SlideShare a Scribd company logo
©2014 Enzen Global Ltd. www.enzen.com
Operational Technology Protection System (OTPS)
- Protect, Monitor and Manage Utility Control Systems
SCADA Vulnerabilities
 The Open and Collaborative
Systems have raised productivity
and profitability; they have also
made the system more
vulnerable to attack
 The number of vulnerabilities
detected has increased by 20
times since 2010. 50% of the
vulnerabilities allow a hacker to
execute code.
 There are known exploits for
35% of vulnerabilities and 41%
of them are very critical.
 The number of vulnerabilities
known for top 5 SCADA Vendors
by 2012
 There are many attacks
happened exploiting these
vulnerabilities:
Stuxnet. Duqu. Night
Dragon. Conficker Worm etc.
Summary
The Utility Control Systems are becoming more vulnerable to security threats
with increasing adoption of commercial-off-the-shelf (COTS) operating systems
and integration with corporate networks. Connecting Operational Technology
Networks and Corporate Networks introduces security risk on both sides. Having
understood the criticality of the control system functions, and necessity for
securing the Critical National Infrastructure, Enzen recommends the Utility to
implement the OTPS solution to protect, and manage its Control Systems.
Why Security needed?
As per CPNI standards, SCADA and Telemetry Networks are classified as CAT5 on
CNI Criticality Scale (CAT1 to 5). These assets will be of unique national
importance whose loss would have national long-term effects and hence Security
is of paramount importance. The Security threats could emerge either from an
internal source. or from external hackers. The typical SCADA protocols, particularly
open standard ones like Modbus or DNP3 with no built-in authentication, packets are
processed without any additional user or system authentication making it more
vulnerable to security attacks. The following describes an example of an internet-
generated attack on the corporate LAN to gain access to Control System.
The corporate LAN is the selected target as the firewalls need to be configured for
more open access than either the DMZ or the SCADA LANs.
1. The first step is to penetrate the Internet Firewall on the corporate LAN. Once
the firewall is penetrated, the attacker has access to the network switch. The
attacker then looks for a target to take control of, in this case the Corporate
Workstation.
2. With the corporate workstation compromised, the attacker uses the
permissions of the workstation to penetrate into the DMZ. As with the
Corporate LAN, the attacker now looks for a target in the DMZ LAN. Since the
Corporate Workstation has permission to access the web and historian
servers, these become the point of the attack.
3. The attacker now compromises the server and uses its permissions to gain
access to the SCADA LAN. The attack now comes on all fronts looking for a
likely candidate. In this scenario, the attacker is very good and gets control of
the Operator’s Workstation.
The internet attacker can now control the Control System as the Operator’s
Workstation provides supervisory control of the resources.
Recommendation
Enzen recommends the Utility to
review the security of its real time
Operational Technology Networks
and implement OTPS solution to
combat the security issues and
protect its Critical National
Infrastructure.
Impact on Business
The impacts of an attack on control
systems can include, for example:
denial of service, unauthorised
control of the process, loss of
integrity, loss of confidentiality, loss
of reputation and health, safety and
environmental impacts.
©2014 Enzen Global Ltd. www.enzen.com
Operational Technology Protection System (OTPS)
- Protect, Monitor and Manage Utility Control Systems
OTPS Solution
The proposed solution utilizes the combination of following 'COTS' products to
meet the security requirements: Security Event Manager, Security and Event
Data Collection and Network Intrusion Detection Systems along with Agents
(small software programs that are installed on the servers, clients and other assets
to be monitored and data to be collected). Agents will be individually customized for
SCADA, PI and FEP Severs etc. The data collected is sent to Security Event Manager
for managing and responding to the events. This is built upon industry standard
technologies and is further supplied upon its own appliance based hardware (where
relevant), which is easy to integrate into a client's existing OT Environment.
Approach
 Solution Approach based on
CPNI Good Practices
 Phased Site Wise Deployment
 No Operational Disruption
 Time and Cost Certainty
 Robust Quality Processes
 24 Month Warranty Period
 Multi-layered Assurance
 Single point Ownership for
Delivery
Timeline for Implementation
Highlights
 Detects and Prevents any
Security Breach be it
Software/ Hardware or
Network Intrusion
 Monitors all Industry Standard
Communication Protocols
 Monitors Critical Processes &
Services
 Monitors Network& System
Health and Performance
 Own Configurable GUI
'Dashboard'
 Built on the Concept of
Defence-in-Depth Technology
 Easy to Integrate into Existing
OT Environment
 Highly Scalable Architecture
Enzen Global Limited
Blythe Valley Innovation Centre
Central Boulevard, Blythe Valley Park,
Solihull B90 8AJ, United Kingdom,
Phone +44 121 506 9272
Enzen Security Solution
Based on CPNI Guidelines and Good
Practices, Enzen carries out Security
and Vulnerability Assessment to
identify the threat impact and
business risk. Based on that
Security Requirements will be
defined and OTPS solution will be
customised to meet these
requirements. Enzen will also setup
procedures for managing security
events and ongoing governance.

