Top Banner
Securing the Network: Understanding CIA, Segmentation, and Zero Trust Jacek Szamrej VP of Cybersecurity SEDC
70

SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Jul 15, 2018

Download

Documents

hathien
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Securing the Network:Understanding CIA, Segmentation, and Zero Trust

Jacek SzamrejVP of CybersecuritySEDC

Page 2: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Jacek SzamrejVP of CybersecuritySEDC

Page 3: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

?

C

IA

Page 4: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

What are we protecting?

DATA

Confidentiality

IntegrityAvailability

Page 5: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

What are we protecting?

DATA

Confidentiality

IntegrityAvailabilityRTORPOMTD

PublicPersonalSecret

CryptographyMeta data

Page 6: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

What are we protecting?

Confidentiality

IntegrityAvailabilityRTORPOMTD

PublicPersonalSecret

CryptographyMeta data

DATA

DATADATADATA

Page 7: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DATA

Data Classification Example

DATADATADATA

SCADA

Intranet, E&O

PII & PCI

AMI

Page 8: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Defense in Depth

We divided data into different categories for more effective protection

Now we can support this defense with network segmentation

Page 9: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Data segmentation example

Account Number Meter Number Usage Data5489425345 43534504234 0.2, 0.5, 0.3, 1.2,…

Account Number Meter Number Usage Data2cb6128ecc85fa4916491a626d876cfd

be799977f7b518b1416daa371f890809

0.2, 0.5, 0.3, 1.2,…

MD5HASH

MD5HASH Copy

Page 10: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

No Segmentation

http://www‐labs.iro.umontreal.ca/~vaucher/History/Ships_Discovery/

Page 11: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Segmentation

http://www.titanicology.com/FloodingByCompartment.html

Page 12: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Segmentation

http://www.titanicology.com/FloodingByCompartment.html

Page 13: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Segmentation

https://www.porttechnology.org/news/maersk_to_build_10_of_the_worlds_largest_ever_container_ships

Page 14: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Segmentation

https://www.bleepingcomputer.com/news/security/maersk‐reinstalled‐45‐000‐pcs‐and‐4‐000‐servers‐to‐recover‐from‐notpetya‐attack/

Page 15: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

How do we apply CIA to our network?

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Page 16: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

TrustedNetworkTrustedNetwork

UntrustedUntrusted

DMZDMZ

How do we apply CIA to our network?

Page 17: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Ukraine Power Grid Cyberattack 2015

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Page 18: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Ukraine Power Grid Cyberattack 2015Email with BlackEnergy malware

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Page 19: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Ukraine Power Grid Cyberattack 2015Pivot to server and establish C&C

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Page 20: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Ukraine Power Grid Cyberattack 2015

They found pre‐shared key for VPN on SCADA firewall

Page 21: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Ukraine Power Grid Cyberattack 2015

Firmware has been changedon SCADA devices

Page 22: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

 SCADA

S1 S2

Office

SubstationSCADA

Ukraine Power Grid Cyberattack 2015

They use SCADA HMIto open breakers

Page 23: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Ukraine Power Grid Cyberattack 2015

Page 24: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Ukraine Power Grid Cyberattack 2015

Full document with all recommendations:http://www.nerc.com/pa/CI/ESISAC/Documents/E‐ISAC_SANS_Ukraine_DUC_18Mar2016.pdf

Page 25: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Network Segmentation

Definition:Network segmentation in computer networking is the act or profession of splitting a computer network into subnetworks, each being a network segment. 

Advantages of such splitting are primarily for boosting performance and improving security.https://en.wikipedia.org/wiki/Network_segmentation

Page 26: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Common Reasons for Network Segmentation

Performance

Security

Compliance

Page 27: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

VLAN/ACLVirtual Firewall Air Gap

Network Segmentation Examples

Data DiodeFirewallACL

Source: Gartner (July 2016)

Levels of Trust

Page 28: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Zero Trust Model

Page 29: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

All resources are accessed in a secure manner regardless of location

Access control is on a “need‐to‐know” and is strictly enforced

Inspect and log all traffic

Concepts of Zero‐Trust Model

Page 30: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Zero Trust Network Diagram

https://www.slideshare.net/AlgoSec/5‐steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice

Page 31: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Zero Trust Network Diagram

Next Generation Firewall:FW ‐ FirewallIPS – Intrusion Prevention SystemCF  ‐ Content FilteringAC – Activity MonitoringCrypto ‐ CryptographyAM – Access Control

https://www.slideshare.net/AlgoSec/5‐steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice

Page 32: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Zero Trust Network Diagram

Management jumpboxin separate zone

https://www.slideshare.net/AlgoSec/5‐steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice

Page 33: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Zero Trust Network Diagram

MCAP (Micro Core and Perimeter):• Protected L2 switching zone• MCAP members have similar 

functionality

https://www.slideshare.net/AlgoSec/5‐steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice

Page 34: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Zero Trust Network Diagram

DAN (Data Acquisition Network):• Zone dedicated to log analysis• SIEM• Network Analysis and Visibility 

