SlideShare a Scribd company logo
Industrie4.0: Security e Business
Continuity nella fabbrica digitalizzata.
Proteggiamo da incidenti cyber i Sistemi
di controllo e automazione
Andrea Zapparoli Manzoni – Coordinatore GdL Security Assintel
Enzo M. Tieghi - ServiTecno – Socio Assintel
etieghi@servitecno.it
Dove, questi sistemi?
Ovunque: Industrial Internet,
Processes, Buildings,
Manufacturing &
Infrastructures
3
ANSI/ISA95 Functional Hierarchy www.isa.org
Level 4
Level 1
Level 2
Level 3
Business Planning
& Logistics
Plant Production Scheduling,
Operational Management, etc
Manufacturing
Operations Management
Dispatching Production, Detailed Production
Scheduling, Reliability Assurance, ...
Batch
Control
Discrete
Control
Continuous
Control
1 - Sensing the production process,
manipulating the production process
2 - Monitoring, supervisory control and
automated control of the production process
3 - Work flow / recipe control to produce the
desired end products. Maintaining records
and optimizing the production process.
Time Frame
Days, Shifts, hours, minutes, seconds
4 - Establishing the basic plant schedule -
production, material use, delivery, and
shipping. Determining inventory levels.
Time Frame
Months, weeks, days
Level 0 0 - The actual production process
Level 4
Level 1
Level 2
Level 3
Business Planning
& Logistics
Plant Production Scheduling,
Operational Management, etc
Manufacturing
Operations Management
Dispatching Production, Detailed Production
Scheduling, Reliability Assurance, ...
Batch
Control
Discrete
Control
Continuous
Control
1 - Sensing the production process,
manipulating the production process
2 - Monitoring, supervisory control and
automated control of the production process
3 - Work flow / recipe control to produce the
desired end products. Maintaining records
and optimizing the production process.
Time Frame
Days, Shifts, hours, minutes, seconds
4 - Establishing the basic plant schedule -
production, material use, delivery, and
shipping. Determining inventory levels.
Time Frame
Months, weeks, days
Level 0 0 - The actual production process
Sicurezza Impianti, Security
oltre alla safety (EN ISO 13849-1/2,
IEC/EN 62061, IEC/EN 61508,
IEC/EN61511)…
• valutiamo la Security?
• Life Cycle dei sistemi?
• Documentazione di progetto?
• Cambiamenti sull’impianto?
• Reti, PLC, DCS, SCADA?
• Chi? Quando? Dove? Perchè?
• Risk Analysis per rischio cyber?
• rete e sistemi di fabbrica sicuri?
• Back-up del sistema (e dei dati) ?
• Mai provato il recovery?
• E le connessioni sono «protette»?
Sicurezza in profondità:
reti e sistemi senza protezione
No alle “reti piatte”: Seg/Seg
Segmentare & Segregare
Zones & Conduits (ISA99/IEC62443)
Esempio di “Security Architecture” nei sistemi di
automazione e controllo
Enterprise
Control
Network
Manufacturing
Operations
Network
Perimeter
Control
Network
Control
System
Network
Process
Control
Network
Source: Byres Security
Protezione di Zone & Conduits con Firewalls
(multilayered defence)
Corporate Firewall
Industrial Firewall
Source: Byres - Security
Introduzione alla Security Industriale - Enzo M. Tieghi
Esempio di rete “con protezioni”
Connessioni «protette»:
VPN, IPSec, OpenVPN
12
Enzo Maria Tieghi
• Amministratore Delegato di ServiTecno
(da oltre 25 anni software industriale)
• Socio Assintel, attivo in associazioni e gruppi di studio per
la cyber security industriale (ISA s99 info member)
• In Advisory Board, gruppi e progetti internazionali su
Industrial Security e CIP (Critical Infrastructure Protection)
• Co-autore ed autore pubblicazioni, articoli e memorie
14
Dubbi? Domande?
Enzo M. Tieghi etieghi@servitecno.it

More Related Content

What's hot

How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...TI Safe
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Joan Figueras Tugas
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityDeepakraj Sahu
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82majolic
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)TI Safe
 
CLASS 2016 - Palestra Márcio Santos
CLASS 2016 - Palestra Márcio Santos CLASS 2016 - Palestra Márcio Santos
CLASS 2016 - Palestra Márcio Santos TI Safe
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingTonex
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Jim Gilsinn
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...TI Safe
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkMarcoAfzali
 
ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018Wervyan Shalannanda
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013APEXMarCom
 

What's hot (20)

How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...How to protect energy distribution for millions of people against cyber attac...
How to protect energy distribution for millions of people against cyber attac...
 
Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)Cybersecurity in Industrial Control Systems (ICS)
Cybersecurity in Industrial Control Systems (ICS)
 
Guide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_securityGuide scada and_industrial_control_systems_security
Guide scada and_industrial_control_systems_security
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
Nist 800 82
Nist 800 82Nist 800 82
Nist 800 82
 
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
PECB Webinar: ICS Security Management System using ISO 27001 Standard as the ...
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
CLASS 2018 - Palestra de Edgard Capdevielle (Presidente e CEO – Nozomi)
 
CLASS 2016 - Palestra Márcio Santos
CLASS 2016 - Palestra Márcio Santos CLASS 2016 - Palestra Márcio Santos
CLASS 2016 - Palestra Márcio Santos
 
ICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity TrainingICS (Industrial Control System) Cybersecurity Training
ICS (Industrial Control System) Cybersecurity Training
 
Saner 2.0 product sheet
Saner 2.0   product sheetSaner 2.0   product sheet
Saner 2.0 product sheet
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
CLASS 2018 - Palestra de Jens Puhlmann (Security Manager, NA - ICS Security M...
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Nist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing FrameworkNist 800 82 ICS Security Auditing Framework
Nist 800 82 ICS Security Auditing Framework
 
ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018ET4045-Information Security Management System-2018
ET4045-Information Security Management System-2018
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013Friday Forum ISO 27001: 2013
Friday Forum ISO 27001: 2013
 

Viewers also liked

Portae- Sistema de evaluación estudiantil 2013-14
Portae- Sistema de evaluación estudiantil 2013-14Portae- Sistema de evaluación estudiantil 2013-14
Portae- Sistema de evaluación estudiantil 2013-14Carmen Pacheco-Sepúlveda
 
Las redes, del viajero a los destinos
Las redes, del viajero a los destinosLas redes, del viajero a los destinos
Las redes, del viajero a los destinosJuan Sobejano
 
Criterios de la segunda evaluación - Elementos de Semiótica
Criterios de la segunda evaluación - Elementos de SemióticaCriterios de la segunda evaluación - Elementos de Semiótica
Criterios de la segunda evaluación - Elementos de Semióticajaforzan
 
Portae seminario reflexivo profesional 2013 2014 revision
Portae seminario reflexivo profesional 2013 2014 revisionPortae seminario reflexivo profesional 2013 2014 revision
Portae seminario reflexivo profesional 2013 2014 revisionCarmen Pacheco-Sepúlveda
 
Clase 01 I Vciclo
Clase 01 I VcicloClase 01 I Vciclo
Clase 01 I VcicloJuan Cherre
 
Gibran Jalil Los Hijos
Gibran Jalil Los HijosGibran Jalil Los Hijos
Gibran Jalil Los Hijosguest371ee3
 
Jornadas Monitor Turespaña Mercado Britanico
Jornadas Monitor Turespaña Mercado BritanicoJornadas Monitor Turespaña Mercado Britanico
Jornadas Monitor Turespaña Mercado BritanicoJoantxo Llantada
 
Intercambio
IntercambioIntercambio
Intercambiospipedu
 
Presentación Actidea 2014
Presentación Actidea 2014Presentación Actidea 2014
Presentación Actidea 2014Christian Maya
 
Jairo tens modificacion
Jairo tens   modificacionJairo tens   modificacion
Jairo tens modificacioneducation
 
Manual de la buena práctica fisico deportiva
Manual de la buena práctica fisico deportivaManual de la buena práctica fisico deportiva
Manual de la buena práctica fisico deportivaÁlvaro Benítez
 
Làmines conjuntes de blocs.7gkc
Làmines conjuntes de blocs.7gkcLàmines conjuntes de blocs.7gkc
Làmines conjuntes de blocs.7gkcJosep Blesa
 
ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3
ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3
ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3Carmen Pacheco-Sepúlveda
 
Cromos~1
Cromos~1Cromos~1
Cromos~1macckof
 

Viewers also liked (20)