More Related Content

What's hot

Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Real-Time Innovations (RTI)
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
Roshan Kulkarni
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
Real-Time Innovations (RTI)
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
Real-Time Innovations (RTI)
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
Zscaler
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
OPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on SolutionsOPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on Solutions
team-WIBU
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
Real-Time Innovations (RTI)
 
IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution
harishgaur
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Real-Time Innovations (RTI)
 
Building converged plantwide ethernet architectures
Building converged plantwide ethernet architecturesBuilding converged plantwide ethernet architectures
Building converged plantwide ethernet architectures
IntelligentManufacturingInstitute
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
Real-Time Innovations (RTI)
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
Real-Time Innovations (RTI)
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
Julien Vermillard
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
Zscaler
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
Robb Boyd
 
Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...
Real-Time Innovations (RTI)
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
Laird Connectivity
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
Inductive Automation
 

What's hot (20)

Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
Cybersecurity Spotlight: Looking under the Hood at Data Breaches and Hardenin...
 
Architectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud PlatformsArchitectural Patterns in IoT Cloud Platforms
Architectural Patterns in IoT Cloud Platforms
 
Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?Why is DDS the Right Technology for the Industrial Internet?
Why is DDS the Right Technology for the Industrial Internet?
 
Secrets of Autonomous Car Design
Secrets of Autonomous Car DesignSecrets of Autonomous Car Design
Secrets of Autonomous Car Design
 
3 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-20193 reasons-sdp-is-replacing-vpn-in-2019
3 reasons-sdp-is-replacing-vpn-in-2019
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
OPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on SolutionsOPC UA Security: Native and Add-on Solutions
OPC UA Security: Native and Add-on Solutions
 
Embedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and SolutionsEmbedded Security and the IoT – Challenges, Trends and Solutions
Embedded Security and the IoT – Challenges, Trends and Solutions
 
IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution IoT Cloud Service & Partner IoT Solution
IoT Cloud Service & Partner IoT Solution
 
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security FrameworkThe Inside Story: Leveraging the IIC's Industrial Internet Security Framework
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
 
Building converged plantwide ethernet architectures
Building converged plantwide ethernet architecturesBuilding converged plantwide ethernet architectures
Building converged plantwide ethernet architectures
 
Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids 	Standards for Autonomous and Secure Microgrids
Standards for Autonomous and Secure Microgrids
 
Fog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of ThingsFog Computing is the Future of the Industrial Internet of Things
Fog Computing is the Future of the Industrial Internet of Things
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
The 5 elements of IoT security
The 5 elements of IoT securityThe 5 elements of IoT security
The 5 elements of IoT security
 
Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1Get an office 365 expereience your users will love v8.1
Get an office 365 expereience your users will love v8.1
 
TechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSecTechWiseTV Workshop: Cisco TrustSec
TechWiseTV Workshop: Cisco TrustSec
 
Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...Interoperability and the Internet of Things – To standardize or not to standa...
Interoperability and the Internet of Things – To standardize or not to standa...
 
