SlideShare a Scribd company logo
GENERAL PERSPECTIVE ON
TRANSFORMATIVE INDUSTRY TRENDS IN
CYBER-SECURITY AT DESIGNING
SOLUTIONS FOR THE INDUSTRIAL
INTERNET OF THINGS, TRADITIONAL
PNEUMATIC AND ACTUATING CONTROL
SYSTEMS.
-
By Kapil Sabharwal
INDUSTRIAL PROCESS AUTOMATION SYSTEMS, PROCESS CONTROL SYSTEMS & DATA SYSTEMS BENEFITED GREATELY FROM TRANSITIONING
OF THEIR OPTIMIZED NETWORKS THAT WERE TYPICALLY USED IN PAST TO MODERN ETHERNET & IP NETWORKING TECHNOLOGIES.
INDUSTRIAL NETWORK DESIGN REQUIREMENTS INCLUDED FOLLOWING KEY FEATURES:
INDUSTRIAL CHARACTERISTICS:
THE ENVIRONMENT IN INDUSTRIAL PLANTS PRESENTS UNIQUE CHALLENGES, SUCH AS RF DISTURBANCE, AMBIENT TEMPERATURE,
SHOCK OR VIBRATION, HUMIDITY & CHEMICAL INTERACTIONS THAT MUST BE CONSIDERED.
INTERCONNECTIVITY & INTEROPERABILITY:
THE PROTOCOLS APPLIED IN INDUSTRIAL NETWORKS & DEVICES FROM DIFFERENT VENDORS SHOULD BE VALIDATED FOR
INTERCOMMUNICATIONS WITH EACH OTHER.
REAL-TIME COMMUNICATION, PERFORMANCE AND HIGH AVAILABILITY:
INDUSTRIAL NETWORKS ARE MISSION CRITICAL, REVENUE IS IMPACTED NEGATIVELY IF THEY ARE NOT AVAILABLE.
SECURITY: SECURITY FOR INDUSTRIAL NETWORKS WHEN CONNECTED EXTERNALLY AND INTERNALLY IS PARAMOUNT.
SCALABILITY, RUGGEDIZED AND HARDENED NETWORK DEVICES IN THE PLANT OPERATING ENVIRONMENT.
Whenever there is a reference of the Cybersecurity: Three Points directly applies to it.
Confidentiality, Integrity and Availability of Systems & Data achieved through procedures, softwares and hardware
products.
Securing the Edge:
WAN:
Challenges: Connecting to external sources
Solution: Hardened, trusted routing, securing overlays and underlays.
Internet facing systems:
Challenges: Known, Unknown vulnerabilities, Malware.
Solution: Deep Packet Inspection with custom signatures.
Availability:
Challenges: DDOS Attacks.
Solution: Heuristic-based ID for all traffic including Layer 7.
Interconnects:
Challenges: Confidentiality and Integrity of the data transmitted.
Solution: IPSEC tunneling at Layer 3 MPLS over GRE, EVPN or VPLS at Layer 2.
Securing Data Center Core
Challenges:
• Complexity inherent with Virtualization and Containerization.
• Speed and Performance.
• Resilience.
Solution:
Segmentation and micro-segmentation.
Management and policy control consistency.
High Speed performance connections.
Separation of data, control plane.
Stateful HA, High reliability.
Traditional Security Architectures:
• IPSEC VPNs.
• NGFWs.
• Threat Management.
• Stateful Security or Session Based.
Firewall Design Requirements:
A)
• Identify Security requirements for your Organization.
• Network Applications Discovery.
• Automated network discovery.
B)
Define overall Security Policy. Define Environment, Identify resources, systems critical to the network and other
systems that require security.
C)
Objectives for your firewall deployment.
Private addressing usage, specify how the firewall is to be managed and updated.
Identify the security vulnerabilities in the network and rectify them.
D)
Firewall enforcement Points:
Edge: Internet / Border Facing.
Core: Corporate Facing: Outgoing traffic, attack protection from the inside network.
Confidentiality:
Keep data secure with cryptography/ encrypting the data.
Integrity: Ensuring the data remains unchanged.
Authentication:
Threat Management Services:
Anti-Virus.
Anti-Spam.
Anti-Malware Grid.
Web-Filtering.
Modernize your Perimeter/ Edge:
Application Visibility Control.
Intrusion Prevention.
User-Based Firewall.
Threat Management:
Anti-Virus.
Anti-Spam.
Web-Filtering.
NAT.
Reporting.
Botnets/ C&C.
VPN.
Analytics.
Evasive Malware protection.
Reporting and Analytics.
Routing and Automation.
Network Security Tasks for Branch Offices:
Need to control access for wired and wireless users.
Allow remote access and BYOD.
Isolate network segments and control communications.
Protect from threats.
Securely Connect to different locations.
Classify who is the customer of your network?
Corporate Users : Must be authenticated, Access based on role.
Guest Users:
How is the access Provided?
Wired.
Wireless.
Remote: IPSEC VPNs and SSL VPNs.
Network Segmentation and Edge Security, Application Level Security, Access Control and Authentication,
Layer 2 Security Functions.
Make policies standard and simple, Add deny all rule with Session logging last, use global policy feature.
Wireless Considerations:
Encryption and Authentication.
Guest Access.
Access Point Types:
Controller Based.
Non-Controller Based.
Location Services and Analytics.

