YOU ARE DOWNLOADING DOCUMENT

Please tick the box to continue:

Transcript
Page 1: A Novel Approach to Secure Industrial Networking & Cyber ...

1 | ©2018 Belden Inc. belden.com @beldeninc

A Novel Approach to Secure Industrial Networking & Cyber Security

Mr. Rohit Kotian & Mr. Pratap Mondal 17th March 2018

Page 2: A Novel Approach to Secure Industrial Networking & Cyber ...

2 | ©2018 Belden Inc. belden.com @beldeninc

A Rich Heritage• Founded by Joseph Belden

in 1902 in Chicago• A long history of innovation for

communications technologies• Early customers

included Thomas Edison

• John Stroup, CEO• Headquartered in St. Louis, MO• 10,000 employees• NYSE: BDC• Operations in North and South America,

Europe, Middle East, Africa and Asia Pacific• Revenue $2.39B• 20+ Sales Offices; 25+ Manufacturing Facilities

Radio in the 1920s

TV in the 1950s

Computer Networking in the 1980s and 1990s

Joseph Belden Thomas Edison

Key Markets Applications Solutions

Delivering highly engineered signal transmission solutions for mission-critical applications in a

diverse set of global markets

Belden Today

IndustrialDiscrete ManufacturingProcess FacilitiesTransportationEnergy

EnterpriseSmart BuildingsFinal Mile BroadbandLive Media Production

Data

Audio

Video Cable

Connectivity

Networking

Software

Page 3: A Novel Approach to Secure Industrial Networking & Cyber ...

3 | ©2018 Belden Inc. belden.com @beldeninc

A Purposeful Transformation from a Cable Supplier to a Global Signal Transmission Solutions Provider

Belden Business System

Strategy, Culture and Values

2009 2010 2011 20122005 2007

Industrial Networking

Communication Products

2014 2015

Industrial Connectivity

Broadcast Industrial Networking Broadcast Broadcast Broadcast Security Broadcast

Broadcast Industrial Connectivity

Industrial Security

Broadcast Industrial Connectivity

2017 2018

Broadcast

Industrial Networking

Page 4: A Novel Approach to Secure Industrial Networking & Cyber ...

4 | ©2018 Belden Inc. belden.com @beldeninc

BELDEN India, Chakan, Pune – Inaugurated on 15th Nov 2018

• Built-up area of 10,000 Sq Meters in Phase I• Built-up area of over 10,000 Sq Meters in Phase II• Capability to make Coaxial and Multi conductor cables

• Assembly options of Fiber and Copper cables• Hirschmann Switch Assembly• Over 100 employees including managers and

technicians in Phase I

Page 5: A Novel Approach to Secure Industrial Networking & Cyber ...

5 | ©2018 Belden Inc. belden.com @beldeninc

Industrial IT Core Networking Capabilities Customised Value Addition Capabilities

MACH1000Gigabit Ethernet Switch for harsh industrialenvironments

SPIDERUnmanaged PoE/non-PoE switches for various

industrial applications

Managed & Unmanaged SwitchesHIRSCHMANN classic rail switches

RSP30/40High Performance Managed Rail Switches

BATAccess Points & Clients that work together for

maximum mobility, flexibility & network

Repair and Service facilityIn-house facility for service and repair of Network Switch

products

Quick Turn-Around TimeShortened turnaround time for service and repair of Network

Switching Products…!

Page 6: A Novel Approach to Secure Industrial Networking & Cyber ...

6 | ©2018 Belden Inc. belden.com @beldeninc

Industrial Wire & Cables Capabilities

Audio/Video CableCo-axial, A\V Cable, Speaker Cables

Control and Instrumentation CablesMachFlexTM specialty flexible cable, Fire Survival Cables, Marine Cables, EN 50288-7 C&I Cables

Networking and DataBus cablesRS-485, Foundation Fieldbus, CANBus, Modbus, Profibus, Category LAN cables

Electronics CablesUL Multi-conductor and Paired Cables, as well as Hook-up Lead Wires & MachFlexTM ONE

Customised Value Addition Capabilities

Customized JacketingDifferent jacket materials like PVC, LSZH, FR-PVC, FRLS-PVC with optional anti-rodent, anti-termite, UV resistance properties

Multiple outer jacket color options

Customized ArmoringOptions in Steel Wire Armor (SWA) and Steel Wire Braid armor (SWB)

Page 7: A Novel Approach to Secure Industrial Networking & Cyber ...

