SlideShare a Scribd company logo
1 of 11
Download to read offline
GENERAL PERSPECTIVE ON
TRANSFORMATIVE INDUSTRY TRENDS IN
CYBER-SECURITY AT DESIGNING
SOLUTIONS FOR THE INDUSTRIAL
INTERNET OF THINGS, TRADITIONAL
PNEUMATIC AND ACTUATING CONTROL
SYSTEMS.
-
By Kapil Sabharwal
INDUSTRIAL PROCESS AUTOMATION SYSTEMS, PROCESS CONTROL SYSTEMS & DATA SYSTEMS BENEFITED GREATELY FROM TRANSITIONING
OF THEIR OPTIMIZED NETWORKS THAT WERE TYPICALLY USED IN PAST TO MODERN ETHERNET & IP NETWORKING TECHNOLOGIES.
INDUSTRIAL NETWORK DESIGN REQUIREMENTS INCLUDED FOLLOWING KEY FEATURES:
INDUSTRIAL CHARACTERISTICS:
THE ENVIRONMENT IN INDUSTRIAL PLANTS PRESENTS UNIQUE CHALLENGES, SUCH AS RF DISTURBANCE, AMBIENT TEMPERATURE,
SHOCK OR VIBRATION, HUMIDITY & CHEMICAL INTERACTIONS THAT MUST BE CONSIDERED.
INTERCONNECTIVITY & INTEROPERABILITY:
THE PROTOCOLS APPLIED IN INDUSTRIAL NETWORKS & DEVICES FROM DIFFERENT VENDORS SHOULD BE VALIDATED FOR
INTERCOMMUNICATIONS WITH EACH OTHER.
REAL-TIME COMMUNICATION, PERFORMANCE AND HIGH AVAILABILITY:
INDUSTRIAL NETWORKS ARE MISSION CRITICAL, REVENUE IS IMPACTED NEGATIVELY IF THEY ARE NOT AVAILABLE.
SECURITY: SECURITY FOR INDUSTRIAL NETWORKS WHEN CONNECTED EXTERNALLY AND INTERNALLY IS PARAMOUNT.
SCALABILITY, RUGGEDIZED AND HARDENED NETWORK DEVICES IN THE PLANT OPERATING ENVIRONMENT.
Whenever there is a reference of the Cybersecurity: Three Points directly applies to it.
Confidentiality, Integrity and Availability of Systems & Data achieved through procedures, softwares and hardware
products.
Securing the Edge:
WAN:
Challenges: Connecting to external sources
Solution: Hardened, trusted routing, securing overlays and underlays.
Internet facing systems:
Challenges: Known, Unknown vulnerabilities, Malware.
Solution: Deep Packet Inspection with custom signatures.
Availability:
Challenges: DDOS Attacks.
Solution: Heuristic-based ID for all traffic including Layer 7.
Interconnects:
Challenges: Confidentiality and Integrity of the data transmitted.
Solution: IPSEC tunneling at Layer 3 MPLS over GRE, EVPN or VPLS at Layer 2.
Securing Data Center Core
Challenges:
• Complexity inherent with Virtualization and Containerization.
• Speed and Performance.
• Resilience.
Solution:
Segmentation and micro-segmentation.
Management and policy control consistency.
High Speed performance connections.
Separation of data, control plane.
Stateful HA, High reliability.
Traditional Security Architectures:
• IPSEC VPNs.
• NGFWs.
• Threat Management.
• Stateful Security or Session Based.
Firewall Design Requirements:
A)
• Identify Security requirements for your Organization.
• Network Applications Discovery.
• Automated network discovery.
B)
Define overall Security Policy. Define Environment, Identify resources, systems critical to the network and other
systems that require security.
C)
Objectives for your firewall deployment.
Private addressing usage, specify how the firewall is to be managed and updated.
Identify the security vulnerabilities in the network and rectify them.
D)
Firewall enforcement Points:
Edge: Internet / Border Facing.
Core: Corporate Facing: Outgoing traffic, attack protection from the inside network.
Confidentiality:
Keep data secure with cryptography/ encrypting the data.
Integrity: Ensuring the data remains unchanged.
Authentication:
Threat Management Services:
Anti-Virus.
Anti-Spam.
Anti-Malware Grid.
Web-Filtering.
Modernize your Perimeter/ Edge:
Application Visibility Control.
Intrusion Prevention.
User-Based Firewall.
Threat Management:
Anti-Virus.
Anti-Spam.
Web-Filtering.
NAT.
Reporting.
Botnets/ C&C.
VPN.
Analytics.
Evasive Malware protection.
Reporting and Analytics.
Routing and Automation.
Network Security Tasks for Branch Offices:
Need to control access for wired and wireless users.
Allow remote access and BYOD.
Isolate network segments and control communications.
Protect from threats.
Securely Connect to different locations.
Classify who is the customer of your network?
Corporate Users : Must be authenticated, Access based on role.
Guest Users:
How is the access Provided?
Wired.
Wireless.
Remote: IPSEC VPNs and SSL VPNs.
Network Segmentation and Edge Security, Application Level Security, Access Control and Authentication,
Layer 2 Security Functions.
Make policies standard and simple, Add deny all rule with Session logging last, use global policy feature.
Wireless Considerations:
Encryption and Authentication.
Guest Access.
Access Point Types:
Controller Based.
Non-Controller Based.
Location Services and Analytics.

