies for Securing OT Networks Example of a Design based on the Purdue Model.
  • 29. © Global Knowledge Training LLC. All rights reserved. Page 29 ACME Inc. Manufacturing Inc. – Mini Case Study ACME Inc. Manufacturing was concerned about OT Network Security. • OT space is secured using VLANs and Firewalls only • No Micro Segmentation in place on the OT Networks • Cybersecurity attack could impact entire Factory • Concerned about the risk of Intellectual Property theft as a result of a Cybersecurity breach
  • 30. © Global Knowledge Training LLC. All rights reserved. Page 30 ACME Inc. Manufacturing Inc. – Mini Case Study ACME Inc. Manufacturing deployed Cisco TrustSec with the Identity Services Engine (ISE) to Micro Segment their OT Networks using Security Group Tags (SGTs) in addition to the use of VLAN and Firewall Segmentation. Each Manufacturing Cell was completely isolated using SGTs and device in a Cell limited to communicating only within the Cell and to specific Services in the DMZ.
  • 31. © Global Knowledge Training LLC. All rights reserved. Page 31 ACME Inc. Manufacturing Inc. – Mini Case Study A major challenge encountered by ACME Inc. Manufacturing is the process of classifying a device to place it in a Manufacturing Cell / Production Line. • Cisco ISE has the ability to dynamically profile devices (based on device attributes) in the IT space. • Classification for this OT requirement was based on a “Functional Attribute” and not an Identity embedded in the device. • Example of “Functional Attribute” - “Heat Treat” vs. “Coating”. ** A control device can be used in either a “Heat Treat” or “Coating” Process and typically the Control Engineer makes the determination.
  • 32. © Global Knowledge Training LLC. All rights reserved. Page 32 ACME Inc. Manufacturing Inc. – Mini Case Study Cisco Industrial Network Director (IND) was considered for the classification process in the design, • Cisco IND includes a Self-Service Portal to assign devices to a group; did not fulfil the customer requirements. • Customer is considering IND for managing Cisco Industrial Ethernet (IE) Switches and other Management functions related to the Industrial Space.
  • 33. © Global Knowledge Training LLC. All rights reserved. Page 33 ACME Inc. Manufacturing Inc. – Mini Case Study Cisco ISE is extremely flexible. Can integrate with a variety of systems through an Open Standard interface (REST API / PxGrid). Customer worked with a Company that has an IOT Application that was customized for the Classification process.
  • 34. © Global Knowledge Training LLC. All rights reserved. Page 34 ACME Inc. Manufacturing Inc. – Mini Case Study • Control Engineer uses a “Self Service Portal” to assign an OT device to a Cell –meets customer requirements. • Application was Leveraged for visibility related to Asset Management. • Provides HA of Database. Some features of the Custom Application:
  • 35. © Global Knowledge Training LLC. All rights reserved. Page 35 Courses Implementing and Configuring Cisco Identity Services Engine v3.0 Introduction to 802.1X Operations for Cisco Security Professionals
  • 36. © Global Knowledge Training LLC. All rights reserved. Page 36 Learning More GlobalKnowledge.com For additional on-demand and live webinars, white papers, courses, special offers and more, visit us at…