SlideShare a Scribd company logo
1 of 30
Download to read offline
Restricted © Siemens Mobility GmbH 2019
2019Page 1 Andres G. Guilarte / Secure Connectivity
Bulletproof IoT in Rail
Safe & Secure Connectivity for rail
www.siemens.com.dcuSiemens Mobility GmbH 2019
Restricted © Siemens Mobility GmbH 2019
2019Page 2 Andres G. Guilarte / Secure Connectivity
Cybersecurity in Rail
more frequent and severe and it will only increase
WannaCry
Restricted © Siemens Mobility GmbH 2019
2019Page 3 Andres G. Guilarte / Secure Connectivity
… and risks
WHY?
Increased connectivity and evolving threat landscape
Opportunities
Blue Boxing
Cryptovirology
AOHell
Level Seven Crew hack
Denial-of-service attacks
Cloudbleed
sl1nk SCADA hacks
Meltdown/Spectre
Infineon/TPM
AT&T Hack Morris Worm Melissa Worm
ILOVEYOU WannaCry
NotPetya
Heartbleed
Industroyer/Chrashoverride
Stuxnet
Signaling systems move
from dedicated and
separate to
interconnected and
standardized system of
systems using COTS
components
Exposure to malicious
cyber attacks is also
growing dramatically,
putting our lives and the
stability of
our society at risk
2000 2004 2008 2012 2016 202019961988 1992
Remote Operation of
Interlocking
CBTC over WiFi
Electronic
Interlocking
Industrial IoT – Data Analytics – Artificial Intelligence
ETCS over GSM-R
Page 3
Restricted © Siemens Mobility GmbH 2019
2019Page 4 Andres G. Guilarte / Secure Connectivity
Approaches for rail cyber security
Application of accepted and aligned standards
IEC
62443
ISO 27001
Page 4
Restricted © Siemens Mobility GmbH 2019
2019Page 5 Andres G. Guilarte / Secure Connectivity
Charter of Trust co-founded by Siemens in 2018
1 Protecting the data of individuals
and companies
2 Preventing damage from people,
companies and infrastructures
3 Establishing a reliable foundation on which confidence
in a networked, digital world can take root and grow
Page 5
Leading global companies joined forces for creating security in a networked world.
Restricted © Siemens Mobility GmbH 2019
2019Page 6 Andres G. Guilarte / Secure Connectivity
The cost of “IoT” has dropped
as new ways to analyze mountains of data were developed
What is overlooked is a secure and cost effective solution to connect critical infrastructure
to the Internet
For example…
Restricted © Siemens Mobility GmbH 2019
2019Page 7 Andres G. Guilarte / Secure Connectivity2019Page 7 Andres G. Guilarte / Secure Connectivity
Restricted © Siemens Mobility GmbH 2019
Cybersecurity regulations for Rail
• IEC 62443: Industrial communication
networks – network and system security
• ISO 27001: Information security
management systems
Security standards
• OT security threats are a relatively new topic for
the industry
• Industrial systems typically have a long lifecycle (≥
20 years)
• Increasing connectivity (convergence of IT and OT,
connection to cloud etc.)
Long life-cycles + complex systems
+ IT overlapping Security of network and
information systems (NIS)
IT-Sicherheitsgesetz
National strategy for the
protection against cyber risks
APCIP (Austrian Program
for Critical Infrastructure
Protection)
Ley 8/2011
Loi de Programmation
Militaire
UK Cyber Security Strategy;
Rail Cyber Security
China Cyber Security Law
The Comprehensive National
Cybersecurity Initiative
Russian federal service for
technical and export control,
N 31 of 03.14.2014
New national and international
security laws and initiatives
FR Network and Information Security Agency (ANSSI) - “Firewalls are not allowed to be used to connect
any class 3 network, such as railway switching systems, to a lower class network or corporate network,
only unidirectional technology is permitted”
US Department of Homeland Security (DHS): Regulators have encouraged the use of unidirectional
gateways to protect equipment and processes in safety instrumented systems (SiS)
UK Department for Transport (DFT) - Signaling systems should be protected with unidirectional gateways
and that there should be a clear separation between enterprise and operational rail networks.
DE German association of machinery and plant engineering (VDMA) - Recommends the use of data
diodes to protect critical network segments & transition zones.
Factors
Restricted © Siemens Mobility GmbH 2019
2019Page 8 Andres G. Guilarte / Secure Connectivity
Rail security and IT security have different priorities
Harsh Environment
Location
of use
Climate-controlled offices
Rail commissioning
personnel Installation Network specialists
Automation-specific Topology Star-shaped
Network failure
times <300 ms
Availability
Second to minute range
accepted
Low, switches
with fewer ports
Device
density
High, switches with large
number of ports
Part of automation
monitoring
Network
monitoring
By trained
specialist
Integrity
Availability
ConfidentialityConfidentiality
Availability
Integrity
Rail (OT) Security IT Security
Highest priority
Restricted © Siemens Mobility GmbH 2019
2019Page 9 Andres G. Guilarte / Secure Connectivity2019Page 9 Andres G. Guilarte / Secure Connectivity
Restricted © Siemens Mobility GmbH 2019
Connectivity Built-in
Siemens offers to pre-equip new
systems with secure connectivity HW
as a standard !
EBA Certified
Highest safety standards in rail
automation !
Protecting & Connecting data of safety critical networks
DCU, a World first!
Restricted © Siemens Mobility GmbH 2019
2019Page 10 Andres G. Guilarte / Secure Connectivity
DCU provides cost-effective secure connectivity to all critical
infrastructure
10
01
01
11
01
00
11
10
10
01
01
11
10
01
01
11
10
01
01
00
01
00
11
10
10
01
01
11
10
01
01
11
Data Capture Unit (HW)
DCU
One-way gateway (SW)
Receiver
One-way gateway (SW)
Sender
Industrial IoT Operating System
(cloud or local IT)
Receive and push data
Customer Assets
Isolates Critical OT network from IT network
Your critical network
remains physically isolated
via the integration of the
Data Capture Unit (DCU)
as an IT – OT
100% secure edge device
10
01
01
11
10
01
01
11
10
01
01
11
MindSphere Apps
Collects and filter data
Critical Network
(OT)
(IT)
Open Network
Data Capture Unit (DCU)
has lowered the cost of
unidirectional connectivity 20X
Restricted © Siemens Mobility GmbH 2019
2019Page 11 Andres G. Guilarte / Secure Connectivity
DCU Connects while keeping networks physically separated
No possibility of interfering with the critical network
• Purely passive with no influence on critical
network—no possibility of introducing external data
into critical network
