Siemens and Chonicle Partner For Cyber Security

Siemens and Chonicle Partner For Cyber Security

Cyber Security got a shout-out during the Siemens Spotlight on Innovation forum in Orlando last week. Leo Simonovich, VP and Global Head, Industrial Cyber and Digital Security at Siemens Gas and Power, and Mike Wiacek, co-founder & CSO of Chronicle (an Alphabet company) took the stage discussing their newly signed cyber security agreement.

Key phrase—“customers can own their environment”. Perhaps the most interesting conversation I had during the networking event was with a Chronicle tech person who gave me a deep dive into the product. This is security unlike everything else I investigate in the OT realm. This isn’t a network monitoring app. Nor is it a device that acts as a firewall for industrial control devices. It builds a huge database and adds analytics (which is “in our DNA”). The solution has two parts—visibility and context. It bridges IT and OT worlds with the intent to “democratize security for the success of the digital economy”; that is, make it accessible to customers, simple, affordable, easy-to-use.

Through a unified approach that will leverage Chronicle’s Backstory platform and Siemens’ strength in industrial cyber security, the combined offering gives energy customers unparalleled visibility across information technology (IT) and operational technology (OT) to provide operational insights and confidentially act on threats.

The energy industry has historically been unable to centrally apply analytics to process data streams, cost-effectively store and secure data, and identify malicious threats within OT systems. Research conducted by Siemens and Ponemon Institute found that while 60 percent of energy companies want to leverage analytics, only 20 percent are utilizing any analytics to do security monitoring in the OT environment. Small and medium enterprises are particularly vulnerable to security breaches as they frequently do not have the internal expertise to manage and address increasingly sophisticated attacks.

“The innovative partnership between Siemens and Chronicle demonstrates a new frontier in applying the power of security analytics to critical infrastructure that is increasingly dependent on digital technology,” said Simonovich. “Cyber-attacks targeting energy companies have reached unprecedented speeds, and our cutting-edge managed service unlocks the analytics ecosystem offers a new level of protection from potential operational, business and safety losses.”

“Energy infrastructure is an obvious example of cyber-attacks affecting the physical world and directly impacting people’s lives,” said Ansh Patnaik, Chief Product Officer, Chronicle. “Backstory’s security telemetry processing capabilities, combined with Siemens’ deep expertise, gives customers new options for protecting their operations.”

The partnership between Siemens and Chronicle will help energy companies securely and cost-effectively leverage the cloud to store and categorize data, while applying analytics, artificial intelligence, and machine learning to OT systems that can identify patterns, anomalies, and cyber threats. Chronicle’s Backstory, a global security telemetry platform for investigation and threat hunting, will be the backbone of Siemens managed service for industrial cyber monitoring, including in both hybrid and cloud environments. This combined solution enables security across the industry’s operating environment – from energy exploration and extraction to power generation and delivery.

Industrial Control System Security

Industrial Control System Security

I booked a vacation several months ago that conflicted with Hannover Messe. I missed the usually chilly and damp north of Germany in favor of the definitely chilly and damp Pacific Northwest.

Many announcements from Hannover reached me anyway, though, so I’ll be going through a few this week. First up concerns using the new CIP Security protocol from ODVA. This one from Rockwell Automation.

This release talks about Rockwell’s developing solutions toward closing a cybersecurity opening within industrial automation communication.

“As the world’s leading company focused on combining industrial automation with digital technology, we’re uniquely positioned to help close security gaps in connected operations,” said Megan Samford, director of product security, Rockwell Automation. “Our new offerings with built-in security deliver the industry’s best available protection of control-level traffic. This can give users confidence that the integrity of their systems and their device-to-device communications are protected from day one.”

The Allen-Bradley ControlLogix EtherNet/IP communication module is among the first industrial devices to use the CIP Security protocol from ODVA. The protocol helps make sure only authorized devices are connected in industrial operations. It also helps prevent tampering or interference with communications between those devices. CIP Security is the first industrial automation protocol to support transport layer security (TLS), the most proven security standard available.

Also, the newly enhanced Allen-Bradley ControlLogix 5580 controller is the world’s first controller to be certified compliant with today’s most robust control system security standard, IEC 62443-4-2. The standard defines the technical security requirements for industrial automation and control system components. This certification builds on the 2018 certification of the Rockwell Automation Security Development Lifecycle (SDL) to the IEC 62443-4-1 standard.