Factors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT SolutionFactors You Should Consider if Building an IIoT Solution
Factors You Should Consider if Building an IIoT Solution
 
Design Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security GuidelinesDesign Like a Pro: SCADA Security Guidelines
Design Like a Pro: SCADA Security Guidelines
 

Viewers also liked

How to integrate operational and information technologies
How to integrate operational and information technologies How to integrate operational and information technologies
How to integrate operational and information technologies
Anastasia Govan Kuusk
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
Jackson Shaw
 
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
Real-Time Innovations (RTI)
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology Management
Mentari Pagi
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence
Schneider Electric
 
Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...
Anastasia Govan Kuusk
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence
Schneider Electric
 
Operations - Technology
Operations - TechnologyOperations - Technology
Operations - Technology
tutor2u
 

Viewers also liked (8)

How to integrate operational and information technologies
How to integrate operational and information technologies How to integrate operational and information technologies
How to integrate operational and information technologies
 
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)The Convergence of IT, Operational Technology and the Internet of Things (IoT)
The Convergence of IT, Operational Technology and the Internet of Things (IoT)
 
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...First Operational Technology (OT) High Performance Messaging Patterns for Ent...
First Operational Technology (OT) High Performance Messaging Patterns for Ent...
 
CE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology ManagementCE2 Chapter 01 - Operation and Technology Management
CE2 Chapter 01 - Operation and Technology Management
 
[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence[Webinar Presentation] Best Practices for IT/OT Convergence
[Webinar Presentation] Best Practices for IT/OT Convergence
 
Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...Operational and Information Technology convergence in asset intensive organis...
Operational and Information Technology convergence in asset intensive organis...
 
[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence[FAQs] Best Practices for IT/OT Convergence
[FAQs] Best Practices for IT/OT Convergence
 
Operations - Technology
Operations - TechnologyOperations - Technology
Operations - Technology
 

Similar to Operational Technology Security Solution for Utilities

CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
Muhammad FAHAD
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
CTi Controltech
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
Miller Energy, Inc.
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
CTi Controltech
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
Mountain States Engineering and Controls
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
Analynk Wireless, LLC
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
Nozomi Networks
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
Burak DAYIOGLU
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
Microsoft Tech Community
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
Nir Cohen
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
Saikat Chaudhuri
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
Commit Software Sh.p.k.
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
TzahiArabov
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
Schneider Electric
 
security onion
security onionsecurity onion
security onion
Boni Yeamin
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
Schneider Electric
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
maribethy2y
 
31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf
ssusera5b321
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
IJECEIAES
 

Similar to Operational Technology Security Solution for Utilities (20)

CISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICSCISA GOV - Seven Steps to Effectively Defend ICS
CISA GOV - Seven Steps to Effectively Defend ICS
 
Seven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber securitySeven recommendations for bolstering industrial control system cyber security
Seven recommendations for bolstering industrial control system cyber security
 
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control SystemsNCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
NCCIC - Seven Steps for Achieving Cybersecurity for Industrial Control Systems
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Defending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From CyberattackDefending Industrial Control Systems From Cyberattack
Defending Industrial Control Systems From Cyberattack
 
Defending industrial control systems from cyber attack
Defending industrial control systems from cyber attackDefending industrial control systems from cyber attack
Defending industrial control systems from cyber attack
 
Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18Nozomi Fortinet Accelerate18
Nozomi Fortinet Accelerate18
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
TACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN EnvironmentTACTiCS_WP Security_Addressing Security in SDN Environment
TACTiCS_WP Security_Addressing Security in SDN Environment
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)Software Supply Chain Attacks (June 2021)
Software Supply Chain Attacks (June 2021)
 
Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls Are your industrial networks protected...Ethernet Security Firewalls
Are your industrial networks protected...Ethernet Security Firewalls
 
security onion
security onionsecurity onion
security onion
 
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...
 
Include at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words inInclude at least 250 words in your posting and at least 250 words in
Include at least 250 words in your posting and at least 250 words in
 
31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf31779261-NOC-and-SOC.pdf
31779261-NOC-and-SOC.pdf
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 

Recently uploaded

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Zilliz
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
Edge AI and Vision Alliance
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 

Recently uploaded (20)

Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...Building RAG with self-deployed Milvus vector database and Snowpark Container...
Building RAG with self-deployed Milvus vector database and Snowpark Container...
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
“Building and Scaling AI Applications with the Nx AI Manager,” a Presentation...
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 