• Unidirectional, unobtrusive, and undetectable—
keeps critical and open networks physically
separated
• Use as a smart & secure network tap or one-way
gateway with gateway applications
• IEC 62443-4-2 Security Level 3 with Secure Super
Long Life Linux OS and IT security features
• Gateway protocols like file transfer and OPC-UA
across a unidirectional connection
Networks protected by firewalls are not
infallible; in all known cases of successful
cyber-attacks, networks had firewalls in
place
IPC 1 DCU IPC 2 Power
Restricted © Siemens Mobility GmbH 2019
2019Page 12 Andres G. Guilarte / Secure Connectivity
How?
Our hardware design
▪ Guarantees complete protection and
isolation of networks, hardware
design that lacks the vulnerability of
firewalls
▪ Reliable - MTBF +500.000hrs
▪ Privacy and data integrity via TLS for
encrypted communication to IT or
cloud
▪ Galvanic isolation & physical
separation ensures only one-way
communication
▪ Optional software emulating bi-
directional communication
Critical network Open network
Rx
TxPHY
PHY
Rx
Tx
Rx
Tx
Rx
Tx
Rx
Tx
4
Siemens
DCU
Electromagnetic induction
Case Studies
Restricted © Siemens Mobility GmbH 2019
2019Page 14 Andres G. Guilarte / Secure Connectivity
Interlockings
Real time data capture from electronic interlocking safety network
Siemens Mobility Data Center
Data analytics and visualization of bus communications to identify anomalies
and point machine defect prediction 6-8 hours in advance of a potential failure
Siemens Simis Interlocking
Bremen HbF (Main Station)
Vital electronic interlocking system
Restricted © Siemens Mobility GmbH 2019
2019Page 15 Andres G. Guilarte / Secure Connectivity
Overview
Key features
• Status of interlocking over a defined
time period with monitoring :
• Switches
• BUS communication (telegram
retransmissions)
• Status and time signals are turned
on/off,
• closing time of level crossings
• EGM time stamp messages
Benefits
• Increase availability without
additional sensors
• Efficient planning of maintenance
activities/ optimization of
maintenance planning
Restricted © Siemens Mobility GmbH 2019
2019Page 16 Andres G. Guilarte / Secure Connectivity
Interlocking messaging data
Allows to identify trends
Interlocking
messaging data
(Simis C, Simis D,
Sicas)
Analysis of interlocking traffic and traffic quality
Point failure prediction
Occupation analysis of infrastructure components
Monitoring of media entry in cabling for signals
Improvement of maintenance after earthing events
Restricted © Siemens Mobility GmbH 2019
2019Page 17 Andres G. Guilarte / Secure Connectivity
Interlocking messaging data
Allows to identify trends .. Point machine operation behavior and weather
Restricted © Siemens Mobility GmbH 2019
2019Page 18 Andres G. Guilarte / Secure Connectivity
Wayside equipment
Real time data capture from safety network for track circuits data
Wayside
Track circuit component
Equipment room
Data from control module
Central office
Cloud-based data processing, analysis and visualization
Siemens TCM 100
DCU provides secure, passive access to safety critical network
Livestream
Restricted © Siemens Mobility GmbH 2019
2019Page 19 Andres G. Guilarte / Secure Connectivity
Secure Connectivity solution + App
App: Clearguard Performance Monitoring
Basic functionalities:
1. Access from any PC, Tablet or Smartphone.
2. Real time overview and status of all the connected assets
3. Real time performance monitoring and event recording
4. Real time and automatic notifications of asset malfunction
5. Centralized management of alarms per asset / line.
6. Digital tickets for fast troubleshooting and paperless response to alarms
7. Automatic troubleshooting guide for fast repair / calibration
8. Simultaneous visualization of multiple assets for behavior analysis with
neighboring effect
9. Different user accounts for operator / maintainer profiles.
10. 5yrs storage of all the data generated by the assets for investigation of
failure/incidents analysis or data analytics.
Restricted © Siemens Mobility GmbH 2019
2019Page 20 Andres G. Guilarte / Secure Connectivity
Operation Control Systems
Real-time data capture to enable digital services
Problem
• Operator needed connectivity for an operation and control system.
• No compromise on safety – Zero modification of safety case.
• Critical data needed to be safely captured and sent across the globe for
monitoring, data analysis, and smart prediction.
Solution
• Data sent to Germany for remote support during start-ups and real time system
error analysis to reduced downtime.
Customer Benefit
• DCU proved trustworthy and simple for secure communication of critical data
• No additional sensors
• Zero interference to the existing system
• Reduced system downtime by giving remote access to the system
Operation Control System
Hong Kong
Restricted © Siemens Mobility GmbH 2019
2019Page 21 Andres G. Guilarte / Secure Connectivity
Intrusion Detection Systems (IDS)
= Safe and secure transmission of network traffic/bus communication data; DCU = Data Capture Unit
Step 1
Safe and secure transmission
of network traffic
Step 2
Automatic identification
of anomalies + intrusions
Step 3
• “Sort out” false positives
• Analysis + evaluation
Step 4
Quick notifications
Problem-solving advice, others
On-premise
Operations control system
DCU
Intrusion
Detection System
Operator - End customer
Off-premise or Cloud
Monitor
Anomalies, suspicious
incidents
Cybersecurity Operations Center
(1st level)
Support by R&D
(3rd level)
Support by security experts
(2nd level)
Dashboard
Restricted © Siemens Mobility GmbH 2019
2019Page 22 Andres G. Guilarte / Secure Connectivity
Real-time Intrusion Detection of safety critical Networks
Remote or Central office
On-premise or Cloud-based Intrusion detection
Interlocking Room
Data from Interlocking network
IDS SW
Bulletproof IoT in Rail
More information at www.siemens.com/dcu
Andres G. Guilarte
Global Business and Technology strategy
Siemens Mobility GmbH
Berlin & Braunschweig, Germany
andres.guilarte@siemens.com
Restricted © Siemens Mobility GmbH 2019
2019Page 24 Andres G. Guilarte / Secure Connectivity
Q&A
What is the most important need for you, as an operator/vendor?
A
Q
1 Secure access to critical network to get real-time data
2 Vendor locked data – proprietary protocols
3 Real time data Vs. warehoused
4 Network security – Access to cloud
5 Asset monitoring
Restricted © Siemens Mobility GmbH 2019