(NAV)

https://www.slideshare.net/AlgoSec/5‐steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice

Page 35: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://blogs.gartner.com/andrew‐lerner/2017/03/21/microsegmentation/

Software Defined Perimeter

All network connections are authenticated (using MFA and/or PKI), the health of each endpoint is inspected

Originated at the Defense Information Systems Agency (DISA), now maintained by Cloud Security Alliance

BeyondCorp is Google version of this concept

Page 36: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

https://cloudsecurityalliance.org/group/software‐defined‐perimeter/#_overview

Software Defined Perimeter

Page 37: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://blogs.gartner.com/andrew‐lerner/2017/03/21/microsegmentation/

Micro‐Segmentation

Software defined segmentation

Isolates applications in virtual environment 

Focus on east‐west communication  

Security defined at granular level

Page 38: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://blogs.gartner.com/andrew‐lerner/2017/03/21/microsegmentation/

Micro‐Segmentation Models

Native micro‐segmentation

Vendors examples:Amazon, Cisco, Microsoft, VMware 

Page 39: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://blogs.gartner.com/andrew‐lerner/2017/03/21/microsegmentation/

Micro‐Segmentation Models

Native micro‐segmentation

Third‐party model

Vendor examples:Cisco, Check Point, Fortinet, Juniper Networks, Palo Alto Networks, SonicWall, Sophos, Huawei 

Page 40: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://blogs.gartner.com/andrew‐lerner/2017/03/21/microsegmentation/

Micro‐Segmentation Models

Native micro‐segmentation

Third‐party model

Overlay model  

Vendor examples:Cisco, CloudPassage, Drawbridge Networks, GuardiCore, Illumio,Juniper Networks, ShieldX, vArmour, Unisys, Tempered Networks

Page 41: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://blogs.gartner.com/andrew‐lerner/2017/03/21/microsegmentation/

Micro‐Segmentation Models

Native micro‐segmentation

Third‐party model

Overlay model  

Hybrid model

Page 42: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Example of Native Micro‐Segmentation

https://vinfrastructure.it/2014/09/micro‐segmentation‐with‐nsx/

Page 43: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Controller: analyzing traffic, allows communication, apply and adjust policies

How Overlay Segmentation Works

Internet

Firewall

DMZ-S1 DMZ-S2

S1 S2

S3 PBX1SW1 SW2

SW3

SW4

W1 W2

W3 W4-CC

PR1 P3

P1 P2

SW-D1

Controller

Agent Agent

Agent Agent

AgentAgent

Page 44: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Controller: analyzing traffic, allows communication, apply and adjust policies

Internet

Firewall

DMZ-S1 DMZ-S2

S1 S2

S3 PBX1SW1 SW2

SW3

SW4

W1 W2

W3 W4-CC

PR1 P3

P1 P2

SW-D1

Controller

Agent Agent

Agent Agent

AgentAgent

How Overlay Segmentation Works

Page 45: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Some vendors are offering deception features

Internet

Firewall

DMZ-S1 DMZ-S2

S1 S2

S3 PBX1SW1 SW2

SW3

SW4

W1 W2

W3 W4-CC

PR1 P3

P1 P2

SW-D1

Controller

Agent Agent

Agent Agent

AgentAgent

How Overlay Segmentation Works

Page 46: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Cyber DeceptionExample

https://www.nytimes.com/2017/05/09/world/europe/hackers‐came‐but‐the‐french‐were‐prepared.html

Page 47: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Purdue Enterprise Reference Architecture

Enterprise network

IT Applications (CIS, GIS, OMS, AMI?)

SCADA Historian

FEP, SCADA Master

Meter, RTU

CT, PT, other sensors

Level 5

Level 4

Level 3

Level 2

Level 1

Level 0Source: https://www.slideshare.net/MarinaKrotofil/s4x16europekrotofil

Page 48: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Phases of Network Segmentation

Data Classification 

Analyze network traffic (types, volume)

Network structure, monitoring methods

Select vendor, install equipment

Monitoring

Source: https://www.slideshare.net/MarinaKrotofil/s4x16europekrotofil

Classification

Design

Analysis

Implementation

Monitor traffic, apply changes

Page 49: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Bison Valley Electric CooperativeNetwork Segmentation Project 

Page 50: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Our Guests• Gary Jeger – Palmetto Electric Co‐op• George Buckner – Central Florida Electric Co‐op• Jack Daniels – Bison Valley Electric Co‐op

Page 51: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Gary Jeger – Palmetto Electric Cooperative

Page 52: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

George Buckner – Central Florida Electric Cooperative

Page 53: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Jack Daniels – Bison Valley Electric Cooperative

Page 54: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

http://www.cablinginstall.com/articles/slideshow/2013/09/closet‐cleanup‐before‐and‐after‐photos/pg004.html

BVEC Network

Before After

Page 55: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC ‐ Network Segmentation Project 

ObjectiveFollow Zero‐Trust Model and recommendations from PCI DSS and US‐CERT TA16‐250A.

Solution BVEC is considering three different approaches to segment their network.