Portae- Sistema de evaluación estudiantil 2013-14
Portae- Sistema de evaluación estudiantil 2013-14Portae- Sistema de evaluación estudiantil 2013-14
Portae- Sistema de evaluación estudiantil 2013-14
 
Las redes, del viajero a los destinos
Las redes, del viajero a los destinosLas redes, del viajero a los destinos
Las redes, del viajero a los destinos
 
Calidad líquida
Calidad líquidaCalidad líquida
Calidad líquida
 
Criterios de la segunda evaluación - Elementos de Semiótica
Criterios de la segunda evaluación - Elementos de SemióticaCriterios de la segunda evaluación - Elementos de Semiótica
Criterios de la segunda evaluación - Elementos de Semiótica
 
Portae seminario reflexivo profesional 2013 2014 revision
Portae seminario reflexivo profesional 2013 2014 revisionPortae seminario reflexivo profesional 2013 2014 revision
Portae seminario reflexivo profesional 2013 2014 revision
 
Clase 01 I Vciclo
Clase 01 I VcicloClase 01 I Vciclo
Clase 01 I Vciclo
 
Gibran Jalil Los Hijos
Gibran Jalil Los HijosGibran Jalil Los Hijos
Gibran Jalil Los Hijos
 
Métodos de estudios arh
Métodos de estudios arhMétodos de estudios arh
Métodos de estudios arh
 
Internet
InternetInternet
Internet
 
Jornadas Monitor Turespaña Mercado Britanico
Jornadas Monitor Turespaña Mercado BritanicoJornadas Monitor Turespaña Mercado Britanico
Jornadas Monitor Turespaña Mercado Britanico
 
Seminario 17
Seminario 17Seminario 17
Seminario 17
 
Intercambio
IntercambioIntercambio
Intercambio
 
Presentación Actidea 2014
Presentación Actidea 2014Presentación Actidea 2014
Presentación Actidea 2014
 
Jairo tens modificacion
Jairo tens   modificacionJairo tens   modificacion
Jairo tens modificacion
 
Manual de la buena práctica fisico deportiva
Manual de la buena práctica fisico deportivaManual de la buena práctica fisico deportiva
Manual de la buena práctica fisico deportiva
 
Làmines conjuntes de blocs.7gkc
Làmines conjuntes de blocs.7gkcLàmines conjuntes de blocs.7gkc
Làmines conjuntes de blocs.7gkc
 
Clasesprobabilidades
ClasesprobabilidadesClasesprobabilidades
Clasesprobabilidades
 
Mapas conceptuales y mentales
Mapas conceptuales y mentalesMapas conceptuales y mentales
Mapas conceptuales y mentales
 
ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3
ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3
ConceptuacióN Portafolio ElectróNico Formativo Reflexivo 3
 
Cromos~1
Cromos~1Cromos~1
Cromos~1
 

Similar to Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short

Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart ManufacturingCSA Group
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)mike parks
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in icsMayur Mehta
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn Kingsley
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International WorkshopScadaLab Project
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfglan Glandeva
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control SystemHemanth M
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart buildingDuncan Purves
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systemsEinar Landre
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems Einar Landre
 
0 safety presentation master v1
0 safety presentation master v10 safety presentation master v1
0 safety presentation master v1confidencial
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 

Similar to Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short (20)

Smart Manufacturing
Smart ManufacturingSmart Manufacturing
Smart Manufacturing
 
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
IoT Cyber+Physical+Social Engineering Attack Security (v0.1.6 / sep2020)
 
Sdl deployment in ics
Sdl deployment in icsSdl deployment in ics
Sdl deployment in ics
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
John kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultantJohn kingsley OT ICS SCADA Cyber security consultant
John kingsley OT ICS SCADA Cyber security consultant
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
First SCADA LAB International Workshop
First SCADA LAB International WorkshopFirst SCADA LAB International Workshop
First SCADA LAB International Workshop
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
InTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdfInTech-FOCUS-Process-Safety-Sept2020.pdf
InTech-FOCUS-Process-Safety-Sept2020.pdf
 
Nagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPSNagios Conference 2014 - Jorge Higueros - SNAPS
Nagios Conference 2014 - Jorge Higueros - SNAPS
 
Securing Industrial Control System
Securing Industrial Control SystemSecuring Industrial Control System
Securing Industrial Control System
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
Can you trust your smart building
Can you trust your smart buildingCan you trust your smart building
Can you trust your smart building
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Safety and security in distributed systems
Safety and security in distributed systems Safety and security in distributed systems
Safety and security in distributed systems
 