Practitioner’s Guide for Assessing the Maturity of IoT System Security

Practitioner’s Guide for Assessing the Maturity of IoT System Security

I just had an opportunity to talk Industrial cybersecurity with two leaders of The Industrial Internet Consortium (IIC) (now incorporating OpenFog) who gave an overview of the new Security Maturity Model (SMM) Practitioner’s Guide. This document provides detailed actionable guidance enabling IoT stakeholders to assess and manage the security maturity of IoT systems.

Along with the publication of the SMM Practitioner’s Guide is an update to the IoT SMM: Description and Intended Use White Paper, which provides an introduction to the concepts and approach of the SMM. This white paper has been updated for consistency with the SMM Practitioner’s Guide, including revised diagrams and updated terminology.

As organizations connect their systems to the internet, they become vulnerable to new threats, and they are rightly concerned with security. Addressing these concerns requires investment, but determining investment focus and amount is a difficult business decision. The SMM helps by enabling a structured top-down approach toward setting goals as well as a means toward assessing the current security state, taking into account various specific practices. The SMM allows an organization to trade off investment against risk in a sensible manner.

Building on concepts identified in the groundbreaking IIC Industrial Internet Security Framework published in 2016, the SMM defines levels of security maturity for a company to achieve based on its security goals and objectives as well as its appetite for risk. Organizations may improve their security state by making continued security assessments and improvements over time, up to their required level.

“This is the first model of its kind to assess the maturity of organizations’ IoT systems in a way that includes governance, technology and system management,” said Stephen Mellor, CTO, IIC. “Other models address part of what is addressed by the SMM: they may address a particular industry, IoT but not security, or security but not IoT. The SMM covers all these aspects and points to parts of existing models, where appropriate, to recognize existing work and avoid duplication.”

The practitioner’s guide includes tables describing what must be done to reach a given security comprehensiveness for each security domain, subdomain and practice and can be extended to address specific industry or system scope needs. Following each table is an example using various industry use cases to demonstrate how an organization might use the table to pick a target state or to evaluate a current state.

One example is that of an automotive manufacturer considering the possible threats interfering with the operations of a vehicle key fob. The manufacturer sets its target maturity comprehensiveness level to “1” as it considers some IT threats, such as a Denial of Service attack that may prevent a driver from opening the car door using the key fob. Over time, as new threats emerge, the manufacturer realizes it needs additional threat modeling and enhanced practices so raises its target maturity comprehensiveness level to a higher level “2.”

The practitioner’s guide contains three case studies that show IoT stakeholders how to apply the process based on realistic assessments, showing how the SMM can be applied in practice. The case studies include a smarter data-driven bottling line, an automotive gateway supporting OTA updates and security cameras used in residential settings.

The IIC designed the Security Maturity Model to be extended for industry and system specific requirements. The IIC is collaborating with various industry groups to develop industry profiles that extend the model. Industry associations interested in developing profiles are encouraged to contact the IIC. Please send an email to [email protected]

For more information about the IIC SMM Practitioner’s Guide, IIC members have prepared a webinar “Get a True Sense of Security Maturity,” which will air on March 18th at 12:00 pm for 60 minutes. Use this PIN: 12374028

The full IIC Security Maturity Model Practitioner’s Guide and a list of IIC members who contributed can be found on the IIC website.

Last of ARC Industry Forum Interview Notes

Last of ARC Industry Forum Interview Notes

ARC’s annual Industry Forum gathering provided an opportunity rare these days of meeting with a wide variety of people and companies. Today’s post summarizes most of the rest of information gathered not previously published.

Interestingly, IIoT was not a major theme. Perhaps it underlies the other things. Most of the time we talked security and software. This round up involves Schneider Electric, Bedrock Automation, Bentley Systems, Siemens, and ioTium.

Profitable Safety for Industry

Schneider Electric has announced EcoStruxure Process Safety Advisor, an IIoT-based digital process safety platform and service that enables customers to visualize and analyze real-time hazardous events and risks to their enterprise-wide assets, operations and business performance.

Safety Advisor is built on Schneider Electric’s EcoStruxure SIF Manager application for tracking and validating safety instrumented function (SIF) performance over the life of a plant. It provides a single view into the health and status of the user’s safety instrumented functions, which helps to identify potential risks and their impact on operations performance.

It also identifies the need to take corrective action via easy-to-understand performance dashboards and leading indicators for safety health and then documents the entire process using an embedded SIF audit trail that supports safety compliance.