2019Page 25 Andres G. Guilarte / Secure Connectivity
Data-based & cloud applications for
Daily Rail security management tasks
Cloud-based
condition monitoring
• Cloud connection without
increase of attack surface
• Option for "dormant" bi-
directional link for algorithm
updates
Managed OT security
services
• Ensured plant communication
for security data collection
• Option to protect a single
connection or individual
critical network segments
Invisible security
monitoring
• Overlay security monitoring network
• Invisible to attackers
• Prevention of anti-forensic
techniques (e.g., footprint cleaning)
Network monitoring
and management
• Ensured availability of critical assets
is monitored
• Segmented and monitored
communication
• Option for true air-gapped systems
(SIS, interlocking networks)
Secure delivery of patches
and updates
• Unidirectional file replication from
DMZ to secure "update zone"
• Focus on antivirus updates and
software update delivery
• Inbound only mode prevents
interactive malicious behavior
Transient media secure
access
• Additional step to prevent cross-
contamination across multiple
critical network zones
• Combination of diode and USB
storage media sanitization possible
• Ensured protection when using
USB media usage
And more …
Process historian data
collection
Database replication
CCTV
NTP
Edge or cloud
Analytics
• Predictive maintenance
• Process Optimization
• AI-enabled applications
Restricted © Siemens Mobility GmbH 2019
2019Page 26 Andres G. Guilarte / Secure Connectivity
Data Capture Unit (DCU)
Features
▪ Power supply
24 VDC (16.8-78 VDC)
▪ Power consumption
3.4 to 7.2 W
▪ Current consumption
229 mA (24V / four ports active)
▪ Overvoltage protection
85 VDC, 1 s
▪ Electrical isolation
Ethernet ports 1.5 kV
▪ Electrical isolation
Power supply 3.5 kV
▪ USB port max current supply
500 mA
▪ Temperature range
-40ºC to +85ºC / - 40ºF to +185ºF
▪ Dimensions (HxWxD)
167 x 60.6 x 110.5 mm
▪ MTBF
+/- 500.000 hrs
Specifications
DCU 1.0 ▪ Passive interception, galvanic
isolation, and physical separation
between critical and open network
▪ 4x 10 Mbit/s, full duplex
capture ports
▪ 1x Gigabit Ethernet output
▪ >30 Mbit/s throughput
▪ 1x USB 3.0 interface
▪ PCAPNG packet capture format
▪ PCAP filtering
▪ Protocol independent packet capture
▪ Local storage on USB drive
▪ NTP time synchronization
▪ Linux OS
Features
DCU 2.0 ▪ Passive interception, galvanic
isolation, and physical separation
between critical and open network
▪ 4x 10/100 Mbit/s, full duplex
capture ports
▪ 1x Gigabit Ethernet output1
▪ >200 Mbit/s throughput
▪ 2x USB 3.0 interface
▪ PCAPNG packet capture format
▪ PCAP filtering
▪ Protocol independent packet capture
▪ Local storage on USB drive
▪ NTP time synchronization
▪ Secure Super Long Life (S2L2)
Linux OS
▪ IEC 62443-4-2 Security Level 3
compliant
▪ Data integrity via sequence
numbers and SHA512 based record
signatures
▪ Secure communication via TLS1.2
▪ Certificate management in PKI
infrastructure or enabled for local
security measures
▪ Secure boot and secure key store
▪ Hardware watchdog
▪ Keep alive messages
▪ RS485 interface for feedback
channel
▪ SD card with configuration data
▪ OPC UA based diagnostic interface
▪ Tagged VLAN support
▪ Prepared for IPv6 operation
▪ SNMPv3 alarm messages
▪ Firmware update
Features
Restricted © Siemens Mobility GmbH 2019
2019Page 27 Andres G. Guilarte / Secure Connectivity
App
Cloud / MindSphere
SW - Gateway
Receiver
SW- Gateway- Data
Collector
Customer Assets
Secure Connectivity Solution + Apps
Solution breakdown
Local
OpenNetworkSafetyNetwork
Gateway
Data Collector
DCU
1
2
4
6
5
▪ Application running in MindSphere
▪ Visualization on standard PC web browsers or mobile devices (Android/iOS)
▪ Cloud / MindSphere IoT Platform collecting real time/live data
▪ Host Application for visualization, advanced functions and analytics
▪ Capture and store data from DCU
▪ Secure network to the cloud
▪ Push data to local LAN or cloud via dedicated secured MindSphere Protocol
▪ Perform cybersecurity function via Data Diode
▪ Isolate Safety network from Open Network (Secure bridge between OT & IT)
▪ Capture and filter all diagnostic data from the connected/monitored aseets
▪ Siemens or third party products in operation
HW - Data Capture
Unit (DCU)
3
Cloud
Restricted © Siemens Mobility GmbH 2019
2019Page 28 Andres G. Guilarte / Secure Connectivity
DCU as a secure network tap or one-way gateway
Configurations
Securely capture any bit stream, independent of protocol, over
any asset or network segment or terminated connection in
a critical network
Enable a full duplex communication link over unidirectional
gateway with Client and Server proxies running gateway
software
1. Monitoring 2. One-way gateway
Restricted © Siemens Mobility GmbH 2019
2019Page 29 Andres G. Guilarte / Secure Connectivity
Connectivity in Rail is a reality
Rolling stock and rail infrastructure
Trains and infrastructure are
connected across systems
Maintenance and operations
Optimized service for 100% availability & Security
Data analysis and rail expertise
Artificial intelligence combined
with unique domain know-how
Ecosystem
Open ecosystem integrating
best-in-class rail applications
Mobility connectivity solution suite
Various standardized solutions for assets
of all types and ages are provided by our
connectivity toolbox.
Restricted © Siemens Mobility GmbH 2019
2019Page 30 Andres G. Guilarte / Secure Connectivity
Optional Cybersecurity Offerings
Secure OT – IT Integration
Goals
Predict when and where to
expect security risks, before
they occur
Enable the organization
to adequately address security
and provide technology as
building blocks for security
Offering
We offer
• Threat and Risk Analysis
• Self-Assessments
• Threat Intelligence
• Security Analytics
We offer
• Managed Identities and Access
• Secure Communications and
Applications
• Embedded Security Anchors
• Security Robustness
• Advanced Cryptography
• Security Standardization
(e.g. Protocols, Interfaces)
• Security Requirements
• Security Architecture
• Security Engineering
• Customizing and Integrating
Building Blocks and 3rd Party
Components
• Process Improvements
• Qualification and Training,
Coaching
• Definition of Roles in Organization
• Technical Guidelines
(e.g. Hardening, Coding)
Measure and assure
adequate security level
We offer
• Penetration Tests and Attestation
• Security Test Tools
• Compliance Readiness
Assessment (e.g. ISO2700x,
IEC62443)