Industrial_Cyber_Security
Industrial_Cyber_SecurityIndustrial_Cyber_Security
Industrial_Cyber_Security
 
0 safety presentation master v1
0 safety presentation master v10 safety presentation master v1
0 safety presentation master v1
 
ICS security
ICS securityICS security
ICS security
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 

More from Enzo M. Tieghi

2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.02018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0Enzo M. Tieghi
 
Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...
Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...
Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...Enzo M. Tieghi
 
2016 m2 m_forum_industrie4_cybersecurity_tieghi
2016 m2 m_forum_industrie4_cybersecurity_tieghi2016 m2 m_forum_industrie4_cybersecurity_tieghi
2016 m2 m_forum_industrie4_cybersecurity_tieghiEnzo M. Tieghi
 
Security acqua 4 0 telecontrollo 2015 versione_estesa
Security acqua 4 0 telecontrollo 2015 versione_estesaSecurity acqua 4 0 telecontrollo 2015 versione_estesa
Security acqua 4 0 telecontrollo 2015 versione_estesaEnzo M. Tieghi
 
2015 tis servi_tecno_endian-v4_emt2
2015 tis servi_tecno_endian-v4_emt22015 tis servi_tecno_endian-v4_emt2
2015 tis servi_tecno_endian-v4_emt2Enzo M. Tieghi
 
Dream report presentazione it-mg emt2
Dream report presentazione it-mg emt2Dream report presentazione it-mg emt2
Dream report presentazione it-mg emt2Enzo M. Tieghi
 
Project Management & Industrial Cyber Security (ICS) by Enzo M. Tieghi
Project Management & Industrial Cyber Security (ICS) by Enzo M. TieghiProject Management & Industrial Cyber Security (ICS) by Enzo M. Tieghi
Project Management & Industrial Cyber Security (ICS) by Enzo M. TieghiEnzo M. Tieghi
 
2013 telecontrollo tieghi giussani forum telecontrollo 2013
2013 telecontrollo tieghi giussani  forum telecontrollo 20132013 telecontrollo tieghi giussani  forum telecontrollo 2013
2013 telecontrollo tieghi giussani forum telecontrollo 2013Enzo M. Tieghi
 
GE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controllo
GE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controlloGE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controllo
GE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controlloEnzo M. Tieghi
 
Perchè usare ThinClient con ACP ThinManager (breve) r3
Perchè usare ThinClient  con ACP  ThinManager (breve) r3Perchè usare ThinClient  con ACP  ThinManager (breve) r3
Perchè usare ThinClient con ACP ThinManager (breve) r3Enzo M. Tieghi
 
2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security
2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security
2012 Scada Protection X Assintel Nov2012 Tieghi SCADA SecurityEnzo M. Tieghi
 
2012 H2 O In Cloud Tieghi Aiic Csa
2012 H2 O In Cloud Tieghi Aiic Csa2012 H2 O In Cloud Tieghi Aiic Csa
2012 H2 O In Cloud Tieghi Aiic CsaEnzo M. Tieghi
 
Tieghi Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...
Tieghi  Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...Tieghi  Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...
Tieghi Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...Enzo M. Tieghi
 
2011 aiic + scada security x oracle security comunity
2011 aiic + scada security x oracle security comunity2011 aiic + scada security x oracle security comunity
2011 aiic + scada security x oracle security comunityEnzo M. Tieghi
 
Proficy Historian GE Intelligent Platforms Presentazione in Ita
Proficy Historian GE Intelligent Platforms Presentazione in ItaProficy Historian GE Intelligent Platforms Presentazione in Ita
Proficy Historian GE Intelligent Platforms Presentazione in ItaEnzo M. Tieghi
 
Presentazione iFix 5.1
Presentazione iFix 5.1 Presentazione iFix 5.1
Presentazione iFix 5.1 Enzo M. Tieghi
 
Proficy Workflow customer presentation Italian
Proficy Workflow customer presentation Italian Proficy Workflow customer presentation Italian
Proficy Workflow customer presentation Italian Enzo M. Tieghi
 
MDT autosave presentazione italiano
MDT autosave presentazione italianoMDT autosave presentazione italiano
MDT autosave presentazione italianoEnzo M. Tieghi
 
Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...
Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...
Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...Enzo M. Tieghi
 
ServiTecno Tieghi Aggiungere Video Al Telecontrollo Per Telecontrollo2009 R2
ServiTecno Tieghi  Aggiungere Video Al Telecontrollo  Per Telecontrollo2009 R2ServiTecno Tieghi  Aggiungere Video Al Telecontrollo  Per Telecontrollo2009 R2
ServiTecno Tieghi Aggiungere Video Al Telecontrollo Per Telecontrollo2009 R2Enzo M. Tieghi
 

More from Enzo M. Tieghi (20)

2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.02018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
2018 ISPE Tieghi OT/ICS CyberSecurity per Pharma 4.0
 
Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...
Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...
Ma bisogna proprio proteggere anche le reti di fabbrica ed IIoT? Tieghi CLUSI...
 
2016 m2 m_forum_industrie4_cybersecurity_tieghi
2016 m2 m_forum_industrie4_cybersecurity_tieghi2016 m2 m_forum_industrie4_cybersecurity_tieghi
2016 m2 m_forum_industrie4_cybersecurity_tieghi
 
Security acqua 4 0 telecontrollo 2015 versione_estesa
Security acqua 4 0 telecontrollo 2015 versione_estesaSecurity acqua 4 0 telecontrollo 2015 versione_estesa
Security acqua 4 0 telecontrollo 2015 versione_estesa
 
2015 tis servi_tecno_endian-v4_emt2
2015 tis servi_tecno_endian-v4_emt22015 tis servi_tecno_endian-v4_emt2
2015 tis servi_tecno_endian-v4_emt2
 
Dream report presentazione it-mg emt2
Dream report presentazione it-mg emt2Dream report presentazione it-mg emt2
Dream report presentazione it-mg emt2
 
Project Management & Industrial Cyber Security (ICS) by Enzo M. Tieghi
Project Management & Industrial Cyber Security (ICS) by Enzo M. TieghiProject Management & Industrial Cyber Security (ICS) by Enzo M. Tieghi
Project Management & Industrial Cyber Security (ICS) by Enzo M. Tieghi
 
2013 telecontrollo tieghi giussani forum telecontrollo 2013
2013 telecontrollo tieghi giussani  forum telecontrollo 20132013 telecontrollo tieghi giussani  forum telecontrollo 2013
2013 telecontrollo tieghi giussani forum telecontrollo 2013
 
GE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controllo
GE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controlloGE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controllo
GE-IP ANIPLA GdS virtualizzazione e Cloud nei ststemi di controllo
 
Perchè usare ThinClient con ACP ThinManager (breve) r3
Perchè usare ThinClient  con ACP  ThinManager (breve) r3Perchè usare ThinClient  con ACP  ThinManager (breve) r3
Perchè usare ThinClient con ACP ThinManager (breve) r3
 
2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security
2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security
2012 Scada Protection X Assintel Nov2012 Tieghi SCADA Security
 
2012 H2 O In Cloud Tieghi Aiic Csa
2012 H2 O In Cloud Tieghi Aiic Csa2012 H2 O In Cloud Tieghi Aiic Csa
2012 H2 O In Cloud Tieghi Aiic Csa
 
Tieghi Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...
Tieghi  Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...Tieghi  Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...
Tieghi Infrastrutture Critiche informatizzate e loro protezione 2011 lezione...
 
2011 aiic + scada security x oracle security comunity
2011 aiic + scada security x oracle security comunity2011 aiic + scada security x oracle security comunity
2011 aiic + scada security x oracle security comunity
 
Proficy Historian GE Intelligent Platforms Presentazione in Ita
Proficy Historian GE Intelligent Platforms Presentazione in ItaProficy Historian GE Intelligent Platforms Presentazione in Ita
Proficy Historian GE Intelligent Platforms Presentazione in Ita
 
Presentazione iFix 5.1
Presentazione iFix 5.1 Presentazione iFix 5.1
Presentazione iFix 5.1
 
Proficy Workflow customer presentation Italian
Proficy Workflow customer presentation Italian Proficy Workflow customer presentation Italian
Proficy Workflow customer presentation Italian
 
MDT autosave presentazione italiano
MDT autosave presentazione italianoMDT autosave presentazione italiano
MDT autosave presentazione italiano
 
Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...
Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...
Tieghi Anipla 20 04 2010 Come Possiamo Essere Sicuri Che Tutti Seguano Le Pro...
 