Operational Technology Security Solution for Utilities

  • 1. ©2014 Enzen Global Ltd. www.enzen.com Operational Technology Protection System (OTPS) - Protect, Monitor and Manage Utility Control Systems SCADA Vulnerabilities  The Open and Collaborative Systems have raised productivity and profitability; they have also made the system more vulnerable to attack  The number of vulnerabilities detected has increased by 20 times since 2010. 50% of the vulnerabilities allow a hacker to execute code.  There are known exploits for 35% of vulnerabilities and 41% of them are very critical.  The number of vulnerabilities known for top 5 SCADA Vendors by 2012  There are many attacks happened exploiting these vulnerabilities: Stuxnet. Duqu. Night Dragon. Conficker Worm etc. Summary The Utility Control Systems are becoming more vulnerable to security threats with increasing adoption of commercial-off-the-shelf (COTS) operating systems and integration with corporate networks. Connecting Operational Technology Networks and Corporate Networks introduces security risk on both sides. Having understood the criticality of the control system functions, and necessity for securing the Critical National Infrastructure, Enzen recommends the Utility to implement the OTPS solution to protect, and manage its Control Systems. Why Security needed? As per CPNI standards, SCADA and Telemetry Networks are classified as CAT5 on CNI Criticality Scale (CAT1 to 5). These assets will be of unique national importance whose loss would have national long-term effects and hence Security is of paramount importance. The Security threats could emerge either from an internal source. or from external hackers. The typical SCADA protocols, particularly open standard ones like Modbus or DNP3 with no built-in authentication, packets are processed without any additional user or system authentication making it more vulnerable to security attacks. The following describes an example of an internet- generated attack on the corporate LAN to gain access to Control System. The corporate LAN is the selected target as the firewalls need to be configured for more open access than either the DMZ or the SCADA LANs. 1. The first step is to penetrate the Internet Firewall on the corporate LAN. Once the firewall is penetrated, the attacker has access to the network switch. The attacker then looks for a target to take control of, in this case the Corporate Workstation. 2. With the corporate workstation compromised, the attacker uses the permissions of the workstation to penetrate into the DMZ. As with the Corporate LAN, the attacker now looks for a target in the DMZ LAN. Since the Corporate Workstation has permission to access the web and historian servers, these become the point of the attack. 3. The attacker now compromises the server and uses its permissions to gain access to the SCADA LAN. The attack now comes on all fronts looking for a likely candidate. In this scenario, the attacker is very good and gets control of the Operator’s Workstation. The internet attacker can now control the Control System as the Operator’s Workstation provides supervisory control of the resources. Recommendation Enzen recommends the Utility to review the security of its real time Operational Technology Networks and implement OTPS solution to combat the security issues and protect its Critical National Infrastructure. Impact on Business The impacts of an attack on control systems can include, for example: denial of service, unauthorised control of the process, loss of integrity, loss of confidentiality, loss of reputation and health, safety and environmental impacts.
  • 2. ©2014 Enzen Global Ltd. www.enzen.com Operational Technology Protection System (OTPS) - Protect, Monitor and Manage Utility Control Systems OTPS Solution The proposed solution utilizes the combination of following 'COTS' products to meet the security requirements: Security Event Manager, Security and Event Data Collection and Network Intrusion Detection Systems along with Agents (small software programs that are installed on the servers, clients and other assets to be monitored and data to be collected). Agents will be individually customized for SCADA, PI and FEP Severs etc. The data collected is sent to Security Event Manager for managing and responding to the events. This is built upon industry standard technologies and is further supplied upon its own appliance based hardware (where relevant), which is easy to integrate into a client's existing OT Environment. Approach  Solution Approach based on CPNI Good Practices  Phased Site Wise Deployment  No Operational Disruption  Time and Cost Certainty  Robust Quality Processes  24 Month Warranty Period  Multi-layered Assurance  Single point Ownership for Delivery Timeline for Implementation Highlights  Detects and Prevents any Security Breach be it Software/ Hardware or Network Intrusion  Monitors all Industry Standard Communication Protocols  Monitors Critical Processes & Services  Monitors Network& System Health and Performance  Own Configurable GUI 'Dashboard'  Built on the Concept of Defence-in-Depth Technology  Easy to Integrate into Existing OT Environment  Highly Scalable Architecture Enzen Global Limited Blythe Valley Innovation Centre Central Boulevard, Blythe Valley Park, Solihull B90 8AJ, United Kingdom, Phone +44 121 506 9272 Enzen Security Solution Based on CPNI Guidelines and Good Practices, Enzen carries out Security and Vulnerability Assessment to identify the threat impact and business risk. Based on that Security Requirements will be defined and OTPS solution will be customised to meet these requirements. Enzen will also setup procedures for managing security events and ongoing governance.