Questions How these options follow concept of Zero‐Trust Model, PCI DSS, and TA16‐250A recommendations?

Page 56: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

US‐CERT Alert (TA16‐250A)The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations

“Protecting the network infrastructure is critical to preserve the confidentiality, integrity, and availabilityof communication and services across an enterprise.”

BVEC ‐ Network Segmentation Project 

Page 57: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

TA16‐250A Recommendations:1. Segregate Networks and Functions2. Limit Unnecessary Lateral Communications3. Harden Network Devices4. Secure Access to Infrastructure Devices5. Perform Out‐of‐Band Management6. Validate Integrity of Hardware and Software

BVEC ‐ Network Segmentation Project 

Page 58: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network

DMZ

CISAMIMDMGISOMS

DMZ

Fiber & Radio

Dispatch &

 SCADA

Office

VM2VM1S1 S2

District Office

Server RoomOffice

MS MS MS FIN CFO CEO

E&O E&O E&O E&O LG COO

AD & FSExchangeIntranetDB1DB2

Substation

CAMI PTZSCADA

Substation

CAMI PTZSCADA

Page 59: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network Option 1 ‐ Segmentation Gateway

Page 60: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network Option 1 ‐ Segmentation Gateway

Multiple NGFW vendors:(Palo Alto, Checkpoint, Fortinet,  Juniper, etc)

Shall we use the same vendor as edge firewall or 

different?

We will need High Availability option which 

is more expensive.

Page 61: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

CISAMIMDMGISOMS

DMZ

Fiber & Radio

Dispatch &

 SCADA

Office

VM2VM1S1 S2

District Office

Server RoomOffice

MS MS MS FIN CFO CEO

E&O E&O E&O E&O LG COO

AD & FSExchangeIntranetDB1DB2

Substation

CAMI PTZSCADA

Substation

CAMI PTZSCADA

BVEC Network Option 2 ‐ VMWare NSX 

Page 62: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network Option 2 ‐ VMWare NSX 

CIS AMI MDM GIS OMS

VM2VM1

AD & FSExchangeIntranetDB1DB2

vSphere Distributed Switch DFW

Distributed Firewalls

Physical

VDS

Page 63: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

CIS AMI MDM GIS OMS

VM2VM1

AD & FSExchangeIntranetDB1DB2

vSphere Distributed Switch DFW

Distributed Firewalls

Physical

VDS

BVEC Network Option 2 ‐ VMWare NSX 

Uses proprietary VMWare NSX solution, bare metal servers are not included.

Consultant might be needed to determine optimal configuration.

Throughput not tied to hardware, easy to scale, can be extended to the 

cloud.

Page 64: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network Option 3 ‐ Identity Defined Network 

DMZ

CISAMIMDMGISOMS

DMZ

ADFS

ExchangeIntranetApps

Fiber & Radio

Dispatch &

 SCADA

Office

VM2VM1S1 S2

District Office

Server Room

Substation

CAMI CCVSCADA

Substation

CAMI CCVSCADA

HIP Server

HIP Server

Conductor

HIP Server

HIP Client

HIP Server

HIP Client

Page 65: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

CISAMIMDMGISOMS

DMZ

ADFS

ExchangeIntranetApps

Fiber & Radio

Dispatch &

 SCADA

Office

VM2VM1S1 S2

District Office

Server Room

Substation

CAMI CCVSCADA

Substation

CAMI CCVSCADA

HIP Server

HIP Server

Conductor

HIP Server

HIP Client

HIP Server

HIP Client

BVEC Network Option 3 ‐ Identity Defined Network 

Based on HIP standard, but IDN is a proprietary 

solution.

Can be tested locally before installed. 

Does not require major hardware installation.

It can be extended to the cloud in the future.

Page 66: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network Option 1 ‐ Segmentation Gateway

Page 67: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

DMZ

CISAMIMDMGISOMS

DMZ

Fiber & Radio

Dispatch &

 SCADA

Office

VM2VM1S1 S2

District Office

Server RoomOffice

MS MS MS FIN CFO CEO

E&O E&O E&O E&O LG COO

AD & FSExchangeIntranetDB1DB2

Substation

CAMI PTZSCADA

Substation

CAMI PTZSCADA

BVEC Network Option 2 ‐ VMWare NSX 

Page 68: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

BVEC Network Option 3 ‐ Identity Defined Network 

DMZ

CISAMIMDMGISOMS

DMZ

ADFS

ExchangeIntranetApps

Fiber & Radio

Dispatch &

 SCADA

Office

VM2VM1S1 S2

District Office

Server Room

Substation

CAMI CCVSCADA

Substation

CAMI CCVSCADA

HIP Server

HIP Server

Conductor

HIP Server

HIP Client

HIP Server

HIP Client

Page 69: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Summary

Classify your data by using CIA triad

Network segmentation can be designed in‐house

Consider segmenting SCADA, PCI, and PII first 

Page 70: SecuringtheNetwork: … · €steps‐to‐a‐zero‐trust‐network‐from‐theory‐to‐practice. Zero Trust Network Diagram Management jumpbox

Thank you!

Jacek Szamrej, [email protected]