《思科(Cisco) :工业自动化安全解决方案简报(英文版)(10页).pdf》由会员分享,可在线阅读,更多相关《思科(Cisco) :工业自动化安全解决方案简报(英文版)(10页).pdf(10页珍藏版)》请在三个皮匠报告文库上搜索。
1、Cisco IoT Solution Brief Securing Industrial Networks 2020 Cisco and/or its affiliates.All rights reserved.Page 1 of 10 Protecting manufacturing operations against cyber threats:Introduction to Cisco industrial network security Over the years,manufacturers around the world have been connecting their
2、 industrial environments to enterprise networks to automate production and gain operational advantages.Organizations are now deploying Internet of Things(IoT)technologies to migrate to Industry 4.0,optimize production,and build new generations of products and services.This deeper integration between
3、 IT,cloud,and industrial networks is creating many cybersecurity issues that are becoming the primary obstacle to industry digitization efforts.Media reports regularly highlight cyber attacks on manufacturers across all verticals,wreaking expensive havoc on operations.The growing number of cases sho
4、ws that industrial networks have become a target and securing them is now the key to ensuring production integrity,continuity,and safety.Benefits Improve industrial cybersecurity by:Discovering and inventorying assets Containing security incidents Detecting and preventing known attacks Protecting ag
5、ainst malware Integrating enterprise and operations security Cisco IoT Solution Brief Securing Industrial Networks Cisco IoT Solution Brief Securing Industrial Networks 2020 Cisco and/or its affiliates.All rights reserved.Page 2 of 10 Cisco is a leader in securing enterprise networks.Cisco is also a
6、 leader in industrial networking.We are leveraging these unique portfolios of products and solutions,together with threat intelligence from Talos,one of the worlds largest security research teams,to make security inherent and embedded in the industrial network.To help industrial organizations secure
7、 their operations,Cisco Validated Designs(CVDs)provide the core network foundation of architectures that meet the needs of operations and IT.This solution brief is a high-level overview of the reference architecture described in the“Networking and Security in Industrial Automation Environments”CVD.I
8、t describes a security journey for an industrial network,starting with strong foundation-level security and then,as the organization matures,growing into a comprehensive full-spectrum security design.Securing the industrial network is a journey Industrial control networks connect devices that have b
9、een deployed over a period of many years sometimes even decades beginning back when cybersecurity wasnt a concern.When organizations attempt to secure their industrial IoT networks,they encounter three primary issues:A lack of visibility:Manufacturers often dont have an accurate inventory of whats o
10、n their industrial network.Without this,they have limited ability to build a secure communications architecture.A lack of control:A lack of visibility also means that manufacturers are often unaware of what devices are communicating,and where those communications are going.You cannot control what yo
11、u dont know about.A lack of collaboration:OT devices and processes are managed by the operations team.Cybersecurity is generally driven by the IT and security teams.All these stakeholders need to collaborate to build the specific security policies and enrich events with context so that security inci
12、dents do not disrupt production.Addressing these issues and building a secure industrial network will not happen overnight.To help ensure success,Cisco promotes a phased approach in which each phase builds the foundation for the next,so that you can enhance your security posture at your own pace and