More Related Content

What's hot

A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Jiunn-Jer Sun
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
Boston Global Forum
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
EnergySec
 
A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...Ecwayt
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
JAZEEL K T
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
Paul F. Roberts
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
Jishnu Pradeep
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
Yokogawa1
 
Top Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your OfficeTop Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your Office
mecarlhooper
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
José Reynaldo Formigoni Filho, MSc
 
IWSN with OMNET++ Simulation
IWSN with OMNET++ SimulationIWSN with OMNET++ Simulation
IWSN with OMNET++ Simulation
@zenafaris91
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
SIVA SASTHRI
 
Network Projects
Network ProjectsNetwork Projects
Network Projects
Phdtopiccom
 

What's hot (16)

A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Analytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber securityAnalytics for Smart Grid Cyber security
Analytics for Smart Grid Cyber security
 
Lessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy SectorLessons Learned for a Behavior-Based IDS in the Energy Sector
Lessons Learned for a Behavior-Based IDS in the Energy Sector
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...A low cost web based remote monitoring system with built in security feature ...
A low cost web based remote monitoring system with built in security feature ...
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015John Walsh, Sypris on Cyber Physical Systems  - Boston SECoT MeetUp 2015
John Walsh, Sypris on Cyber Physical Systems - Boston SECoT MeetUp 2015
 
Cyber Security of Power grids
Cyber Security of Power grids Cyber Security of Power grids
Cyber Security of Power grids
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Top Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your OfficeTop Reasons for Setting a Wireless Connectivity in your Office
Top Reasons for Setting a Wireless Connectivity in your Office
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 
Smart grid projects and ciber security in brazil conference
Smart grid projects and ciber security in  brazil conference Smart grid projects and ciber security in  brazil conference
Smart grid projects and ciber security in brazil conference
 
IWSN with OMNET++ Simulation
IWSN with OMNET++ SimulationIWSN with OMNET++ Simulation
IWSN with OMNET++ Simulation
 
Presentation1 160729072733
Presentation1 160729072733Presentation1 160729072733
Presentation1 160729072733
 
Network Projects
Network ProjectsNetwork Projects
Network Projects
 
Shibu
ShibuShibu
Shibu
 

Similar to Industrial IOT and Security

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
Nathan Wallace, PhD, PE
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
Nirmal Thaliyil
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
Creekside Marketing Group, LLC
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
Ivan Carmona
 
Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT
TECNALIA Research & Innovation
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
TI Safe
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Deepak Shankar
 