7 | ©2018 Belden Inc. belden.com @beldeninc

Fiber Connectivity

BroadBand Connectivity

Copper Connectivity

Enterprise Connectivity SolutionCopper Patch CordsIntended for Datacenter/LAN & Ethernet/IP applications in LSZH & PVC Versions

Coaxial Patch CordsIntended for use for RF signals and Audio/Video

connectivity

Fiber Patch CordsIntended for high-speed high-bandwidth applications for telecommunications and high density patching applications.

Page 8: A Novel Approach to Secure Industrial Networking & Cyber ...

8 | ©2018 Belden Inc. belden.com @beldeninc

What is ICS Cybersecurity?

Overall security philosophy

Example system architecture

Introduction to Firewalls

What Solutions Belden can offer?

Agenda

Page 9: A Novel Approach to Secure Industrial Networking & Cyber ...

9 | ©2018 Belden Inc. belden.com @beldeninc

1. Joint study from ISACA and RSA. 2. Ponemon Institute study. 3. IBM/Ponemon Institute study 4. “Overload: Critical Lessons From 15 years of ICS Vulnerabilities”, FireEye iSightIntelligence.

Incident and Breach Levels Continue to Soar

Page 10: A Novel Approach to Secure Industrial Networking & Cyber ...

10 | ©2018 Belden Inc. belden.com @beldeninc

Control System Security Is Gaining Public RecognitionThe Stuxnet Worm – July 2018Shamoon – Aug 2012Dragonfly – Feb 2013

Page 11: A Novel Approach to Secure Industrial Networking & Cyber ...

11 | ©2018 Belden Inc. belden.com @beldeninc

Control System Security Is Gaining Public Recognition

Page 12: A Novel Approach to Secure Industrial Networking & Cyber ...

12 | ©2018 Belden Inc. belden.com @beldeninc

Control System Security Is Gaining Public Recognition

BlackEnergy – Dec 2016

Page 13: A Novel Approach to Secure Industrial Networking & Cyber ...

13 | ©2018 Belden Inc. belden.com @beldeninc

Reported Vulnerabilities & Incidents are Increasing

Source: FireEye iSight Intelligence 2016 ICS Vulnerability Trend Report

Page 14: A Novel Approach to Secure Industrial Networking & Cyber ...

14 | ©2018 Belden Inc. belden.com @beldeninc

But ICS Cybersecurity Is Much More than Hackers

• <10% of issues are related to hackers• Most “attacks” are device or human errors

Page 15: A Novel Approach to Secure Industrial Networking & Cyber ...

15 | ©2018 Belden Inc. belden.com @beldeninc

But ICS Cybersecurity Is Much More than Hackers

• <10% of issues are related to hackers• Most “attacks” are device or human errors

ICS cybersecurity is about• Improving system reliability• Reducing down time• Increasing productivity• Decreasing operating costs• Ensuring safetyAnd protecting from hackers

Page 16: A Novel Approach to Secure Industrial Networking & Cyber ...

16 | ©2018 Belden Inc. belden.com @beldeninc

Where do I start?

Page 17: A Novel Approach to Secure Industrial Networking & Cyber ...

P

Overall Security Philosophy

What is ICS Cybersecurity? Overall security philosophy Example system architecture Introduction to Firewalls What Solutions Belden can offer?

Page 18: A Novel Approach to Secure Industrial Networking & Cyber ...

18 | ©2018 Belden Inc. belden.com @beldeninc

• Security is not just about firewalls

• Firewalls are important, but security is a system-level property

• Security needs to be woven throughout the network fabric – including switches

• Security management and visibility needs to span the entire system− Not just firewall management− System security management

Key Security Principles

Page 19: A Novel Approach to Secure Industrial Networking & Cyber ...

19 | ©2018 Belden Inc. belden.com @beldeninc

Combination of Software and Hardware Tools Can Help You Answer These Questions

Page 20: A Novel Approach to Secure Industrial Networking & Cyber ...

