現代化企業/工業網路
The interconnectivity thatdrives productivity
6
OT
IoT
IT
BMS
持續發展的連線裝置網路涵蓋並⽀援網路實體系統,
⽽且範圍涵蓋從老舊和新建OT資產到IT和IoT裝置,
⼀直到建築物管系統的設備
The Extended Internet of Things (XIoT)
安全預
算
安全措施非一體適用
Cyber-Physical Systems (OT,IoT, IIoT, BMS)
IT Systems (servers, laptops, mobile devices)
Confidentiality, Integrity, Availability Safety, Reliability, Productivity
Proprietary Protocols and Legacy Assets
Standardized Protocols and Assets
Frequent Patching Permissibility Infrequent Patching Permissibility
Compatible with Traditional Security Tools Incompatible with Traditional Security Tools
IT ENVIRONMENTS OT ENVIRONMENTS
8
延伸現有的IT安全控管至OT環境
Extend your ITSecurity Controls to your OT Environment
整合現有的技術堆疊與工作流程
Integrate your Existing Tech Stack & Workflows with OT
獲取完整可視性
Gain Full Visibility into all CPS in your OT Environment
1
2
3
如何確保OT安全性:
三個關鍵原則
10
11.
資產發現旅程
11
定義可視性目標
Align with OTcybersecurity stakeholders on
what your current visibility challenges exist
and define the asset visibility requirements are
and the outcomes you want to achieve
選擇資產發現/探索方法
Decide which discovery methods are needed to
achieve your requirements. You will likely need more
than one method for complete asset enrichment.
實施資產發現/探索方法
Implement discovery methods to collect asset discovery
details and gain visibility into your asset inventory.
透過整合來豐富資產可視化
Connect existing asset inventory solutions with
your newly discovered OT environment to
enhance asset profiles across all solutions
PHASE 1
PHASE 2
PHASE 3
PHASE 4
PHASE 5
利用資產可視性
Use the asset data provided by discovery
methods to operationalize asset
management and other core controls that
align with your OT cybersecurity strategy.
NIST SP 800-82r3 ipd Guide to Operational Technology (OT) Security
Gartner CPS Maturity Journey
12.
Phase One: 定義可視性目標
FullyEnriched Asset Profile
IP Address MAC Address Vendor Model Firmware
Asset Type Operating System Category Rack Slot Info Serial Number
Protocol Usage Open Ports Purdue Level Criticality
Installed
Applications
Patch Level OS Version USB Devices Windows Build Acquisition Date
First Seen Last Seen Asset Owner
Authentication
Method
And more…
完整的可視性乃是一切的基石,無法對於看不清
的東西進行有效的防禦
12
13.
Phase Two: 選擇資產發現/探索方法
Passive
Monitoring
ContinuousMonitoring of
network traffic to identify
asset profiles
Safe Queries
Targeted discovery of
assets in their native
protocol
Claroty Edge
Speedy, host-based
asset profiling through
localized queries
Project File
Analysis
Regular ingestion of
offline configuration files
for asset enrichment
13
14.
Phase Three: 實施資產發現/探索方法
Level2
Local Site
Level 0
Physical Process
Level 3
Control Center
Level 3.5
Plant DMZ
Level 1
Controllers
Level 4
Enterprise
Level 5
Internet
Claroty’s的資產發現方法有助於確
保複雜工業網路的全面覆蓋
14
15.
Phase Three: 實施資產發現/探索方法
Level2
Local Site
Level 0
Physical Process
Level 3
Control Center
Level 3.5
Plant DMZ
Level 1
Controllers
Level 4
Enterprise
Level 5
Internet
Claroty’s的資產發現方法有助於確
保複雜工業網路的全面覆蓋
ü Passive
15
16.
Phase Three: 實施資產發現/探索方法
Level2
Local Site
Level 0
Physical Process
Level 3
Control Center
Level 3.5
Plant DMZ
Level 1
Controllers
Level 4
Enterprise
Level 5
Internet
Claroty’s的資產發現方法有助於確
保複雜工業網路的全面覆蓋
ü Passive
ü Safe Queries
ü Claroty Edge
16
17.
Phase Three: 實施資產發現/探索方法
Level2
Local Site
Level 0
Physical Process
Level 3
Control Center
Level 3.5
Plant DMZ
Level 1
Controllers
Level 4
Enterprise
Level 5
Internet
Claroty’s的資產發現方法有助於確
保複雜工業網路的全面覆蓋
ü Passive
ü Safe Queries
ü Claroty Edge
ü Project File Analysis
17
18.
Phase Four: 透過整合來豐富資產可視化
Passive/ Safe Queries / Edge/ Project File Analysis
IP Address MAC Address Vendor Model Firmware
Asset Type Operating System Category Rack Slot Info Serial Number
Protocol Usage Open Ports Purdue Level Criticality Nested Devices
Installed
Applications
Patch Level OS Version USB Devices And More…
Ecosystem Enrichment (Integrations)
Patch Level
Installed
Applications
Windows Build Acquisition Date First Seen
Last Seen Asset Owner
Authentication
Method
Switch Type And More…
採用這種多管齊下的可視性方法有助於建立
完整的資產檔案,可以透過現有的 CMDB
和其他資產管理解決方案透過豐富的生態系
統來增強資產檔案
18
33
Level 2
Process Level
Level0
Physical Level
Level 3
Operations
Level 3.5
DMZ
Level 1
Control Level
Level 4
Enterprise IT
Level 5
Internet DMZ
Site 1 Site 2
SCADA
PLC
Physical Device
DNS
Engineering
Workstation
ERP
Switch
Email Server
Reporting
SIEM Analytics
Log
Management
SRA Site SRA Site
SRA SAC
Engineering
Workstation
Web Servers
Internet
Historian Historian
DNS
Historian Historian
SCADA
Switch
PLC
Physical Device Physical Device Physical Device
Reverse Web Proxy
Reverse Web Proxy
HTTPS
SSH
Reverse
Tunnel
RDP
SRA 架構
34.
34
OT Asset
SRA Site
SRASAC
Remote User
Secure Web
(HTTPS)
SSH Reverse
Tunnel
SSH Reverse
Tunnel
SRA Site
SRA SAC
Remote User
VPN Over
SSL
SSH Reverse
Tunnel
SSH Reverse
Tunnel
OT Asset
SRA Site
SRA SAC
Remote User
Secure Web
(HTTPS)
SSH Reverse
Tunnel
SSH Reverse
Tunnel
Web based
remote access
Application
based remote
access
Secure file
transfer
PLC
Modbus
SRA 支援所有 OT 遠端存取案例