Network Administration CUSTSPT
Network Administration CUSTSPTNetwork Administration CUSTSPT
Network Administration CUSTSPTEmmanuel Baldwin
 
Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...
Carotek
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
Dr Dev Kambhampati
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...David Sidhu
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
Anil
 
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
itconsultancynj104
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
RayanneAguiar4
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
Naved Ahmed
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Nikandrov Maxim
 

Similar to Industrial IOT and Security (20)

IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
Standards based security for energy utilities
Standards based security for energy utilitiesStandards based security for energy utilities
Standards based security for energy utilities
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
Unit_3.pptx
Unit_3.pptxUnit_3.pptx
Unit_3.pptx
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT Como abordar los retos de los grandes proyectos de IoT
Como abordar los retos de los grandes proyectos de IoT
 
Agile fractal grid 7-11-14
Agile fractal grid   7-11-14Agile fractal grid   7-11-14
Agile fractal grid 7-11-14
 
Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14Agile Fractal Grid - 7-11-14
Agile Fractal Grid - 7-11-14
 
Ignite 2019
Ignite 2019Ignite 2019
Ignite 2019
 
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
Mastering IoT Design: Sense, Process, Connect: Processing: Turning IoT Data i...
 
Network Administration CUSTSPT
Network Administration CUSTSPTNetwork Administration CUSTSPT
Network Administration CUSTSPT
 
Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...Internet of Things - structured approach to the physical plant network - Rock...
Internet of Things - structured approach to the physical plant network - Rock...
 
Dr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational AwarenessDr Dev Kambhampati | Electric Utilities Situational Awareness
Dr Dev Kambhampati | Electric Utilities Situational Awareness
 
NIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric UtilitiesNIST Guide- Situational Awareness for Electric Utilities
NIST Guide- Situational Awareness for Electric Utilities
 
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
Zones IoT Substation Protection and Security Solution NERC CIPv5-014 Overview...
 
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdfA Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
A Fascinating Behind the Scenes Look at Wireless Design Services - Techwave.pdf
 
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
Strategic Network Evolution: Leveraging IT Consulting for Network Infrastruct...
 
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdfHCSA-Presales-IP+Network+V3.0+Training+Material.pdf
HCSA-Presales-IP+Network+V3.0+Training+Material.pdf
 
Anti Hack Solution
Anti Hack Solution Anti Hack Solution
Anti Hack Solution
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 

Recently uploaded

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 

Recently uploaded (20)

The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Assure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyesAssure Contact Center Experiences for Your Customers With ThousandEyes
Assure Contact Center Experiences for Your Customers With ThousandEyes
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 

