Top Banner
Security Check Proces Automatisering: Get Aware to Get Secure Jacco van der Kolk, Digital Trust Center Johan de Wit, Siemens Smart Infrastructure
31

Security Check Proces Automatisering

Jan 25, 2022

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security Check Proces Automatisering

Security Check Proces Automatisering:

Get Aware to Get Secure

Jacco van der Kolk,

Digital Trust Center

Johan de Wit,

Siemens Smart Infrastructure

Page 2: Security Check Proces Automatisering

Introducing Henk…….

Page 3: Security Check Proces Automatisering

Introducing Henk…….

Page 4: Security Check Proces Automatisering

The other side of Henk’s business…….

Page 5: Security Check Proces Automatisering

ICS, OT, SCADA, PCS, DCS, IACS………..

OTICS-

SCADA

IACSPLC

DCS

OT: Operational Technology

ICS: Industrial Control System

IACS: Industrial Automation and Control System

SCADA: Supervisory Control And Data Acquisition

DCS: Distributed Control System

PCS: Process Control System

PLC: Programmable Logic Controllers

BMS: Building Management System

BMS

Page 6: Security Check Proces Automatisering

Welcome!

Jacco van der Kolk,

Digital Trust Center (DTC)

Part of

Ministry of Economic Affairsand Climate

Page 7: Security Check Proces Automatisering

Unique Public – Private Partnership!

Page 8: Security Check Proces Automatisering

Welcome!

DTC missie:

OndernemendNederland in staatstellen om haar digitaleveiligheid te vergroten

Page 9: Security Check Proces Automatisering

Welcome!

CyberSecurity Alliance

Samen werken aan eenweerbaar en digitaal veiligNederland

door middel van publiek –private samenwerkingen

Page 10: Security Check Proces Automatisering

Overdracht

Page 11: Security Check Proces Automatisering

Overdracht

Page 12: Security Check Proces Automatisering
Page 13: Security Check Proces Automatisering
Page 14: Security Check Proces Automatisering
Page 15: Security Check Proces Automatisering
Page 16: Security Check Proces Automatisering
Page 17: Security Check Proces Automatisering
Page 18: Security Check Proces Automatisering
Page 19: Security Check Proces Automatisering
Page 20: Security Check Proces Automatisering
Page 21: Security Check Proces Automatisering
Page 22: Security Check Proces Automatisering

Overdracht

https://www.digitaltrustcenter.nl/aan-de-slag-met-ics-security

Page 23: Security Check Proces Automatisering

Waarom een nieuwe tool?.......... Er is al zoveel toch?

Page 24: Security Check Proces Automatisering
Page 25: Security Check Proces Automatisering

IT vs OT

Referentie:

TNO for GCCS 2015, Cyber Security of Industrial Control Systems, 2015

“Industrial Control Systems (ICS) and (office ) IT have historically been managed by separate organizational units.”

“ICS people do not consider their ICS to be IT.”

“ICS People lack cyber security education. The IT department, on the other hand, is unfamiliar with the peculiarities and limitations of ICS technology.”

Page 26: Security Check Proces Automatisering

IT <> OT, main differences

IT Systems vs OT systems

Component lifetime 3-5 Years

Availability requirements Medium, delays accepted

Real time requirements Delays accepted

Physical security High (for critical IT)

Patching Regular/scheduled

Anti-malware Standard/widely used

Security testing/audits Scheduled and mandated

Security Awareness High

Security Standards Existing and implemented

Up to 20 Years

Very High

Critical

Very much varying

Slow/not at all

Uncommon/hard to deploy

Occasional

Growing (we work hard on this)

Available/not widely used

Page 27: Security Check Proces Automatisering

CIA Triangle: Safety toevoegen voor OT!

Page 28: Security Check Proces Automatisering

De tool: Wat heb JIJ eraan?

Page 29: Security Check Proces Automatisering

“When it comes to policy on

critical infrastructure, focus more

attention on

the chains and networks that

support key processes.”

De tool: Wat heb JIJ eraan?

Page 30: Security Check Proces Automatisering

“There are large differences in cyber resilience

between organizations.”

“SME’s do not have the expertise and resources to

raise their cyber resilience.”

“Experts fear that these differences will widen in

the upcoming years.”

“To raise cyber resilience and close the gap we

need public-private initiatives.”

De tool: Wat heb JIJ eraan?

Page 31: Security Check Proces Automatisering

Thank you all!