SlideShare a Scribd company logo
1 of 23
Cyber security for Industrial Plants
Threats and defense approach
Dave Hreha
System Architect Engineer
Cyber security for Industrial Plants
Threats and Defense Approach
• The proliferation of cyber threats and recent facts have prompted
asset owners in industrial environments to search for security
solutions that can protect plant assets and prevent potentially
significant monetary loss and safety issues.
• While some industries have made progress in reducing the risk of
cyber attacks, the barriers to improving cyber security remain high.
• More open architectures and different networks exchanging data
among different levels have made systems more vulnerable to
attack.
• With the increased use of commercial off-the-shelf IT solutions in
industrial environments, control system integrity started to be
vulnerable to malware originally targeted for commercial
applications and already opened a new world of new threats
dedicated for control systems.
What is Cyber security?
• Cyber security is a branch of network administration
that addresses attacks on or by computer systems and
through computer networks that can result in
accidental or intentional disruptions.
• The objective of cyber security is to provide increased
levels of protection for information and physical
assets from theft, corruption, misuse, or accidents
while maintaining access for their intended users.
• Cyber security is an ongoing process that
encompasses procedures, policies, software, and
hardware and it must be continually re-evaluated.
An Example of Facility
Facilities may include:
• Coke ovens
• Blast Furnaces
• Electric Arc Furnaces
• Continuous Casting
• Rolling Mills
• Finishing Lines
• Water Treatment
Typical Facilities
Security Challenges
• Impact on Control system being secured
• Exposure to malicious software from “friendly
sources”
• Exposure from linked systems
• Adverse effects from implementation
• Multiple sites and geography
• Physical and logical boundaries
Security Threats
Internal threats:
• Good intentions from misinformed employees
• Non-appropriate behavior from employees or contractors
• Disgruntled employees or contractors
External threats:
• Hackers
• Virus writers
• Activists
• Criminal groups
• Terrorists
• Foreign governments
System Access
• Peer utilities
• Poorly configured firewalls
• Database links
• Corporate VPN (Virtual Private Network)
• IT controlled communication equipment
• Spear phishing
• Supplier access
• Legacy dial up systems
System Access Points
Supplier access points
Peer utilities
VPN
Dial up access
Poorly configured firewall
Database links
IT controlled products
Accessing the Process
• System databases
• SCADA or HMI screens
• PC systems
• “Man-in-the-Middle”
• Denial of Service
• Accidents
Defense in Depth
• Risk assessment
• Security plan based on the assessment
• Develop training
• Define network separation and segmentation
• Define system access control
• Device hardening
• Network monitoring and continued
maintenance
Risk assessment
• Identify threats
• Prioritize
Safety
Severity
Business impact
• Deploy resources
• Document with infrastructure diagrams
Security Plan
• Roles and responsibilities of those affected by the policy and procedures
• Actions, activities, and processes that are allowed and not allowed
• Consequences of non-compliance
• Incident response policies and procedures
• Who to notify and what actions to perform to contain the incident
• Role-specific procedures for restoring devices and process to known good
operating state
• Details equipment, software, protocols, procedures, and personnel
• Summarizes the risk assessment and includes infrastructure diagrams
• Defines the training plan.
The security plan should be reviewed periodically for changes in threats,
environment, and adequate security level
Training
Cyber security awareness program
• Understanding the organization’s security policies,
procedures, and standards
• Job and role based training classes that detail the
relevant security policies, procedures, and standards
• Classes that provide specific steps for applying the
security policies and procedures.
• Classes on how to respond if a cyber attack or accident
has occurred.
• Classes for vendors and other visitors
Network separation
Firewall - DMZ (Demilitarized Zone)
• No direct communication between Enterprise
and Control network
• Only certain server types allowed in DMZ
– Data servers (Historian)
– Patch management
– Proxy servers
– RADIUS (Remote Authentication Dial In User Service)
– VPN
Network segmentation
Still behind Firewall - DMZ
• Logical segments
• Security zones
Virtual Local Area Network (VLAN)
• Managed switches
• Routers
– Access control list
Network segmentation
Benefits
• Contains infection if occurs
• Limits node visibility
• Stops intruder scans of network
• Limits impact if breach
• Restricts broadcasts and multicasts
• Improved network performance
• Provides higher level of security
Access Control
Security for remote access
RADIUS (Remote Authentication Dial In User Service)
AAA Protocol
– Authentication
– Authorization
– Accounting
RAS (Remote Access Services)
VPN (Virtual Private Network)
Access Control
VPN Protocols and components
• Secure Socket Layer (SSL)
• Internet Protocol Security (Ipsec)
• Internet Key Exchange (IKE)
• Advanced Encryption Standard (AES)
• Data Encryption Standard (DES)
• Encapsulating Security Payload (ESP)
Device Hardening
Configuring device settings to strengthen security
• Network devices
– Firewalls
– Managed Switches
– Routers
• Control system devices
– Distributed Control Systems (DCS)
– Supervisory Control and Data Acquisition (SCADA)
– Programmable Automation Controllers (PAC)
– Programmable Logic Controllers (PLC)
Device Hardening
• Implement Password protection
• Implement access control
• Disable any unused services
• Maintain up to date patches and hot fixes
(especially security)
• Use strong authentication
Network monitoring
& maintenance
Users should monitor for any suspicious activity
• Use intrusion detection systems
• Monitor network loading
• Examining log files
• Use SNMP (Simple Network Management
Protocol) traps
By being proactive, any attempts to gain access to
the system should be discovered and stopped
before any entry is made
Conclusion
The Defense in Depth recommendations can
decrease the risk of attack.
No single component provides adequate
defense. It is important to consider all of the
Defense in Depth recommendations to mitigate
risk.