More Related Content

What's hot

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)PECB
 
CCTV camera by_osama_noori
CCTV camera by_osama_nooriCCTV camera by_osama_noori
CCTV camera by_osama_nooriOsama Noori
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptDelforChacnCornejo
 
Shri pps
Shri ppsShri pps
Shri ppslshri
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton ChuvakinAnton Chuvakin
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter IIJavier Tallón
 
Zararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC Kullanımı
Zararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC KullanımıZararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC Kullanımı
Zararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC KullanımıBGA Cyber Security
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controlsAlienVault
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity AssessmentDoreen Loeber
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdfAhmedRKhan
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Priyanka Aash
 
cyberedu_module_4_cybersecurite_organisation_02_2017.pptx
cyberedu_module_4_cybersecurite_organisation_02_2017.pptxcyberedu_module_4_cybersecurite_organisation_02_2017.pptx
cyberedu_module_4_cybersecurite_organisation_02_2017.pptxJean-Michel Razafindrabe
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSSylvain Martinez
 
Introduction to Social Engineering
Introduction to Social EngineeringIntroduction to Social Engineering
Introduction to Social EngineeringMuhammad Ridwan
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approachesvngundi
 
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?BGA Cyber Security
 

What's hot (20)

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)The Next Generation of Security Operations Centre (SOC)
The Next Generation of Security Operations Centre (SOC)
 
CCTV camera by_osama_noori
CCTV camera by_osama_nooriCCTV camera by_osama_noori
CCTV camera by_osama_noori
 
Industrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.pptIndustrial control systems cybersecurity.ppt
Industrial control systems cybersecurity.ppt
 
Shri pps
Shri ppsShri pps
Shri pps
 
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
10X SOC - SANS Blue Summit Keynote 2021 - Anton Chuvakin
 
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
Industrial Automation Control Systems Cybersecurity Certification.  Chapter IIIndustrial Automation Control Systems Cybersecurity Certification.  Chapter II
Industrial Automation Control Systems Cybersecurity Certification. Chapter II
 
Zararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC Kullanımı
Zararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC KullanımıZararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC Kullanımı
Zararlı Yazılım Tespiti ve Siber i̇stihbarat Amaçlı IOC Kullanımı
 
Aujas Cyber Security
Aujas Cyber SecurityAujas Cyber Security
Aujas Cyber Security
 
Security operations center 5 security controls
 Security operations center 5 security controls Security operations center 5 security controls
Security operations center 5 security controls
 
Cyber Security Maturity Assessment
 Cyber Security Maturity Assessment Cyber Security Maturity Assessment
Cyber Security Maturity Assessment
 
Industrial Security.pdf
Industrial Security.pdfIndustrial Security.pdf
Industrial Security.pdf
 
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
Security Strategy and Tactic with Cyber Threat Intelligence (CTI)
 
cyberedu_module_4_cybersecurite_organisation_02_2017.pptx
cyberedu_module_4_cybersecurite_organisation_02_2017.pptxcyberedu_module_4_cybersecurite_organisation_02_2017.pptx
cyberedu_module_4_cybersecurite_organisation_02_2017.pptx
 
INCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTSINCIDENT RESPONSE CONCEPTS
INCIDENT RESPONSE CONCEPTS
 
Introduction to Social Engineering
Introduction to Social EngineeringIntroduction to Social Engineering
Introduction to Social Engineering
 
Cyber Security Strategies and Approaches
Cyber Security Strategies and ApproachesCyber Security Strategies and Approaches
Cyber Security Strategies and Approaches
 
Industrial_Cyber_Security
Industrial_Cyber_SecurityIndustrial_Cyber_Security
Industrial_Cyber_Security
 
Crowdstrike .pptx
Crowdstrike .pptxCrowdstrike .pptx
Crowdstrike .pptx
 
3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?3. parti firma risklerinden nasıl korunulur?
3. parti firma risklerinden nasıl korunulur?
 