20 | ©2018 Belden Inc. belden.com @beldeninc

Deep Packet Inspection

Where network failures occur…

20

Source: Datacom, Network Management Special

8 %

10 %

35 %

25 %

12 %

7 %

3 %

Physical

Data Link

Network

Transport

Session

Presentation

Application

Solutions You Can Deploy

Cable

Switches

Routers & Firewalls

OSI Model – Defense in Depth

Page 21: A Novel Approach to Secure Industrial Networking & Cyber ...

21 | ©2018 Belden Inc. belden.com @beldeninc

Belden offers Four Firewall FamiliesPr

ice

Throughput

Eagle 204x FE

Eagle 302x GE + 4x FE

Eagle One2x FE

Tofino Xenon2x FE

DPI Capabilities

Page 22: A Novel Approach to Secure Industrial Networking & Cyber ...

22 | ©2018 Belden Inc. belden.com @beldeninc

Industrial HiVisionGraphical Network

Management System software

Belden Offers Two Software Platforms To Help

Industrial HiVision

Tripwire

Tripwire Like SCADA for

security Detect threats,

identify vulnerabilities, and harden configurations in real time

Page 23: A Novel Approach to Secure Industrial Networking & Cyber ...

Example System Architecture

P What is ICS Cybersecurity? Overall security philosophy Example system architecture Introduction to Firewalls What Solutions Belden can offer?

P

Page 24: A Novel Approach to Secure Industrial Networking & Cyber ...

24 | ©2018 Belden Inc. belden.com @beldeninc

Example System Architecture

Page 25: A Novel Approach to Secure Industrial Networking & Cyber ...

25 | ©2018 Belden Inc. belden.com @beldeninc

Example System Architecture

• Protect access to the Internet and other networks

• Protect access to the local network

• Protect critical assets• Ensure policy

enforcement and monitoring

Page 26: A Novel Approach to Secure Industrial Networking & Cyber ...

Introduction to Firewalls

P What is ICS Cybersecurity? Overall security philosophy Example system architecture Introduction to Firewalls What Solutions Belden can offer?

PP

Page 27: A Novel Approach to Secure Industrial Networking & Cyber ...

27 | ©2018 Belden Inc. belden.com @beldeninc

Packets are analyzed and filtered based on different information in the data packet: Source / Destination MAC address (ACL) Ethertype, VLAN, Priority (ACL) Source / Destination IP address (ACL / SPI) Protocol (ACL / SPI) Source / Destination TCP/UDP port (ACL / SPI) State of a TCP session (SPI) Data (DPI)

Core Functionality of Every Firewall: Packet Filtering

Ethernet IP TCP/UDP Data

Stateful Packet Inspection (SPI) + Deep Packet Inspection (DPI)

Access Control Lists (ACL)

Page 28: A Novel Approach to Secure Industrial Networking & Cyber ...

28 | ©2018 Belden Inc. belden.com @beldeninc

Core Functionality of Every Firewall: Packet Filtering

• Firewalls are a key component to controlling information flow− Should I pass this packet on, or report it,

and/or drop it?

• Different types of firewall technology make their forwarding decisions based on different criteria

• Different types of firewall technology are targeted toward different needs within the system

• Complete protection comes from using all of them – in the right place

Page 29: A Novel Approach to Secure Industrial Networking & Cyber ...

29 | ©2018 Belden Inc. belden.com @beldeninc

Variations of Firewalls

• Until recently, the following marketing punchline was often used:− “You need a secure network? Go get a

firewall!”

• But:− Firewalls are not magical devices that

somehow create security− Firewalls are very diverse. Not every

firewalls fits every use case.− Firewalls must be applied and

configured properly to provide any security

Industrial Firewall

Page 30: A Novel Approach to Secure Industrial Networking & Cyber ...

What Solutions Belden can offer?

P What is ICS Cybersecurity? Overall security philosophy Example system architecture Introduction to Firewalls What Solutions Belden can offer?

PPP

Page 31: A Novel Approach to Secure Industrial Networking & Cyber ...