Industrial IOT and Security

  • 1. GENERAL PERSPECTIVE ON TRANSFORMATIVE INDUSTRY TRENDS IN CYBER-SECURITY AT DESIGNING SOLUTIONS FOR THE INDUSTRIAL INTERNET OF THINGS, TRADITIONAL PNEUMATIC AND ACTUATING CONTROL SYSTEMS. - By Kapil Sabharwal
  • 2. INDUSTRIAL PROCESS AUTOMATION SYSTEMS, PROCESS CONTROL SYSTEMS & DATA SYSTEMS BENEFITED GREATELY FROM TRANSITIONING OF THEIR OPTIMIZED NETWORKS THAT WERE TYPICALLY USED IN PAST TO MODERN ETHERNET & IP NETWORKING TECHNOLOGIES. INDUSTRIAL NETWORK DESIGN REQUIREMENTS INCLUDED FOLLOWING KEY FEATURES: INDUSTRIAL CHARACTERISTICS: THE ENVIRONMENT IN INDUSTRIAL PLANTS PRESENTS UNIQUE CHALLENGES, SUCH AS RF DISTURBANCE, AMBIENT TEMPERATURE, SHOCK OR VIBRATION, HUMIDITY & CHEMICAL INTERACTIONS THAT MUST BE CONSIDERED. INTERCONNECTIVITY & INTEROPERABILITY: THE PROTOCOLS APPLIED IN INDUSTRIAL NETWORKS & DEVICES FROM DIFFERENT VENDORS SHOULD BE VALIDATED FOR INTERCOMMUNICATIONS WITH EACH OTHER. REAL-TIME COMMUNICATION, PERFORMANCE AND HIGH AVAILABILITY: INDUSTRIAL NETWORKS ARE MISSION CRITICAL, REVENUE IS IMPACTED NEGATIVELY IF THEY ARE NOT AVAILABLE. SECURITY: SECURITY FOR INDUSTRIAL NETWORKS WHEN CONNECTED EXTERNALLY AND INTERNALLY IS PARAMOUNT. SCALABILITY, RUGGEDIZED AND HARDENED NETWORK DEVICES IN THE PLANT OPERATING ENVIRONMENT.
  • 3.
  • 4.
  • 5. Whenever there is a reference of the Cybersecurity: Three Points directly applies to it. Confidentiality, Integrity and Availability of Systems & Data achieved through procedures, softwares and hardware products. Securing the Edge: WAN: Challenges: Connecting to external sources Solution: Hardened, trusted routing, securing overlays and underlays. Internet facing systems: Challenges: Known, Unknown vulnerabilities, Malware. Solution: Deep Packet Inspection with custom signatures. Availability: Challenges: DDOS Attacks. Solution: Heuristic-based ID for all traffic including Layer 7. Interconnects: Challenges: Confidentiality and Integrity of the data transmitted. Solution: IPSEC tunneling at Layer 3 MPLS over GRE, EVPN or VPLS at Layer 2.
  • 6. Securing Data Center Core Challenges: • Complexity inherent with Virtualization and Containerization. • Speed and Performance. • Resilience. Solution: Segmentation and micro-segmentation. Management and policy control consistency. High Speed performance connections. Separation of data, control plane. Stateful HA, High reliability.
  • 7. Traditional Security Architectures: • IPSEC VPNs. • NGFWs. • Threat Management. • Stateful Security or Session Based. Firewall Design Requirements: A) • Identify Security requirements for your Organization. • Network Applications Discovery. • Automated network discovery. B) Define overall Security Policy. Define Environment, Identify resources, systems critical to the network and other systems that require security. C) Objectives for your firewall deployment. Private addressing usage, specify how the firewall is to be managed and updated. Identify the security vulnerabilities in the network and rectify them. D) Firewall enforcement Points: Edge: Internet / Border Facing. Core: Corporate Facing: Outgoing traffic, attack protection from the inside network.
  • 8. Confidentiality: Keep data secure with cryptography/ encrypting the data. Integrity: Ensuring the data remains unchanged. Authentication: Threat Management Services: Anti-Virus. Anti-Spam. Anti-Malware Grid. Web-Filtering.
  • 9. Modernize your Perimeter/ Edge: Application Visibility Control. Intrusion Prevention. User-Based Firewall. Threat Management: Anti-Virus. Anti-Spam. Web-Filtering. NAT. Reporting. Botnets/ C&C. VPN. Analytics. Evasive Malware protection. Reporting and Analytics. Routing and Automation.
  • 10. Network Security Tasks for Branch Offices: Need to control access for wired and wireless users. Allow remote access and BYOD. Isolate network segments and control communications. Protect from threats. Securely Connect to different locations. Classify who is the customer of your network? Corporate Users : Must be authenticated, Access based on role. Guest Users: How is the access Provided? Wired. Wireless. Remote: IPSEC VPNs and SSL VPNs. Network Segmentation and Edge Security, Application Level Security, Access Control and Authentication, Layer 2 Security Functions. Make policies standard and simple, Add deny all rule with Session logging last, use global policy feature.
  • 11. Wireless Considerations: Encryption and Authentication. Guest Access. Access Point Types: Controller Based. Non-Controller Based. Location Services and Analytics.