Similar to Secure Connectivity for Rail Infrastructure Monitoring

Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorADVA
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsM2M Alliance e.V.
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019TI Safe
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...Brain IoT Project
 
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...Sun Telecom
 
Brochure network security-en
Brochure network security-enBrochure network security-en
Brochure network security-ensandeep1721
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...TI Safe
 
Communication part consists of client module SCALANCE W747-1RR.
Communication part consists of client module SCALANCE W747-1RR.Communication part consists of client module SCALANCE W747-1RR.
Communication part consists of client module SCALANCE W747-1RR.James George
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-enVahid RG-zadeh
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructureStuart Bennett
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Bosnia Agile
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetIvan Carmona
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2MLeKhanhAnh
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substationsRyan O'Mara
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver NarrTI Safe
 
Device Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial EthernetDevice Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial EthernetMETZ CONNECT USA Inc.
 

Similar to Secure Connectivity for Rail Infrastructure Monitoring (20)

Introducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchorIntroducing Adva Network Security – a trusted German anchor
Introducing Adva Network Security – a trusted German anchor
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
Embedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applicationsEmbedded SIM New opportunities for security sensitive IoT applications
Embedded SIM New opportunities for security sensitive IoT applications
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
 
SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...SAM-IoT: Securing low power device communication in critical infrastructure m...
SAM-IoT: Securing low power device communication in critical infrastructure m...
 
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
How Enterprise is Turning to the FTTM to Accelerate Industry Digital Transfor...
 
Brochure network security-en
Brochure network security-enBrochure network security-en
Brochure network security-en
 
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
CLASS 2018 - Palestra de Murilo Morais (Head do segmento Cloud Application So...
 
Communication part consists of client module SCALANCE W747-1RR.
Communication part consists of client module SCALANCE W747-1RR.Communication part consists of client module SCALANCE W747-1RR.
Communication part consists of client module SCALANCE W747-1RR.
 
Brochure industrial security-en
Brochure industrial security-enBrochure industrial security-en
Brochure industrial security-en
 
IIoT, Security and Ethernet Design - Peter Brown
IIoT, Security and Ethernet Design - Peter BrownIIoT, Security and Ethernet Design - Peter Brown
IIoT, Security and Ethernet Design - Peter Brown
 
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
Security Issues and challenges with Wireless M2Mutilising Cloud infrastructureSecurity Issues and challenges with Wireless M2Mutilising Cloud infrastructure
Security Issues and challenges with Wireless M2M utilising Cloud infrastructure
 
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
Connect, Secure & Automate the Distribution Grid with CISCO SCADA RTU - Eximp...
 
Fog ppt
Fog ppt Fog ppt
Fog ppt
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Introduction IOT/M2M
Introduction IOT/M2MIntroduction IOT/M2M
Introduction IOT/M2M
 
SIPROTEC 5 - The core of digital substations
SIPROTEC 5  - The core of digital substationsSIPROTEC 5  - The core of digital substations
SIPROTEC 5 - The core of digital substations
 
[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr[CLASS 2014] Palestra Técnica - Oliver Narr
[CLASS 2014] Palestra Técnica - Oliver Narr
 
FOG COMPUTING
FOG COMPUTINGFOG COMPUTING
FOG COMPUTING
 
Device Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial EthernetDevice Connection Systems for Industrial Ethernet
Device Connection Systems for Industrial Ethernet
 

Recently uploaded

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 

Recently uploaded (20)

Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 

Secure Connectivity for Rail Infrastructure Monitoring

  • 1. Restricted © Siemens Mobility GmbH 2019 2019Page 1 Andres G. Guilarte / Secure Connectivity Bulletproof IoT in Rail Safe & Secure Connectivity for rail www.siemens.com.dcuSiemens Mobility GmbH 2019
  • 2. Restricted © Siemens Mobility GmbH 2019 2019Page 2 Andres G. Guilarte / Secure Connectivity Cybersecurity in Rail more frequent and severe and it will only increase WannaCry
  • 3. Restricted © Siemens Mobility GmbH 2019 2019Page 3 Andres G. Guilarte / Secure Connectivity … and risks WHY? Increased connectivity and evolving threat landscape Opportunities Blue Boxing Cryptovirology AOHell Level Seven Crew hack Denial-of-service attacks Cloudbleed sl1nk SCADA hacks Meltdown/Spectre Infineon/TPM AT&T Hack Morris Worm Melissa Worm ILOVEYOU WannaCry NotPetya Heartbleed Industroyer/Chrashoverride Stuxnet Signaling systems move from dedicated and separate to interconnected and standardized system of systems using COTS components Exposure to malicious cyber attacks is also growing dramatically, putting our lives and the stability of our society at risk 2000 2004 2008 2012 2016 202019961988 1992 Remote Operation of Interlocking CBTC over WiFi Electronic Interlocking Industrial IoT – Data Analytics – Artificial Intelligence ETCS over GSM-R Page 3
  • 4. Restricted © Siemens Mobility GmbH 2019 2019Page 4 Andres G. Guilarte / Secure Connectivity Approaches for rail cyber security Application of accepted and aligned standards IEC 62443 ISO 27001 Page 4
  • 5. Restricted © Siemens Mobility GmbH 2019 2019Page 5 Andres G. Guilarte / Secure Connectivity Charter of Trust co-founded by Siemens in 2018 1 Protecting the data of individuals and companies 2 Preventing damage from people, companies and infrastructures 3 Establishing a reliable foundation on which confidence in a networked, digital world can take root and grow Page 5 Leading global companies joined forces for creating security in a networked world.
  • 6. Restricted © Siemens Mobility GmbH 2019 2019Page 6 Andres G. Guilarte / Secure Connectivity The cost of “IoT” has dropped as new ways to analyze mountains of data were developed What is overlooked is a secure and cost effective solution to connect critical infrastructure to the Internet For example…
  • 7. Restricted © Siemens Mobility GmbH 2019 2019Page 7 Andres G. Guilarte / Secure Connectivity2019Page 7 Andres G. Guilarte / Secure Connectivity Restricted © Siemens Mobility GmbH 2019 Cybersecurity regulations for Rail • IEC 62443: Industrial communication networks – network and system security • ISO 27001: Information security management systems Security standards • OT security threats are a relatively new topic for the industry • Industrial systems typically have a long lifecycle (≥ 20 years) • Increasing connectivity (convergence of IT and OT, connection to cloud etc.) Long life-cycles + complex systems + IT overlapping Security of network and information systems (NIS) IT-Sicherheitsgesetz National strategy for the protection against cyber risks APCIP (Austrian Program for Critical Infrastructure Protection) Ley 8/2011 Loi de Programmation Militaire UK Cyber Security Strategy; Rail Cyber Security China Cyber Security Law The Comprehensive National Cybersecurity Initiative Russian federal service for technical and export control, N 31 of 03.14.2014 New national and international security laws and initiatives FR Network and Information Security Agency (ANSSI) - “Firewalls are not allowed to be used to connect any class 3 network, such as railway switching systems, to a lower class network or corporate network, only unidirectional technology is permitted” US Department of Homeland Security (DHS): Regulators have encouraged the use of unidirectional gateways to protect equipment and processes in safety instrumented systems (SiS) UK Department for Transport (DFT) - Signaling systems should be protected with unidirectional gateways and that there should be a clear separation between enterprise and operational rail networks. DE German association of machinery and plant engineering (VDMA) - Recommends the use of data diodes to protect critical network segments & transition zones. Factors
  • 8. Restricted © Siemens Mobility GmbH 2019 2019Page 8 Andres G. Guilarte / Secure Connectivity Rail security and IT security have different priorities Harsh Environment Location of use Climate-controlled offices Rail commissioning personnel Installation Network specialists Automation-specific Topology Star-shaped Network failure times <300 ms Availability Second to minute range accepted Low, switches with fewer ports Device density High, switches with large number of ports Part of automation monitoring Network monitoring By trained specialist Integrity Availability ConfidentialityConfidentiality Availability Integrity Rail (OT) Security IT Security Highest priority
  • 9. Restricted © Siemens Mobility GmbH 2019 2019Page 9 Andres G. Guilarte / Secure Connectivity2019Page 9 Andres G. Guilarte / Secure Connectivity Restricted © Siemens Mobility GmbH 2019 Connectivity Built-in Siemens offers to pre-equip new systems with secure connectivity HW as a standard ! EBA Certified Highest safety standards in rail automation ! Protecting & Connecting data of safety critical networks DCU, a World first!
  • 10. Restricted © Siemens Mobility GmbH 2019 2019Page 10 Andres G. Guilarte / Secure Connectivity DCU provides cost-effective secure connectivity to all critical infrastructure 10 01 01 11 01 00 11 10 10 01 01 11 10 01 01 11 10 01 01 00 01 00 11 10 10 01 01 11 10 01 01 11 Data Capture Unit (HW) DCU One-way gateway (SW) Receiver One-way gateway (SW) Sender Industrial IoT Operating System (cloud or local IT) Receive and push data Customer Assets Isolates Critical OT network from IT network Your critical network remains physically isolated via the integration of the Data Capture Unit (DCU) as an IT – OT 100% secure edge device 10 01 01 11 10 01 01 11 10 01 01 11 MindSphere Apps Collects and filter data Critical Network (OT) (IT) Open Network Data Capture Unit (DCU) has lowered the cost of unidirectional connectivity 20X
