Pm e sicurezza ict   e m tieghi
Upcoming SlideShare
Loading in...5
×
 

Pm e sicurezza ict e m tieghi

on

  • 253 views

 

Statistics

Views

Total Views
253
Views on SlideShare
253
Embed Views
0

Actions

Likes
0
Downloads
1
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

Pm e sicurezza ict   e m tieghi Pm e sicurezza ict e m tieghi Presentation Transcript

  • Proteggiamo da incidenti cyber iSistemi di controllo e automazionenell’industria e nelle infrastruttureEnzo M. Tieghietieghi@servitecno.item.tieghi@infrastrutturecritiche.it
  • …ad esempio… (chi non conosce Suki?)© CLUSIT 2013 – Tieghi – Cyber Security Industria e IC 2
  • Enzo Maria Tieghi Amministratore Delegato di ServiTecno(da oltre 20 anni software industriale) Consigliere AIIC, attivo in associazioni e gruppi di studioper la cyber security industriale (ISA s99 member) In Advisory Board, gruppi e progetti internazionali suIndustrial Security e CIP (Critical Infrastructure Protection) Co-autore ed autore pubblicazioni, articoli e memorie3
  • Dove, questi sistemi?Ovunque: Industrial,Processes, Buildings,Manufacturing &Infrastructures
  • Identifichiamo e definiamo il perimetroIT Security & Control System Protection: dove?
  • 6ANSI/ISA95 Functional Hierarchy www.isa.orgLevel 4Level 1Level 2Level 3Business Planning& LogisticsPlant Production Scheduling,Operational Management, etcManufacturingOperations ManagementDispatching Production, Detailed ProductionScheduling, Reliability Assurance, ...BatchControlDiscreteControlContinuousControl1 - Sensing the production process,manipulating the production process2 - Monitoring, supervisory control andautomated control of the production process3 - Work flow / recipe control to produce thedesired end products. Maintaining recordsand optimizing the production process.Time FrameDays, Shifts, hours, minutes, seconds4 - Establishing the basic plant schedule -production, material use, delivery, andshipping. Determining inventory levels.Time FrameMonths, weeks, daysLevel 0 0 - The actual production processLevel 4Level 1Level 2Level 3Business Planning& LogisticsPlant Production Scheduling,Operational Management, etcManufacturingOperations ManagementDispatching Production, Detailed ProductionScheduling, Reliability Assurance, ...BatchControlDiscreteControlContinuousControl1 - Sensing the production process,manipulating the production process2 - Monitoring, supervisory control andautomated control of the production process3 - Work flow / recipe control to produce thedesired end products. Maintaining recordsand optimizing the production process.Time FrameDays, Shifts, hours, minutes, seconds4 - Establishing the basic plant schedule -production, material use, delivery, andshipping. Determining inventory levels.Time FrameMonths, weeks, daysLevel 0 0 - The actual production process
  • Sicurezza ImpiantiOltre alla safety (EN ISO 13849-1/2,IEC/EN 62061, IEC/EN 61508,IEC/EN61511)…• valutiamo la security?• Life Cycle dei sistemi?• Documentazione di progetto?• Cambiamenti sull’impianto?• Reti, PLC, DCS, SCADA?• Chi? Quando? Dove? Perchè?
  • • un repository per la versione“validata” del sw• la documentazione di progetto• per eventuali variazioni,manutenzioni, ripartenze?
  • • Ho fatto Risk Analysis perrischio cyber?• Ho protetto rete e sistemi difabbrica?• Ho una copia completa, back-updel sistema (e dei dati) ?• Ho mai provato il recovery?
  • Sicurezza in profondità:in-depth (multi-layered) Security
  • No alle “reti piatte”: Seg/SegSegmentare & Segregare
  • Zones & Conduits (ISA99/IEC62443)
  • Esempio di “Security Architecture” nei sistemi diautomazione e controlloEnterpriseControlNetworkManufacturingOperationsNetworkPerimeterControlNetworkControlSystemNetworkProcessControlNetworkSource: Byres - Tofino
  • Protezione di Zone & Conduits con Firewalls(multilayered defence)Corporate FirewallIndustrial FirewallSource: Byres - Tofino
  • … e molto altroHW e SW di varie marche,provenienze, epoche, uso…
  • Introduzione alla Security Industriale - Enzo M. TieghiEsempio di rete “con protezioni”
  • SCADAServerClient Scada-Historian-KPI13467Mobile BI- KPI/AllarmiRTU su APNPrivata/Pubblica25Datacenter/HistorianServerKPI/ALMServerCLOUD, MOBILE,BYOD….
  • 19Il vero problema? …“Control system staff often have no skill and time forsecurity practices…”Steve Meyer, System Security Expert says:“... Hackers and exploits are an inconvenience and can costmoney but plant downtime will kill a business…”
  • Enzo Maria Tieghi Amministratore Delegato di ServiTecno(da oltre 20 anni software industriale) Consigliere AIIC, attivo in associazioni e gruppi di studioper la cyber security industriale (ISA s99 member) In Advisory Board, gruppi e progetti internazionali suIndustrial Security e CIP (Critical Infrastructure Protection) Co-autore ed autore pubblicazioni, articoli e memorie20
  • Dubbi? Domande?Enzo M. Tieghi etieghi@servitecno.item.tieghi@infrastrutturecritiche.it