More Related Content

What's hot

Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performanceSchneider Electric
 
Industrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover MesseIndustrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover MesseSchneider Electric
 
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesSchneider Electric
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsSchneider Electric
 
Effect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsEffect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsSchneider Electric
 
Trellis DCIM Platform
Trellis DCIM PlatformTrellis DCIM Platform
Trellis DCIM PlatformGreg Stover
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachSchneider Electric
 
Datacenter best practices design and implementation
Datacenter best practices design and implementationDatacenter best practices design and implementation
Datacenter best practices design and implementationAnton An
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Schneider Electric
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solutionSchneider Electric India
 
[Industry report] U.S. Grid Automation Report
[Industry report] U.S. Grid Automation Report[Industry report] U.S. Grid Automation Report
[Industry report] U.S. Grid Automation ReportSchneider Electric
 
[Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management [Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management Schneider Electric
 
[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training
[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training
[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation TrainingSchneider Electric
 

What's hot (20)

Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 
Maximize your business and machine performance
Maximize your business and machine performanceMaximize your business and machine performance
Maximize your business and machine performance
 
Industrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover MesseIndustrial Automation Press Conference Hannover Messe
Industrial Automation Press Conference Hannover Messe
 
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field DevicesNERC Critical Infrastructure Protection (CIP) and Security for Field Devices
NERC Critical Infrastructure Protection (CIP) and Security for Field Devices
 
Cyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutionsCyber security: A roadmap to secure solutions
Cyber security: A roadmap to secure solutions
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
Effect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration ToolsEffect on Substation Engineering Costs of IEC61850 & System Configuration Tools
Effect on Substation Engineering Costs of IEC61850 & System Configuration Tools
 
Trellis DCIM Platform
Trellis DCIM PlatformTrellis DCIM Platform
Trellis DCIM Platform
 
Field Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based ApproachField Data Gathering Services — A Cloud-Based Approach
Field Data Gathering Services — A Cloud-Based Approach
 
Smart Alarming Management
Smart Alarming ManagementSmart Alarming Management
Smart Alarming Management
 
Datacenter best practices design and implementation
Datacenter best practices design and implementationDatacenter best practices design and implementation
Datacenter best practices design and implementation
 
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
Preparing for the Future: How Asset Management Will Evolve in the Age of Smar...
 