  • 11. Restricted © Siemens Mobility GmbH 2019 2019Page 11 Andres G. Guilarte / Secure Connectivity DCU Connects while keeping networks physically separated No possibility of interfering with the critical network • Purely passive with no influence on critical network—no possibility of introducing external data into critical network • Unidirectional, unobtrusive, and undetectable— keeps critical and open networks physically separated • Use as a smart & secure network tap or one-way gateway with gateway applications • IEC 62443-4-2 Security Level 3 with Secure Super Long Life Linux OS and IT security features • Gateway protocols like file transfer and OPC-UA across a unidirectional connection Networks protected by firewalls are not infallible; in all known cases of successful cyber-attacks, networks had firewalls in place IPC 1 DCU IPC 2 Power
  • 12. Restricted © Siemens Mobility GmbH 2019 2019Page 12 Andres G. Guilarte / Secure Connectivity How? Our hardware design ▪ Guarantees complete protection and isolation of networks, hardware design that lacks the vulnerability of firewalls ▪ Reliable - MTBF +500.000hrs ▪ Privacy and data integrity via TLS for encrypted communication to IT or cloud ▪ Galvanic isolation & physical separation ensures only one-way communication ▪ Optional software emulating bi- directional communication Critical network Open network Rx TxPHY PHY Rx Tx Rx Tx Rx Tx Rx Tx 4 Siemens DCU Electromagnetic induction
  • 14. Restricted © Siemens Mobility GmbH 2019 2019Page 14 Andres G. Guilarte / Secure Connectivity Interlockings Real time data capture from electronic interlocking safety network Siemens Mobility Data Center Data analytics and visualization of bus communications to identify anomalies and point machine defect prediction 6-8 hours in advance of a potential failure Siemens Simis Interlocking Bremen HbF (Main Station) Vital electronic interlocking system
  • 15. Restricted © Siemens Mobility GmbH 2019 2019Page 15 Andres G. Guilarte / Secure Connectivity Overview Key features • Status of interlocking over a defined time period with monitoring : • Switches • BUS communication (telegram retransmissions) • Status and time signals are turned on/off, • closing time of level crossings • EGM time stamp messages Benefits • Increase availability without additional sensors • Efficient planning of maintenance activities/ optimization of maintenance planning
  • 16. Restricted © Siemens Mobility GmbH 2019 2019Page 16 Andres G. Guilarte / Secure Connectivity Interlocking messaging data Allows to identify trends Interlocking messaging data (Simis C, Simis D, Sicas) Analysis of interlocking traffic and traffic quality Point failure prediction Occupation analysis of infrastructure components Monitoring of media entry in cabling for signals Improvement of maintenance after earthing events
  • 17. Restricted © Siemens Mobility GmbH 2019 2019Page 17 Andres G. Guilarte / Secure Connectivity Interlocking messaging data Allows to identify trends .. Point machine operation behavior and weather
  • 18. Restricted © Siemens Mobility GmbH 2019 2019Page 18 Andres G. Guilarte / Secure Connectivity Wayside equipment Real time data capture from safety network for track circuits data Wayside Track circuit component Equipment room Data from control module Central office Cloud-based data processing, analysis and visualization Siemens TCM 100 DCU provides secure, passive access to safety critical network Livestream
  • 19. Restricted © Siemens Mobility GmbH 2019 2019Page 19 Andres G. Guilarte / Secure Connectivity Secure Connectivity solution + App App: Clearguard Performance Monitoring Basic functionalities: 1. Access from any PC, Tablet or Smartphone. 2. Real time overview and status of all the connected assets 3. Real time performance monitoring and event recording 4. Real time and automatic notifications of asset malfunction 5. Centralized management of alarms per asset / line. 6. Digital tickets for fast troubleshooting and paperless response to alarms 7. Automatic troubleshooting guide for fast repair / calibration 8. Simultaneous visualization of multiple assets for behavior analysis with neighboring effect 9. Different user accounts for operator / maintainer profiles. 10. 5yrs storage of all the data generated by the assets for investigation of failure/incidents analysis or data analytics.
  • 20. Restricted © Siemens Mobility GmbH 2019 2019Page 20 Andres G. Guilarte / Secure Connectivity Operation Control Systems Real-time data capture to enable digital services Problem • Operator needed connectivity for an operation and control system. • No compromise on safety – Zero modification of safety case. • Critical data needed to be safely captured and sent across the globe for monitoring, data analysis, and smart prediction. Solution • Data sent to Germany for remote support during start-ups and real time system error analysis to reduced downtime. Customer Benefit • DCU proved trustworthy and simple for secure communication of critical data • No additional sensors • Zero interference to the existing system • Reduced system downtime by giving remote access to the system Operation Control System Hong Kong
  • 21. Restricted © Siemens Mobility GmbH 2019 2019Page 21 Andres G. Guilarte / Secure Connectivity Intrusion Detection Systems (IDS) = Safe and secure transmission of network traffic/bus communication data; DCU = Data Capture Unit Step 1 Safe and secure transmission of network traffic Step 2 Automatic identification of anomalies + intrusions Step 3 • “Sort out” false positives • Analysis + evaluation Step 4 Quick notifications Problem-solving advice, others On-premise Operations control system DCU Intrusion Detection System Operator - End customer Off-premise or Cloud Monitor Anomalies, suspicious incidents Cybersecurity Operations Center (1st level) Support by R&D (3rd level) Support by security experts (2nd level) Dashboard
  • 22. Restricted © Siemens Mobility GmbH 2019 2019Page 22 Andres G. Guilarte / Secure Connectivity Real-time Intrusion Detection of safety critical Networks Remote or Central office On-premise or Cloud-based Intrusion detection Interlocking Room Data from Interlocking network IDS SW
  • 23. Bulletproof IoT in Rail More information at www.siemens.com/dcu Andres G. Guilarte Global Business and Technology strategy Siemens Mobility GmbH Berlin & Braunschweig, Germany andres.guilarte@siemens.com
  • 24. Restricted © Siemens Mobility GmbH 2019 2019Page 24 Andres G. Guilarte / Secure Connectivity Q&A What is the most important need for you, as an operator/vendor? A Q 1 Secure access to critical network to get real-time data 2 Vendor locked data – proprietary protocols 3 Real time data Vs. warehoused 4 Network security – Access to cloud 5 Asset monitoring