13、 demonstrate value to all stakeholders when embarking on this journey.Key requirements Figure 1 depicts the key requirements for securing industrial networks and can guide the development of a security lifecycle process.Compliance standards often guide security needs as well.This security solution b
14、rief provides the blueprints for two designs to meet these requirements.Figure 1.Key requirements for securing industrial networks Asset visibility Application flows Discover Control access Segment and partition to contain and limit impact Segment Vulnerabilities Anomalies Intrusion Detect Investiga
15、te Remediate Improve Respond Cisco IoT Solution Brief Securing Industrial Networks 2020 Cisco and/or its affiliates.All rights reserved.Page 3 of 10 Extending IT security to OT through effective collaboration To successfully secure the OT environment,all stakeholders must work together.Operations un
16、derstands the industrial environment the devices,the protocols,and the business processes.IT understands the IP network.And the security team understands threats and vulnerabilities.By working together,they can leverage existing security tools and expertise to protect the industrial network without
17、disrupting production safety and uptime.Cisco security solutions are built into the industrial networks to monitor operations,feed security platforms with OT context,and enable this crucial collaboration.Network managers will appreciate the unique simplicity and lower costs of Ciscos edge architectu
18、re when looking to deploy OT security at scale.Operations will gain real-time insight into the industrial processes,so they can maintain system integrity and production continuity.Security teams will have visibility into industrial assets and communications with context enriched by control engineers
19、.Taking a phased approach to industrial security Ciscos approach to deploying industrial cybersecurity includes three phases.Initially,there is a minimal level of security consisting of configuring an industrial demilitarized zone(IDMZ)to separate the industrial and enterprise networks.This is the m
20、andatory first step in industrial security,and we are assuming that all have already embraced it,so it will not be discussed in this brief.But as organizations connect more devices,enable more remote access,and build new applications,the airgap erodes and becomes insufficient.Industrial organization
21、s need to build on this minimal level of security to move to the Foundation and eventually Full Spectrum security models.This CVD is created to protect your investment while your security posture matures.Figure 2.Typical security journey Many industrial companies are at minimal security that is insu
22、fficient in todays cyber-security environment.Cisco IoT Solution Brief Securing Industrial Networks 2020 Cisco and/or its affiliates.All rights reserved.Page 4 of 10 Design 1:Foundation security The Foundation security design is a blueprint for a secured,robust,and reliable industrial network.It pro
23、vides for industrial asset visibility,macro/zone segmentation,zone access control,intrusion detection,threat detection,and response.It enables coordination with information security for consistent access policy management and aggregation of industrial security events in the security operations cente
24、r(SOC).Figure 3.Foundation security design This design follows the Purdue model.Network management and other networking aspects such as redundancy,etc.,are described in detail in the CVD“Networking and Security in Industrial Automation Environments.”Foundation security features Asset visibility Macr
