Securing industrial networks can – and may – be easy

0
75

[ad_1]

Implementing safety inside the commercial community could be a daunting activity. Safety directives corresponding to CISA’s Shields Up have prompted extra industrial organizations to evaluate their community posture and search steering to enhance the protections of crucial assets for enterprise continuity. Upon in search of this steering, many are left confused with phrases corresponding to Zero Belief and Microsegmentation, leading to extra questions and no path to motion.
Safety can, and may, be easy. Whether or not you observe steering from ISA/IEC 62443—the Nationwide Institute of Requirements and Expertise (NIST)—or have carried out the Purdue mannequin, the core safety precept is to divide the community into a number of zones and create coverage for the communication that crosses zone boundaries.
Defining secured zones
Let’s take the ISA/IEC 62443 definition of zones and conduits. A zone, in accordance with the usual, is a set of bodily and functionally united belongings which have comparable safety necessities. In a producing facility, this could possibly be a single manufacturing line. A conduit is described because the communication between zones. The conduit is the communication channel by which safety coverage ought to be utilized.
Defining the zones and figuring out which coverage to assign to the conduits is what makes safety perceived as troublesome. Nonetheless, segmentation shouldn’t be seen as a single standalone activity. Efficient segmentation is comprised of two key pillars: visibility and management.
ICS visibility informs OT segmentation
Visibility into industrial management system (ICS) operations offers us a list of all belongings that exist on the community, together with their communication patterns. This permits us to visualise the processes in our networks and reply the query: what are the zones on my community? Utilizing Cisco Cyber Imaginative and prescient, an ICS visibility software that’s embedded into the community infrastructure, operators can determine belongings that belong to a course of and assign them to a gaggle for simpler visualization. Reasonably than focusing consideration on each move, from each asset, communication may be visualized within the conduits between the zones, offering a blueprint of the coverage that should be outlined.

As for the enforcement of those visitors patterns, that too may be embedded into the community infrastructure utilizing a know-how referred to as TrustSec. Cisco TrustSec supplies you with a neater strategy to handle entry management insurance policies throughout switches utilizing a safety group matrix.
As visitors enters and leaves their community section, fairly than imposing visitors utilizing IP info, Cisco TrustSec makes use of a Safety Group Tag (SGT) embedded within the MAC layer of the community visitors to find out coverage. Utilizing Cisco Identification Providers Engine (ISE) SGTs may be assigned to your zones and the matrix can be utilized to manage the communication throughout the conduits.
Utilizing the built-in integrations, Cyber Imaginative and prescient shares its grouping info with Cisco ISE so operations managers can create and handle belongings teams of their OT visibility software, so IT can simply create the right management guidelines between these zones in ISE.

In a latest webinar, I went into extra particulars, diving into the ISA/IEC 62443 zones and conduits mannequin and exhibiting use Cisco ISE and Cyber Imaginative and prescient to implement OT Microsegmentation. You’ll be able to watch the replay by registering right here.
Till then, take a look at our ISA/IEC 62443-3-3 white paper and be sure to subscribe to our Industrial Safety Publication.

Share:

[ad_2]