Safety Advisor enables customers to understand their risks within minutes, and then act decisively to drive better business results.

Bedrock Automation

Albert Rooyakkers, Bedrock Automation CEO, pointed to advances with Bedrock’s offering including “Zero Cost Software”, having an OSA Proxy, using MQTT Sparkplug-B secure, Role-Based access control, and a partnership with SI firm Wood Group.

Wood’s automation and control group will deliver Bedrock Open Secure Automation (OSA) to its clients in energy and industrial markets. Wood has active membership in The Open Process Automation Forum, which is focused on the development of a standards-based, open, secure, interoperable process control architecture.

“This partnership centers on combining our diverse capabilities and innovative solutions in automation with Bedrock’s OSAtechnology to bring open and secure systems to our clients, advancing our position as a world leading automation providerand bringing greater cyber protection to our client’s projects,” said Jeff Shannon, Senior Manager of Strategy and Development in Wood’s automation and control group.

Planning and Design Assessment Solutions for Grid Modernization

Bentley Systems announced availability of OpenUtilities DER Planning & Design Assessment Solutions that provide decision support and cost-based models and simulations for Distributed Energy Resources (DER) integration.

In partnership with Siemens’ Digital Grid business unit, OpenUtilities Solutions for DER empowers electric utilities, electricity suppliers, and distribution network operators (DSO) with software applications to analyze, design, and evaluate DER interconnection requests through desktop and cloud-based services, while supporting the reliability and resilience of network operations.

The solutions generate an electrical digital twin for utilities – a GIS digital twin that enables owner/operators to more efficiently model the grid for decentralized energy without compromising safety and reliability. Digital twins can provide huge efficiencies in grid operations by streamlining DER interconnection applications with optimized workflows to better assess operational impacts, long-term strategic scenarios and investment decisions.

OpenUtilities Design Optioneering advances OpenUtilities Analysis one step further with cost-based decision support for planning and designing complex utility networks with DER. The application provides the ability to analyze both planned and existing infrastructure, optimize equipment sizing, and estimate materials and labor costs for DER projects. This helps utilities minimize design construction costs associated with DER and streamline the DER interconnection process with detailed cost estimation included with the impact analysis studies.

ioTium

Finally, I talked with Ron Victor of ioTium. The product consists of a soft node on, for example, a Dell Gateway device providing baked-in security. It runs as server in cloud enabling easier deployment.

ioTium’s IoT network isolates IT and OT network and data, preventing IT traffic from touching OT traffic and thus eliminating the possibility of backdoor threats. Further, ioTium isolates data streams from different sub-systems, preventing a compromise on one sub-system from affecting any other sub-system.

ioTium’s virtualized edge platform enables deployment, update and upgrade of edge services across thousands of remote sites in one click from the cloud, making analytics, DPI, machine learning, encryption, compression and more possible closer to the data source.

Industrial Cybersecurity Solution Guards Against USB Device Attacks

Industrial Cybersecurity Solution Guards Against USB Device Attacks

If HMI SCADA absorbed about 40% of my ARC Industry Forum appointments, then industrial cybersecurity took up another 40%. Not all of them were the usual networking solutions, either.

This one, for example, comes from Honeywell. It announced the latest release of Secure Media Exchange (SMX), a cybersecurity solution to protect industrial operators against new and emerging Universal Serial Bus (USB) threats. SMX now includes patent pending capabilities to protect against a broad range of malicious USB device attacks, which disrupt operations through misuse of legitimate USB functions or unauthorized device actions.

These advanced protections complement additional SMX enhancements to malware detection, utilizing machine learning and artificial intelligence (AI) to improve detection by up to 40 percent above traditional anti-virus solutions according to a Honeywell study. Together, these updates to the SMX platform deliver comprehensive, enterprise-wide USB protection, visibility and control to meet the demanding physical requirements of industrial environments.

USB devices include flash drives and charging cables, as well as many other USB-attached devices. They represent a primary attack vector into industrial control system (ICS) environments, and existing security controls typically focus on the detection of malware on these USBs.

While important, research shows an emerging trend toward new categories of USB threats that manipulate the capabilities of the device standard to circumvent traditional security controls and directly attack ICS. Categorically, these malicious USB device attacks represent 75 percent of today’s known USB attack types, a clear indication of the shift toward new attack methodologies. Because these attacks can weaponize common USB peripherals — like keyboards, speakers — effective protection requires sophisticated device validation and authorization.

