Top Banner
Standards Certification Education & Training Publishing Conferences & Exhibits Practical Approaches to Securely Integrating Business and Production Jim Gilsinn
26

Practical Approaches to Securely Integrating Business and Production

Jan 13, 2017

Download

Technology

Jim Gilsinn
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Practical Approaches to Securely Integrating Business and Production

Standards

Certification

Education & Training

Publishing

Conferences & Exhibits

Practical Approaches to Securely Integrating Business and Production

Jim Gilsinn

Page 2: Practical Approaches to Securely Integrating Business and Production

Presenter

• Jim Gilsinn– Senior Investigator, Kenexis– ISA99, Co-Chair– ISA99-WG2, Co-Chair– CEH, CISSP– ISA/IEC 62443 Expert– 25 Years Eng. Experience– MSEE

Page 3: Practical Approaches to Securely Integrating Business and Production

Overview

• Why Integrate Business & Production?• Things to Consider• Potential Solutions• Questions

Page 4: Practical Approaches to Securely Integrating Business and Production

Why Integrate Business & Production?

• Production to Business– Production Data– Historical Data– Regulatory Requirements– Network/Security Monitoring

• Business to Production– Remote Maintenance– Patch Management– File Exchange– Configuration Data

Complete isolation is rarely an option

Page 5: Practical Approaches to Securely Integrating Business and Production

THINGS TO CONSIDER

Page 6: Practical Approaches to Securely Integrating Business and Production

Things to Consider

• Isolated Zones• Network Segmentation• Wireless Integration• Remote Connections• Public Infrastructure Integration• File/Data Transfer• Monitoring

Page 7: Practical Approaches to Securely Integrating Business and Production

Isolated Zones

• Are there zones that require network isolation?• Safety-related systems are a good example• Set it & forget it!• May require re-calibration over time• Can be connected via signal wiring

Page 8: Practical Approaches to Securely Integrating Business and Production

Network Segmentation

• Firewall vs. Data Diode– Is bidirectional communication required?– Human interaction vs. automated bi-directional communication– “Air-gap” requirement– Mixed firewall & data diode

• Multi-legged vs. Dual Firewall– Establish DMZ– Product diversity– IT/OT

Page 9: Practical Approaches to Securely Integrating Business and Production

Wireless Integration

• Will wireless be used?• What communication protocols?• What frequency bands?• Point-to-point vs. omnidirectional?• Star vs. mesh topology?• Bandwidth requirements?• Tolerance for drop-outs?• Where to integrate into architecture?

Page 10: Practical Approaches to Securely Integrating Business and Production

Remote Connections

• Personnel, vendors, contractors, MSSP?• On-site vs. off-site access?• Continuous vs. scheduled vs. sporadic connectivity?• Method of connectivity?• Single-factor vs. multi-factor authentication?• Connection points within architecture?• Types of communication allowed?

Page 11: Practical Approaches to Securely Integrating Business and Production

Public Infrastructure Integration

• More of an issue with SCADA• Wired vs. terrestrial wireless vs. satellite• Dedicated vs. leased-line connections• Service level agreements for ISP• Contingencies for backup/secondary communications

Page 12: Practical Approaches to Securely Integrating Business and Production

File/Data Transfer

• Restricting data flows through zone boundaries• Direct communications vs. servers in DMZ• File transfer server vs. removable media• File transfer through remote management connections

Page 13: Practical Approaches to Securely Integrating Business and Production

Monitoring

• Malware checking• Ingress/egress filtering• Continuous monitoring vs. human interaction• Push vs. pull of monitoring data• Legacy equipment• HIDS/NIDS• Non-networked equipment

Page 14: Practical Approaches to Securely Integrating Business and Production

People Will Get Things Done

• One way or another, people will get their job done• Security can’t be seen as an impediment to that• Provide methods that work easily, but are more secure

Page 15: Practical Approaches to Securely Integrating Business and Production

POTENTIAL SOLUTIONS

Page 16: Practical Approaches to Securely Integrating Business and Production

Engineering User

Page 17: Practical Approaches to Securely Integrating Business and Production

File Transfer

Page 18: Practical Approaches to Securely Integrating Business and Production

Administrator User – Patch Management

Page 19: Practical Approaches to Securely Integrating Business and Production

Remote Maintenance

Page 20: Practical Approaches to Securely Integrating Business and Production

Historian Replication

Page 21: Practical Approaches to Securely Integrating Business and Production

Domain Controllers

Page 22: Practical Approaches to Securely Integrating Business and Production

Web Access – License Activation Server

Page 23: Practical Approaches to Securely Integrating Business and Production

SUMMARY

Page 24: Practical Approaches to Securely Integrating Business and Production

Summary

• There are benefits to connecting business and production networks• There are a variety of things that need to be considered when

connecting business and production networks• There are practical solutions for security

Page 25: Practical Approaches to Securely Integrating Business and Production

Questions

Page 26: Practical Approaches to Securely Integrating Business and Production

Standards

Certification

Education & Training

Publishing

Conferences & Exhibits

Thank You for Attending!

Enjoy the rest of the conference.