DTN Guardian3™
DTN Guardian3™DTN Guardian3™
DTN Guardian3™
 
SCADA of the Future
SCADA of the FutureSCADA of the Future
SCADA of the Future
 
DTN ProphetX® - At a Glance
DTN ProphetX® - At a GlanceDTN ProphetX® - At a Glance
DTN ProphetX® - At a Glance
 
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solutionDesigning a security policy to protect your automation solution
Designing a security policy to protect your automation solution
 
Holistic Efficiency
Holistic EfficiencyHolistic Efficiency
Holistic Efficiency
 
[Industry report] U.S. Grid Automation Report
[Industry report] U.S. Grid Automation Report[Industry report] U.S. Grid Automation Report
[Industry report] U.S. Grid Automation Report
 
[Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management [Oil & Gas White Paper] Control Room Management - Alarm Management
[Oil & Gas White Paper] Control Room Management - Alarm Management
 
[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training
[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training
[Oil & Gas White Paper] Liquids Pipeline Leak Detection and Simulation Training
 

Similar to Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha

Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hackingDesmond Devendran
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in misGurjit
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdfdhanywahyudi17
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewallsMurali Mohan
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdfKIYALIBAN1
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1PROIDEA
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-enKBIZEAU
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptRAJESH S
 
Network design consideration
Network design considerationNetwork design consideration
Network design considerationlavanya marichamy
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfssuser8717cc
 
Dncybersecurity
DncybersecurityDncybersecurity
DncybersecurityAnne Starr
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systemsfajjarrehman
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in misVishal Patyal
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing SecurityNithin Raj
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptxSandeepAgrawal98
 

Similar to Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha (20)

Cyber Security # Lec 4
Cyber Security # Lec 4 Cyber Security # Lec 4
Cyber Security # Lec 4
 
Security and Control.ppt
Security and Control.pptSecurity and Control.ppt
Security and Control.ppt
 
Ccna sec 01
Ccna sec 01Ccna sec 01
Ccna sec 01
 
Material best practices in network security using ethical hacking
Material best practices in network security using ethical hackingMaterial best practices in network security using ethical hacking
Material best practices in network security using ethical hacking
 
Security and control in mis
Security and control in misSecurity and control in mis
Security and control in mis
 
Week 09_Cyber security u.pdf
Week 09_Cyber security u.pdfWeek 09_Cyber security u.pdf
Week 09_Cyber security u.pdf
 
Network security and firewalls
Network security and firewallsNetwork security and firewalls
Network security and firewalls
 
CyberSecurity101.pdf
CyberSecurity101.pdfCyberSecurity101.pdf
CyberSecurity101.pdf
 
network security.pdf
network security.pdfnetwork security.pdf
network security.pdf
 
Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1Plnog13 2014 security intelligence_pkedra_v1
Plnog13 2014 security intelligence_pkedra_v1
 
Itir oct0714-network security-en
Itir oct0714-network security-enItir oct0714-network security-en
Itir oct0714-network security-en
 
IM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.pptIM Unit 4 Security and its a control.ppt
IM Unit 4 Security and its a control.ppt
 
Network design consideration
Network design considerationNetwork design consideration
Network design consideration
 
Cyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdfCyberteq - Cyber Security for Telecom.pdf
Cyberteq - Cyber Security for Telecom.pdf
 
Dncybersecurity
DncybersecurityDncybersecurity
Dncybersecurity
 
Power Grid Communications & Control Systems
Power Grid Communications & Control SystemsPower Grid Communications & Control Systems
Power Grid Communications & Control Systems
 
Security & control in mis
Security  & control in misSecurity  & control in mis
Security & control in mis
 
Cloud Computing Security
Cloud Computing SecurityCloud Computing Security
Cloud Computing Security
 
Network security
Network securityNetwork security
Network security
 
Cybersecurity for Board.pptx
Cybersecurity for Board.pptxCybersecurity for Board.pptx
Cybersecurity for Board.pptx
 

More from Schneider Electric

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design ConsiderationsSchneider Electric
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsSchneider Electric
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing Schneider Electric
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsSchneider Electric
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service ProvidersSchneider Electric
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingSchneider Electric
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSchneider Electric
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingSchneider Electric
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingSchneider Electric
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Schneider Electric
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesSchneider Electric
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Schneider Electric
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.Schneider Electric
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580Schneider Electric
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...Schneider Electric
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTSchneider Electric
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingSchneider Electric
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingSchneider Electric
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingSchneider Electric
 

More from Schneider Electric (20)

Secure Power Design Considerations
Secure Power Design ConsiderationsSecure Power Design Considerations
Secure Power Design Considerations
 