25、o/zone segmentation Zone access control Intrusion and malware protection Threat response 2 1 3 4 6 5 Cyber Vision Center:Centralized analytics platform Cyber Vision network sensor:Deep packet inspection(DPI)embedded in network infrastructure,eliminating the need for a separate SPAN network Cyber Vis
26、ion hardware sensor:Dedicated sensor appliance that performs DPI on SPAN traffic Application flow:Lightweight metadata streamed from Cyber Vision sensors to Cyber Vision Center Industrial asset metadata flow:Context,vulnerabilities,and events communicated to the SOC Industrial security appliance:Seg
27、ments,controls access,and detects and blocks intrusions and malware Cisco IoT Solution Brief Securing Industrial Networks 2020 Cisco and/or its affiliates.All rights reserved.Page 5 of 10 Asset visibility Visibility into the security stance of industrial devices and communications is a key capabilit
28、y.Cisco Cyber Vision provides visibility into all industrial assets and creates inventories that have relevant details such as device type,firmware version,etc.Cyber Vision Center is deployed as a sitewide application.Cyber Vision sensors are embedded into the cell/area network equipment to discover
29、 devices,monitor communications,and pass security telemetry to Cyber Vision Center.These sensors inspect the packets and analyze them for asset details,communications,and industrial control system(ICS)process data.The Center visualizes this information and correlates vulnerability information.Invest
30、igations and patching activities can be driven from this.Cyber Vision connects to Cisco Firepower Management Center and Cisco SecureX to provide industrial asset information,enhancing context around devices for policy enforcement.Zone/macro segmentation and malware protection The industrial network
31、is segmented from the enterprise network by an IDMZ implemented by a Cisco next-generation firewall(NGFW).The various parts of the industrial network should also be segmented in a way that enables each segment to form a semiautonomous zone.The goal is to limit and contain security incidents within a
360insights & IDG Research:2022年渠道营销现状报告(英文版)(26页).pdf
群邑集团(GroupM):2022年全球广告市场年中预测报告(英文版)(43页).pdf
凯度(Kantar):2022年618购物节白皮书(英文版)(59页).pdf
施耐德电气(SCHNEIDER ELECTRIC)2021年年度报告(英文版)(488页).pdf
Drake Star Partners:2022年5月全球体育科技行业更新报告(英文版)(16页).pdf
标普全球(S&P Global):2022年第三季度北美地区信贷状况报告(英文版)(28页).pdf
牛津经济研究院(Oxford Economics):从机会到影响-评估YouTube在瑞典的经济、社会和文化效益(英文版)(7页).pdf
优兴咨询(Universum):2022年雇主品牌报告(英文版)(24页).pdf
美国合众银行(U.S. BANCORP)2021年年度报告(英文版)(157页).pdf
斯巴鲁公司(SUBARU)2021年年度报告(英文版)(130页).pdf
关西电力(KANSAI ELECTRIC POWER)2021年年度报告(英文版)(138页).pdf
Enbridge公司(ENBRIDGE)2021年年度报告(英文版)(199页).pdf
The Musicant Group:创造人们想去的地方(英文版)(38页).pdf
汽车循环经济的新路线图(2021)(英文版)(44页).pdf
爱马仕投资管理公司(Federated Hermes):信贷市场中的ESG定价风险(英文版)(8页).pdf
私募股权投资议程:2021年印度趋势报告(英文版)(111页).pdf
可持续智慧城市之路:挑战与机遇(英文版)(76页).pdf
展望未来:2021年私人股本趋势(英文版)(12).pdf
儿童保护促进人道主义行动联盟:新冠疫情期间学校关闭影响报告(英文版)(70页).pdf
振兴印度小额信贷:拥抱数字化(英文版)(44页).pdf
国际金融公司(IFC):解决巴基斯坦儿童保育问题:创建家庭友好型工作场所(英文版)(46页).pdf
国际美慈组织:克服信任缺失:让社区参与成功为全世界接种新冠疫苗(英文版)(10页).pdf
国际移民组织(IOM):2020年新冠疫情防备和响应成就报告(英文版)(48页).pdf
2021年全球可持续发展筹资报告(英文版)(209页).pdf
思科(Cisco) :工业自动化网络解决方案简报(英文版)(12页).pdf
思科(Cisco):网络安全解决方案综述报告(32页).pdf
思科(Cisco):2022年无线解决方案概述报告(英文版)(7页).pdf
思科(Cisco):2022年企业无线解决方案-Wi-Fi 直观易用之旅自此开始(英文版)(188页).pdf
思科(Cisco):Cisco Webex会议安全报告(英文版)(18页).pdf
Nets:数字银行碳抵消解决方案报告(英文版)(10页).pdf
思科(Cisco):安全电子邮件买家指南(英文版)(12页).pdf
Empaxis:投资管理行业外包解决方案分析报告(英文版)(10页).pdf
NTT数据:汽车网络安全解决方案(英文版)(23页).pdf
思科(Cisco):网络安全报告-防御关键威胁(英文版)(28页).pdf
线上健身第一股-keep招股说明书(463页).pdf
蜜雪冰城招股说明书-连锁茶饮第一股(724页).pdf
QuestMobile:2022年中国短视频直播电商发展洞察报告(30页).pdf
QuestMobile:2022新中产人群洞察报告(37页).pdf
町芒:2022现制茶饮行业研究报告(47页).pdf
麦肯锡:2023中国消费者报告:韧性时代(33页).pdf
罗振宇2023“时间的朋友”跨年演讲完整PDF.pdf
QuestMobile:2021新中产人群洞察报告(30页).pdf
锐仕方达&薪智:2022年薪酬白皮书(105页).pdf
美团:2022新餐饮行业研究报告(74页).pdf