More Related Content

What's hot

A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityBoston Global Forum
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorEnergySec
 
A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...Ecwayt
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015Paul F. Roberts
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids Jishnu Pradeep
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
Top Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your OfficeTop Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your Officemecarlhooper
 
IWSN with OMNET++ Simulation
IWSN with OMNET++ SimulationIWSN with OMNET++ Simulation
IWSN with OMNET++ Simulation@zenafaris91
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733SIVA SASTHRI
 
Network Projects
Network ProjectsNetwork Projects
Network ProjectsPhdtopiccom
 

What's hot (16)

A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Top Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your OfficeTop Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your Office
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
IWSN with OMNET++ Simulation
IWSN with OMNET++ SimulationIWSN with OMNET++ Simulation
IWSN with OMNET++ Simulation
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Network Projects
Network ProjectsNetwork Projects
Network Projects
 
Shibu
ShibuShibu
Shibu
 

Similar to Industrial IOT and Security

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilitiesNirmal Thaliyil
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT TECNALIA Research & Innovation
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019TI Safe
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Deepak Shankar
 
Network Administration CUSTSPT
Network Administration CUSTSPTNetwork Administration CUSTSPT
Network Administration CUSTSPTEmmanuel Baldwin
 
Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Carotek
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesDr Dev Kambhampati
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfAnil
 
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...itconsultancynj104
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfRayanneAguiar4
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution Naved Ahmed
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 

Similar to Industrial IOT and Security (20)

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Unit_3.pptx
Unit_3.pptxUnit_3.pptx
Unit_3.pptx
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Network Administration CUSTSPT
Network Administration CUSTSPTNetwork Administration CUSTSPT
Network Administration CUSTSPT
 
Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 

Recently uploaded

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard37
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Zilliz
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWERMadyBayot
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)Samir Dash
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 

Recently uploaded (20)

Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
JohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptxJohnPollard-hybrid-app-RailsConf2024.pptx
JohnPollard-hybrid-app-RailsConf2024.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 