Digital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting InvestorsDigital International Colo Club: Attracting Investors
Digital International Colo Club: Attracting Investors
 
32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing 32 phaseo power supplies and transformers briefing
32 phaseo power supplies and transformers briefing
 
Key Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation TrendsKey Industry Trends, M&A Valuation Trends
Key Industry Trends, M&A Valuation Trends
 
EcoStruxure™ for Cloud & Service Providers
 EcoStruxure™ for Cloud & Service Providers EcoStruxure™ for Cloud & Service Providers
EcoStruxure™ for Cloud & Service Providers
 
Magelis Basic HMI Briefing
Magelis Basic HMI Briefing Magelis Basic HMI Briefing
Magelis Basic HMI Briefing
 
Zelio Time Electronic Relay Briefing
Zelio Time Electronic Relay BriefingZelio Time Electronic Relay Briefing
Zelio Time Electronic Relay Briefing
 
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures BriefingSpacial, Thalassa, ClimaSys Universal enclosures Briefing
Spacial, Thalassa, ClimaSys Universal enclosures Briefing
 
Relay Control Zelio SSR Briefing
Relay Control Zelio SSR BriefingRelay Control Zelio SSR Briefing
Relay Control Zelio SSR Briefing
 
Magelis HMI, iPC and software Briefing
Magelis HMI, iPC and software BriefingMagelis HMI, iPC and software Briefing
Magelis HMI, iPC and software Briefing
 
Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?Where will the next 80% improvement in data center performance come from?
Where will the next 80% improvement in data center performance come from?
 
EcoStruxure for Intuitive Industries
EcoStruxure for Intuitive IndustriesEcoStruxure for Intuitive Industries
EcoStruxure for Intuitive Industries
 
Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017Systems Integrator Alliance Program 2017
Systems Integrator Alliance Program 2017
 
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
EcoStruxure, IIoT-enabled architecture, delivering value in key segments.
 
It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580It's time to modernize your industrial controls with Modicon M580
It's time to modernize your industrial controls with Modicon M580
 
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
A Practical Guide to Ensuring Business Continuity and High Performance in Hea...
 
Connected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoTConnected Services Study – Facility Managers Respond to IoT
Connected Services Study – Facility Managers Respond to IoT
 
Telemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories BriefingTelemecanqiue Cabling and Accessories Briefing
Telemecanqiue Cabling and Accessories Briefing
 
Telemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors BriefingTelemecanique Photoelectric Sensors Briefing
Telemecanique Photoelectric Sensors Briefing
 
Telemecanique Limit Switches Briefing
Telemecanique Limit Switches BriefingTelemecanique Limit Switches Briefing
Telemecanique Limit Switches Briefing
 

Recently uploaded

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 

Recently uploaded (20)

TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 

Cybersecurity for Industrial Plants: Threats and Defense Approach - Dave Hreha

  • 1. Cyber security for Industrial Plants Threats and defense approach Dave Hreha System Architect Engineer
  • 2. Cyber security for Industrial Plants Threats and Defense Approach • The proliferation of cyber threats and recent facts have prompted asset owners in industrial environments to search for security solutions that can protect plant assets and prevent potentially significant monetary loss and safety issues. • While some industries have made progress in reducing the risk of cyber attacks, the barriers to improving cyber security remain high. • More open architectures and different networks exchanging data among different levels have made systems more vulnerable to attack. • With the increased use of commercial off-the-shelf IT solutions in industrial environments, control system integrity started to be vulnerable to malware originally targeted for commercial applications and already opened a new world of new threats dedicated for control systems.
  • 3. What is Cyber security? • Cyber security is a branch of network administration that addresses attacks on or by computer systems and through computer networks that can result in accidental or intentional disruptions. • The objective of cyber security is to provide increased levels of protection for information and physical assets from theft, corruption, misuse, or accidents while maintaining access for their intended users. • Cyber security is an ongoing process that encompasses procedures, policies, software, and hardware and it must be continually re-evaluated.
  • 4. An Example of Facility
  • 5. Facilities may include: • Coke ovens • Blast Furnaces • Electric Arc Furnaces • Continuous Casting • Rolling Mills • Finishing Lines • Water Treatment Typical Facilities
  • 6. Security Challenges • Impact on Control system being secured • Exposure to malicious software from “friendly sources” • Exposure from linked systems • Adverse effects from implementation • Multiple sites and geography • Physical and logical boundaries
  • 7. Security Threats Internal threats: • Good intentions from misinformed employees • Non-appropriate behavior from employees or contractors • Disgruntled employees or contractors External threats: • Hackers • Virus writers • Activists • Criminal groups • Terrorists • Foreign governments
  • 8. System Access • Peer utilities • Poorly configured firewalls • Database links • Corporate VPN (Virtual Private Network) • IT controlled communication equipment • Spear phishing • Supplier access • Legacy dial up systems
  • 9. System Access Points Supplier access points Peer utilities VPN Dial up access Poorly configured firewall Database links IT controlled products
  • 10. Accessing the Process • System databases • SCADA or HMI screens • PC systems • “Man-in-the-Middle” • Denial of Service • Accidents
  • 11. Defense in Depth • Risk assessment • Security plan based on the assessment • Develop training • Define network separation and segmentation • Define system access control • Device hardening • Network monitoring and continued maintenance
  • 12. Risk assessment • Identify threats • Prioritize Safety Severity Business impact • Deploy resources • Document with infrastructure diagrams
  • 13. Security Plan • Roles and responsibilities of those affected by the policy and procedures • Actions, activities, and processes that are allowed and not allowed • Consequences of non-compliance • Incident response policies and procedures • Who to notify and what actions to perform to contain the incident • Role-specific procedures for restoring devices and process to known good operating state • Details equipment, software, protocols, procedures, and personnel • Summarizes the risk assessment and includes infrastructure diagrams • Defines the training plan. The security plan should be reviewed periodically for changes in threats, environment, and adequate security level
  • 14. Training Cyber security awareness program • Understanding the organization’s security policies, procedures, and standards • Job and role based training classes that detail the relevant security policies, procedures, and standards • Classes that provide specific steps for applying the security policies and procedures. • Classes on how to respond if a cyber attack or accident has occurred. • Classes for vendors and other visitors
  • 15. Network separation Firewall - DMZ (Demilitarized Zone) • No direct communication between Enterprise and Control network • Only certain server types allowed in DMZ – Data servers (Historian) – Patch management – Proxy servers – RADIUS (Remote Authentication Dial In User Service) – VPN
  • 16. Network segmentation Still behind Firewall - DMZ • Logical segments • Security zones Virtual Local Area Network (VLAN) • Managed switches • Routers – Access control list
  • 17. Network segmentation Benefits • Contains infection if occurs • Limits node visibility • Stops intruder scans of network • Limits impact if breach • Restricts broadcasts and multicasts • Improved network performance • Provides higher level of security
  • 18. Access Control Security for remote access RADIUS (Remote Authentication Dial In User Service) AAA Protocol – Authentication – Authorization – Accounting RAS (Remote Access Services) VPN (Virtual Private Network)
  • 19. Access Control VPN Protocols and components • Secure Socket Layer (SSL) • Internet Protocol Security (Ipsec) • Internet Key Exchange (IKE) • Advanced Encryption Standard (AES) • Data Encryption Standard (DES) • Encapsulating Security Payload (ESP)
  • 20. Device Hardening Configuring device settings to strengthen security • Network devices – Firewalls – Managed Switches – Routers • Control system devices – Distributed Control Systems (DCS) – Supervisory Control and Data Acquisition (SCADA) – Programmable Automation Controllers (PAC) – Programmable Logic Controllers (PLC)
  • 21. Device Hardening • Implement Password protection • Implement access control • Disable any unused services • Maintain up to date patches and hot fixes (especially security) • Use strong authentication
  • 22. Network monitoring & maintenance Users should monitor for any suspicious activity • Use intrusion detection systems • Monitor network loading • Examining log files • Use SNMP (Simple Network Management Protocol) traps By being proactive, any attempts to gain access to the system should be discovered and stopped before any entry is made
  • 23. Conclusion The Defense in Depth recommendations can decrease the risk of attack. No single component provides adequate defense. It is important to consider all of the Defense in Depth recommendations to mitigate risk.