31 | ©2018 Belden Inc. belden.com @beldeninc

Belden offers Four Firewall FamiliesPr

ice

Throughput

Eagle 204x FE

Eagle 302x GE + 4x FE

Eagle One2x FE

Tofino Xenon2x FE

DPI Capabilities

Page 32: A Novel Approach to Secure Industrial Networking & Cyber ...

32 | ©2018 Belden Inc. belden.com @beldeninc

Access Control Lists (ACL)

Stateful Inspection

Different Firewall Technologies For Different Needs

Deep Packet

Inspection (DPI)

• A list of who can to talk to whom based on values within the Ethernet, IP and TCP/UDP headers

• Can also specify bandwidth limitations and prioritize specific communications

• No memory across packets – each packet looked at in isolation

Page 33: A Novel Approach to Secure Industrial Networking & Cyber ...

33 | ©2018 Belden Inc. belden.com @beldeninc

Access Control Lists (ACL)

Stateful Packet Inspection

Different Firewall Technologies For Different Needs

Deep Packet

Inspection (DPI)

• Has memory across packets – looks at each packet in context

• If this is a response, was there a request?

• Protects against denial of service attracts

Page 34: A Novel Approach to Secure Industrial Networking & Cyber ...

34 | ©2018 Belden Inc. belden.com @beldeninc

Access Control Lists (ACL)

Stateful Packet Inspection

Different Firewall Technologies For Different Needs

Deep Packet

Inspection (DPI)

• Looks inside of the payload of the packet and decodes the ICS protocol

• Protects against malformed packets

• Limits not only who communicates but what they are allowed to say

Page 35: A Novel Approach to Secure Industrial Networking & Cyber ...

35 | ©2018 Belden Inc. belden.com @beldeninc

Deep Packet Inspection

Belden Inc.USA

Belden India Pvt. LtdIndia

• Standard firewalls identify only:• who a message is from (source), • where it is going (destination) and • maybe the language of the contents

(port). • You don’t know anything about the

letter’s content though.

• With Signature-based DPI:• This message would be rejected only if it

is in the signature database in this exact format.

• With Protocol-specific DPI:• Has the smarts to know this is “bad

grammar” and would proactively block it.

Page 36: A Novel Approach to Secure Industrial Networking & Cyber ...

36 | ©2018 Belden Inc. belden.com @beldeninc

Industrial HiVision Graphical Network

Management System software

Belden Offers Two Software Platforms

Industrial HiVision

Tripwire

Tripwire Like SCADA for

securityDetect threats,

identify vulnerabilities, and harden configurations in real time

Page 37: A Novel Approach to Secure Industrial Networking & Cyber ...

37 | ©2018 Belden Inc. belden.com @beldeninc

Industrial HiVision Graphical Network

Management System software

Belden Offers Two Software Platforms

Industrial HiVision

Tripwire

Tripwire Like SCADA for

security Detect threats,

identify vulnerabilities, and harden configurations in real time

Page 38: A Novel Approach to Secure Industrial Networking & Cyber ...

38 | ©2018 Belden Inc. belden.com @beldeninc

What is Industrial HiVision?

• Hirschmann’s graphical Network Management System software

• Specifically developed for configuration and supervision of industrial networks

• Can be used to supervise devices from any manufacturer

• Designed for use by Automation Engineers

• Provides interfaces to SCADA systems

Page 39: A Novel Approach to Secure Industrial Networking & Cyber ...

39 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status

Page 40: A Novel Approach to Secure Industrial Networking & Cyber ...

40 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status• Security lockdown

Page 41: A Novel Approach to Secure Industrial Networking & Cyber ...

41 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status• Security lockdown• Configuration status display

Page 42: A Novel Approach to Secure Industrial Networking & Cyber ...

42 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status• Security lockdown• Configuration status display• Event logging, reporting and forwarding

Page 43: A Novel Approach to Secure Industrial Networking & Cyber ...

43 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status• Security lockdown• Configuration status display• Event logging, reporting and forwarding• Rogue device detection

Page 44: A Novel Approach to Secure Industrial Networking & Cyber ...

44 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status• Security lockdown• Configuration status display• Event logging, reporting and forwarding• Rogue device detection• Network dashboard

Page 45: A Novel Approach to Secure Industrial Networking & Cyber ...