Industrial IOT and Security

  • 1. GENERAL PERSPECTIVE ON TRANSFORMATIVE INDUSTRY TRENDS IN CYBER-SECURITY AT DESIGNING SOLUTIONS FOR THE INDUSTRIAL INTERNET OF THINGS, TRADITIONAL PNEUMATIC AND ACTUATING CONTROL SYSTEMS. - By Kapil Sabharwal
  • 2. INDUSTRIAL PROCESS AUTOMATION SYSTEMS, PROCESS CONTROL SYSTEMS & DATA SYSTEMS BENEFITED GREATELY FROM TRANSITIONING OF THEIR OPTIMIZED NETWORKS THAT WERE TYPICALLY USED IN PAST TO MODERN ETHERNET & IP NETWORKING TECHNOLOGIES. INDUSTRIAL NETWORK DESIGN REQUIREMENTS INCLUDED FOLLOWING KEY FEATURES: INDUSTRIAL CHARACTERISTICS: THE ENVIRONMENT IN INDUSTRIAL PLANTS PRESENTS UNIQUE CHALLENGES, SUCH AS RF DISTURBANCE, AMBIENT TEMPERATURE, SHOCK OR VIBRATION, HUMIDITY & CHEMICAL INTERACTIONS THAT MUST BE CONSIDERED. INTERCONNECTIVITY & INTEROPERABILITY: THE PROTOCOLS APPLIED IN INDUSTRIAL NETWORKS & DEVICES FROM DIFFERENT VENDORS SHOULD BE VALIDATED FOR INTERCOMMUNICATIONS WITH EACH OTHER. REAL-TIME COMMUNICATION, PERFORMANCE AND HIGH AVAILABILITY: INDUSTRIAL NETWORKS ARE MISSION CRITICAL, REVENUE IS IMPACTED NEGATIVELY IF THEY ARE NOT AVAILABLE. SECURITY: SECURITY FOR INDUSTRIAL NETWORKS WHEN CONNECTED EXTERNALLY AND INTERNALLY IS PARAMOUNT. SCALABILITY, RUGGEDIZED AND HARDENED NETWORK DEVICES IN THE PLANT OPERATING ENVIRONMENT.
  • 3.
  • 4.
  • 5. Whenever there is a reference of the Cybersecurity: Three Points directly applies to it. Confidentiality, Integrity and Availability of Systems & Data achieved through procedures, softwares and hardware products. Securing the Edge: WAN: Challenges: Connecting to external sources Solution: Hardened, trusted routing, securing overlays and underlays. Internet facing systems: Challenges: Known, Unknown vulnerabilities, Malware. Solution: Deep Packet Inspection with custom signatures. Availability: Challenges: DDOS Attacks. Solution: Heuristic-based ID for all traffic including Layer 7. Interconnects: Challenges: Confidentiality and Integrity of the data transmitted. Solution: IPSEC tunneling at Layer 3 MPLS over GRE, EVPN or VPLS at Layer 2.
  • 6. Securing Data Center Core Challenges: • Complexity inherent with Virtualization and Containerization. • Speed and Performance. • Resilience. Solution: Segmentation and micro-segmentation. Management and policy control consistency. High Speed performance connections. Separation of data, control plane. Stateful HA, High reliability.
  • 7. Traditional Security Architectures: • IPSEC VPNs. • NGFWs. • Threat Management. • Stateful Security or Session Based. Firewall Design Requirements: A) • Identify Security requirements for your Organization. • Network Applications Discovery. • Automated network discovery. B) Define overall Security Policy. Define Environment, Identify resources, systems critical to the network and other systems that require security. C) Objectives for your firewall deployment. Private addressing usage, specify how the firewall is to be managed and updated. Identify the security vulnerabilities in the network and rectify them. D) Firewall enforcement Points: Edge: Internet / Border Facing. Core: Corporate Facing: Outgoing traffic, attack protection from the inside network.
  • 8. Confidentiality: Keep data secure with cryptography/ encrypting the data. Integrity: Ensuring the data remains unchanged. Authentication: Threat Management Services: Anti-Virus. Anti-Spam. Anti-Malware Grid. Web-Filtering.
  • 9. Modernize your Perimeter/ Edge: Application Visibility Control. Intrusion Prevention. User-Based Firewall. Threat Management: Anti-Virus. Anti-Spam. Web-Filtering. NAT. Reporting. Botnets/ C&C. VPN. Analytics. Evasive Malware protection. Reporting and Analytics. Routing and Automation.
  • 10. Network Security Tasks for Branch Offices: Need to control access for wired and wireless users. Allow remote access and BYOD. Isolate network segments and control communications. Protect from threats. Securely Connect to different locations. Classify who is the customer of your network? Corporate Users : Must be authenticated, Access based on role. Guest Users: How is the access Provided? Wired. Wireless. Remote: IPSEC VPNs and SSL VPNs. Network Segmentation and Edge Security, Application Level Security, Access Control and Authentication, Layer 2 Security Functions. Make policies standard and simple, Add deny all rule with Session logging last, use global policy feature.
  • 11. Wireless Considerations: Encryption and Authentication. Guest Access. Access Point Types: Controller Based. Non-Controller Based. Location Services and Analytics.