ServiTecno Tieghi Aggiungere Video Al Telecontrollo Per Telecontrollo2009 R2
ServiTecno Tieghi  Aggiungere Video Al Telecontrollo  Per Telecontrollo2009 R2ServiTecno Tieghi  Aggiungere Video Al Telecontrollo  Per Telecontrollo2009 R2
ServiTecno Tieghi Aggiungere Video Al Telecontrollo Per Telecontrollo2009 R2
 

Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short

  • 1. Industrie4.0: Security e Business Continuity nella fabbrica digitalizzata. Proteggiamo da incidenti cyber i Sistemi di controllo e automazione Andrea Zapparoli Manzoni – Coordinatore GdL Security Assintel Enzo M. Tieghi - ServiTecno – Socio Assintel etieghi@servitecno.it
  • 2. Dove, questi sistemi? Ovunque: Industrial Internet, Processes, Buildings, Manufacturing & Infrastructures
  • 3. 3 ANSI/ISA95 Functional Hierarchy www.isa.org Level 4 Level 1 Level 2 Level 3 Business Planning & Logistics Plant Production Scheduling, Operational Management, etc Manufacturing Operations Management Dispatching Production, Detailed Production Scheduling, Reliability Assurance, ... Batch Control Discrete Control Continuous Control 1 - Sensing the production process, manipulating the production process 2 - Monitoring, supervisory control and automated control of the production process 3 - Work flow / recipe control to produce the desired end products. Maintaining records and optimizing the production process. Time Frame Days, Shifts, hours, minutes, seconds 4 - Establishing the basic plant schedule - production, material use, delivery, and shipping. Determining inventory levels. Time Frame Months, weeks, days Level 0 0 - The actual production process Level 4 Level 1 Level 2 Level 3 Business Planning & Logistics Plant Production Scheduling, Operational Management, etc Manufacturing Operations Management Dispatching Production, Detailed Production Scheduling, Reliability Assurance, ... Batch Control Discrete Control Continuous Control 1 - Sensing the production process, manipulating the production process 2 - Monitoring, supervisory control and automated control of the production process 3 - Work flow / recipe control to produce the desired end products. Maintaining records and optimizing the production process. Time Frame Days, Shifts, hours, minutes, seconds 4 - Establishing the basic plant schedule - production, material use, delivery, and shipping. Determining inventory levels. Time Frame Months, weeks, days Level 0 0 - The actual production process
  • 4. Sicurezza Impianti, Security oltre alla safety (EN ISO 13849-1/2, IEC/EN 62061, IEC/EN 61508, IEC/EN61511)… • valutiamo la Security? • Life Cycle dei sistemi? • Documentazione di progetto? • Cambiamenti sull’impianto? • Reti, PLC, DCS, SCADA? • Chi? Quando? Dove? Perchè?
  • 5. • Risk Analysis per rischio cyber? • rete e sistemi di fabbrica sicuri? • Back-up del sistema (e dei dati) ? • Mai provato il recovery? • E le connessioni sono «protette»?
  • 6. Sicurezza in profondità: reti e sistemi senza protezione
  • 7. No alle “reti piatte”: Seg/Seg Segmentare & Segregare
  • 8. Zones & Conduits (ISA99/IEC62443)
  • 9. Esempio di “Security Architecture” nei sistemi di automazione e controllo Enterprise Control Network Manufacturing Operations Network Perimeter Control Network Control System Network Process Control Network Source: Byres Security
  • 10. Protezione di Zone & Conduits con Firewalls (multilayered defence) Corporate Firewall Industrial Firewall Source: Byres - Security
  • 11. Introduzione alla Security Industriale - Enzo M. Tieghi Esempio di rete “con protezioni”
  • 13.
  • 14. Enzo Maria Tieghi • Amministratore Delegato di ServiTecno (da oltre 25 anni software industriale) • Socio Assintel, attivo in associazioni e gruppi di studio per la cyber security industriale (ISA s99 info member) • In Advisory Board, gruppi e progetti internazionali su Industrial Security e CIP (Critical Infrastructure Protection) • Co-autore ed autore pubblicazioni, articoli e memorie 14
  • 15. Dubbi? Domande? Enzo M. Tieghi etieghi@servitecno.it