  • 25. Restricted © Siemens Mobility GmbH 2019 2019Page 25 Andres G. Guilarte / Secure Connectivity Data-based & cloud applications for Daily Rail security management tasks Cloud-based condition monitoring • Cloud connection without increase of attack surface • Option for "dormant" bi- directional link for algorithm updates Managed OT security services • Ensured plant communication for security data collection • Option to protect a single connection or individual critical network segments Invisible security monitoring • Overlay security monitoring network • Invisible to attackers • Prevention of anti-forensic techniques (e.g., footprint cleaning) Network monitoring and management • Ensured availability of critical assets is monitored • Segmented and monitored communication • Option for true air-gapped systems (SIS, interlocking networks) Secure delivery of patches and updates • Unidirectional file replication from DMZ to secure "update zone" • Focus on antivirus updates and software update delivery • Inbound only mode prevents interactive malicious behavior Transient media secure access • Additional step to prevent cross- contamination across multiple critical network zones • Combination of diode and USB storage media sanitization possible • Ensured protection when using USB media usage And more … Process historian data collection Database replication CCTV NTP Edge or cloud Analytics • Predictive maintenance • Process Optimization • AI-enabled applications
  • 26. Restricted © Siemens Mobility GmbH 2019 2019Page 26 Andres G. Guilarte / Secure Connectivity Data Capture Unit (DCU) Features ▪ Power supply 24 VDC (16.8-78 VDC) ▪ Power consumption 3.4 to 7.2 W ▪ Current consumption 229 mA (24V / four ports active) ▪ Overvoltage protection 85 VDC, 1 s ▪ Electrical isolation Ethernet ports 1.5 kV ▪ Electrical isolation Power supply 3.5 kV ▪ USB port max current supply 500 mA ▪ Temperature range -40ºC to +85ºC / - 40ºF to +185ºF ▪ Dimensions (HxWxD) 167 x 60.6 x 110.5 mm ▪ MTBF +/- 500.000 hrs Specifications DCU 1.0 ▪ Passive interception, galvanic isolation, and physical separation between critical and open network ▪ 4x 10 Mbit/s, full duplex capture ports ▪ 1x Gigabit Ethernet output ▪ >30 Mbit/s throughput ▪ 1x USB 3.0 interface ▪ PCAPNG packet capture format ▪ PCAP filtering ▪ Protocol independent packet capture ▪ Local storage on USB drive ▪ NTP time synchronization ▪ Linux OS Features DCU 2.0 ▪ Passive interception, galvanic isolation, and physical separation between critical and open network ▪ 4x 10/100 Mbit/s, full duplex capture ports ▪ 1x Gigabit Ethernet output1 ▪ >200 Mbit/s throughput ▪ 2x USB 3.0 interface ▪ PCAPNG packet capture format ▪ PCAP filtering ▪ Protocol independent packet capture ▪ Local storage on USB drive ▪ NTP time synchronization ▪ Secure Super Long Life (S2L2) Linux OS ▪ IEC 62443-4-2 Security Level 3 compliant ▪ Data integrity via sequence numbers and SHA512 based record signatures ▪ Secure communication via TLS1.2 ▪ Certificate management in PKI infrastructure or enabled for local security measures ▪ Secure boot and secure key store ▪ Hardware watchdog ▪ Keep alive messages ▪ RS485 interface for feedback channel ▪ SD card with configuration data ▪ OPC UA based diagnostic interface ▪ Tagged VLAN support ▪ Prepared for IPv6 operation ▪ SNMPv3 alarm messages ▪ Firmware update Features
  • 27. Restricted © Siemens Mobility GmbH 2019 2019Page 27 Andres G. Guilarte / Secure Connectivity App Cloud / MindSphere SW - Gateway Receiver SW- Gateway- Data Collector Customer Assets Secure Connectivity Solution + Apps Solution breakdown Local OpenNetworkSafetyNetwork Gateway Data Collector DCU 1 2 4 6 5 ▪ Application running in MindSphere ▪ Visualization on standard PC web browsers or mobile devices (Android/iOS) ▪ Cloud / MindSphere IoT Platform collecting real time/live data ▪ Host Application for visualization, advanced functions and analytics ▪ Capture and store data from DCU ▪ Secure network to the cloud ▪ Push data to local LAN or cloud via dedicated secured MindSphere Protocol ▪ Perform cybersecurity function via Data Diode ▪ Isolate Safety network from Open Network (Secure bridge between OT & IT) ▪ Capture and filter all diagnostic data from the connected/monitored aseets ▪ Siemens or third party products in operation HW - Data Capture Unit (DCU) 3 Cloud
  • 28. Restricted © Siemens Mobility GmbH 2019 2019Page 28 Andres G. Guilarte / Secure Connectivity DCU as a secure network tap or one-way gateway Configurations Securely capture any bit stream, independent of protocol, over any asset or network segment or terminated connection in a critical network Enable a full duplex communication link over unidirectional gateway with Client and Server proxies running gateway software 1. Monitoring 2. One-way gateway
  • 29. Restricted © Siemens Mobility GmbH 2019 2019Page 29 Andres G. Guilarte / Secure Connectivity Connectivity in Rail is a reality Rolling stock and rail infrastructure Trains and infrastructure are connected across systems Maintenance and operations Optimized service for 100% availability & Security Data analysis and rail expertise Artificial intelligence combined with unique domain know-how Ecosystem Open ecosystem integrating best-in-class rail applications Mobility connectivity solution suite Various standardized solutions for assets of all types and ages are provided by our connectivity toolbox.
  • 30. Restricted © Siemens Mobility GmbH 2019 2019Page 30 Andres G. Guilarte / Secure Connectivity Optional Cybersecurity Offerings Secure OT – IT Integration Goals Predict when and where to expect security risks, before they occur Enable the organization to adequately address security and provide technology as building blocks for security Offering We offer • Threat and Risk Analysis • Self-Assessments • Threat Intelligence • Security Analytics We offer • Managed Identities and Access • Secure Communications and Applications • Embedded Security Anchors • Security Robustness • Advanced Cryptography • Security Standardization (e.g. Protocols, Interfaces) • Security Requirements • Security Architecture • Security Engineering • Customizing and Integrating Building Blocks and 3rd Party Components • Process Improvements • Qualification and Training, Coaching • Definition of Roles in Organization • Technical Guidelines (e.g. Hardening, Coding) Measure and assure adequate security level We offer • Penetration Tests and Attestation • Security Test Tools • Compliance Readiness Assessment (e.g. ISO2700x, IEC62443)