45 | ©2018 Belden Inc. belden.com @beldeninc

Network Management Software – Industrial HiVision

• Network infrastructure security status• Security lockdown• Configuration status display• Event logging, reporting and forwarding• Rogue device detection• Network dashboard• Audit Trail

Page 46: A Novel Approach to Secure Industrial Networking & Cyber ...

Cyber Integrity Through Foundational Controls

Pratap Mondal – RSM India & SAARC

Page 47: A Novel Approach to Secure Industrial Networking & Cyber ...

• Technology− Networks− Systems

• People− Operations− Engineering− Cyber Security

• Cyber Incidents− Human/Operator Error− Equipment Failure− Malicious Activity

OT

IT

Page 48: A Novel Approach to Secure Industrial Networking & Cyber ...

ProcessData

Page 49: A Novel Approach to Secure Industrial Networking & Cyber ...

• View−Passive−Human interaction with process

• Monitor−Automated−Safety System

• Control−Changes driven through physical control of

machinery

Page 50: A Novel Approach to Secure Industrial Networking & Cyber ...

• Anything resulting in the loss, denial, or manipulation of the ability to:

− View− Monitor (Safety System)− Control

• Which could detrimentally impact:

− Safety− Availability

Page 51: A Novel Approach to Secure Industrial Networking & Cyber ...

• Human Error• Equipment Failure• Malicious Activity−Disgruntled Employee−Hacker−Nation state−Ransomware−Malware

Page 52: A Novel Approach to Secure Industrial Networking & Cyber ...

InternalInternal & External

Page 53: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 54: A Novel Approach to Secure Industrial Networking & Cyber ...

We First Need to Understanding Attack Strategy

AccessAccess

DiscoveryDiscovery

ControlControl

DamageDamage

CleanupCleanup

54

If they attack,we CAN defend!

“Cyber Event Ladder Logic”

Takes the most timeBest opportunity to find behavior.

Page 55: A Novel Approach to Secure Industrial Networking & Cyber ...

Assessment/Detection EngineData Gathering

Host/Device/Endpoint:Server, workstation, database, network device, applications, third party systems, integrations, etc.

Actionable Results

Page 56: A Novel Approach to Secure Industrial Networking & Cyber ...

Raw data Actionable Information

Page 57: A Novel Approach to Secure Industrial Networking & Cyber ...

Line 1: Cell 1: Passive Asset Discovery Cell 2: Active Asset Discovery Cell 3: Hybrid Asset Discovery

Line 2: Cell 1: Change Detection Cell 2: Secure Configuration

Line 3: Log Management

Line 4: Vulnerability Management

Visibility | Protection Controls | Continuous Monitoring

Page 58: A Novel Approach to Secure Industrial Networking & Cyber ...

Log management

Centralized security data

Passive• Syslog data

collection• Log filtering &

management• Investigation

analytics & reporting

Vulnerability assessment

No touch assessment

Periodic• Security

vulnerability & configuration assessment

• Best practice & policy tests

Integrity monitoring

Change detection

Whitelisting

Continuous• Real time change detection• Best practice assessment and remediation• Compliance analytics & reporting

Reduced MTTR

Integrated• Network access

control• Network

segmentation• Zones and

conduits

Network infrastructure

Access prevention

Page 59: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 60: A Novel Approach to Secure Industrial Networking & Cyber ...

IEC 62443

NEI 08-09

NIST SP 800-82» Guide to Industrial Control Systems Security

» NERC Critical Infrastructure Protection

The Leader in Industrial Cyber Security Configuration Polices

PCN SecurityGuidance

• Guide for Water Sector

• Many others, such as:

Page 61: A Novel Approach to Secure Industrial Networking & Cyber ...

ManufacturingZone

Level 3

Supervisory LAN Level 2

Field I/O DevicesInstrument Bus

Level 0

Controller LAN Level 1

DMZ Some call Level 3.5

Enterprise Zone Web

Servers

Levels 4&5 Internet & Corporate

Page 62: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 63: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 64: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 65: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 66: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 67: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 68: A Novel Approach to Secure Industrial Networking & Cyber ...
Page 69: A Novel Approach to Secure Industrial Networking & Cyber ...

Belden.com | @BeldenInc


Related Documents