Download Cyber Security Framework for Manufacturing Nancy Cam

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Document related concepts
no text concepts found
Transcript
Cyber Security Framework for Manufacturing
Nancy Cam-Winget
Cisco Systems Inc.
October 14, 2015
Why A Security Framework?
Vulnerabilities published at the rate IoT
devices are introduced:
http://www.pcworld.com/article/2472772/your-living-roomis-vulnerable-to-cyber-attacks.html
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
How do I build a
Secure Industrial
System?
www.odva.org
2
Cyber Physical Security Framework: Core Functions1
Identify
Protect
Detect
Respond
Recover
Risk Assessment
Access Control
Anomalies &
Events
Response Planning
Recovery Planning
Risk Management
Strategy
Data Security
Security
Continuous
Monitoring
Analysis
Asset Management
Information
Protection
Detection Process
Mitigation
Awareness &
Training
Communications
Improvements
Improvements
Protective
Technologies
1
http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214-final.pdf
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
3
How do the Core Functions Map to an Industrial System?
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
4
How do the Core Functions Map to an Industrial System?
Framework only works if the devices are
Trustworthy
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
5
What about Trustworthiness?
What can we do to
verify the hardware
integrity of our products
currently deployed in
our network?
How do we trust devices?
- DSTA Singapore
Is the software
signed or integrity
protected?
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
How do I ensure our
products can not be
tampered?
How do we ensure there are
no back doors? ..
www.odva.org
6
Trustworthy System Components
Trusted Supply Chain
Secure-By-Default and Trustworthy System
Product Assurance
Root of Trust
Trusted Operating System
Secure Communications
Trusted Execution
Software Integrity
Secure Data StorageEmbedded (Application) Security
Secure Device Management
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
7
Trustworthy System Components
Trusted Supply Chain
Secure-By-Default and Trustworthy System
Product Assurance
Root of Trust
Trusted Operating System
Secure Communications
Trusted Execution
Software Integrity
Secure Data StorageEmbedded (Application) Security
Secure Device Management
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
8
Trustworthy Components  Trust Anchor Technologies
.
• Product Assurance
.
• Trusted Execution
.
• Embedded Application
Security
• Secure-By-Default &
Trustworthy Solutions
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
Hardware & Software Authenticity
Counterfeit & Illegal Upgrade Protection
Immutable Product Identity
Boot-Time & Run-Time Integrity
Cyber Resiliency & Tamper Resistance
Strong Crypto & Certifiable Entropy
Secure (Application) Key Storage
Secure Crypto
IP & DRM Protection
Strong Device/Network Authentication
Secure Communication
Customer Visible Trustworthy Status
www.odva.org
9
Trustworthy Device Profiles
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
10
ODVA’s role for Industrial Control Systems Cyber Security
•
Expand ODVA’s specification scope to include:
–
–
–
–
–
–
Continuation of Ethernet/IP security
Include CIP security
Define Security (Profile) Levels
Standardize a Security based Reference Architecture
Define Guidelines for secure network infrastructure deployment
Define Compliance and inter-operability requirements
Technical Track
© 2015 ODVA, Inc.
2015 Industry Conference & 17th Annual Meeting
All rights reserved.
www.odva.org
11
11
THANK YOU
Related documents