“Malicious USB attacks are increasingly sinister in their ability to emulate, exploit and manipulate USB devices, often causing damage and operational outages,” said Sam Wilson, global product marketing manager, Honeywell Industrial Cybersecurity. “Honeywell is the first to deliver a powerful industrial cybersecurity solution to protect against malicious USB device attacks, which represent the majority of USB threat types and advanced malware. And as USB usage increases and devices proliferate, human verification of device actions will continue to play an important role.”

SMX protection includes Honeywell’s Trusted Response User Substantiation Technology (TRUST), which introduces a human validation and authentication step to ensure that USB devices are what they claim to be. TRUST helps prevent unwanted or suspicious devices from introducing new threats into the industrial control environment. In the case of USB storage devices, additional layers of advanced malware detection technology are used to further protect against malware, including machine learning and AI to improve detection of increasingly complex malware, including zero days and evasive malware.

SMX helps customers make changes across people, process, and technology that will improve their industrial cybersecurity maturity. It trains USB users to look for potential issues as they plug in, while reinforcing plant check-in and check-out processes for plant managers. As a technical control, SMX continuous threat protection and its latest enhancements ensure that customers can check USBs anywhere to scale industrial cybersecurity with ease.

The latest SMX technology release includes a host of additional features including:

  • New Centralized Management: provides unmatched visibility of USB devices entering industrial control environments and centralized threat management across all SMX sites, for time-saving security management and simple-to-view insights unique to the customer’s environment.
  • New ICS Shield Integration: provides additional visibility into USB activity on protected end nodes, closing the loop between centralized management services and distributed protections inside the ICS, without violating industry best practices of zone segmentation.
  • Expanded SMX offering: provides multiple form factors to meet specific industrial needs, including portable SMX ST models for busy operational staff, and fully ruggedized models that meet industrial use cases including hazardous environments, military standard conditions and gloves-on worker situations.
Cybersecurity Updates for Industrial Control

Cybersecurity Updates for Industrial Control

Discussing industrial technology while ignoring cybersecurity is impossible these days. I just saw a survey that contends CEOs are more worried about cybersecurity than recession.

Note—I have been traveling for meetings and finally got my schedule together to post something. I’m also compiling my schedule for the annual ARC Advisory Group Industry Forum in a couple of weeks. If you’re going, I’d love to meet you. Send a note or a text. Maybe we can have coffee.

Schneider Electric Partners with Nozomi Networks

Schneider Electric has signed a global partnership agreement with Nozomi Networks to collaborate with Nozomi to provide customers in the industrial manufacturing and critical infrastructure segments advanced anomaly detection, vulnerability assessment, and other cybersecurity solutions and services, helping them to control, prevent and mitigate risks to their operations and business performance.

“The industry-wide transformation taking place today enables our customers to improve their business performance in ways they never imagined, but it requires them to expand connectivity across their operations, so they can extract, contextualize and apply new levels of rich data,” said Nathalie Marcotte, senior vice president, Industry Services and Cybersecurity, Schneider Electric. “However, extending connectivity also extends the attack surface for would-be cyber criminals. Therefore, cybersecurity can no longer be an afterthought. There’s too much at stake, financially and operationally. By adding Nozomi Networks to our family of partners, we strengthen our ability to help customers understand and eliminate risks and threats to their operations and assets, while reducing potential impact on their business success.”

The partnership enables Schneider Electric to respond more aggressively to immediate demand for effective, operational technology cybersecurity services, solutions and expertise in oil and gas, power, building automation and other industrial sectors. Schneider Electric will offer Nozomi Networks’ advanced solutions for industrial control system cyber resiliency and real-time operational visibility to customers worldwide. Schneider Electric will combine its EcoStruxure IIoT process automation and industrial control solutions with Nozomi’s SCADAguardian platform for real-time operations visibility, including:

  • Advanced ICS Cybersecurity Solutions: The bundled solution will deliver the deep network visibility and OT cybersecurity industry operators require in one, comprehensive and highly scalable solution.
  • Nozomi Networks SCADAguardian solution provides accurate asset discovery, superior threat detection and flexible and scalable deployment options to Schneider Electric customers.
  • Nozomi Networks Certified Consultants: Schneider Electric consultants around the world will continue to be trained as certified Nozomi Networks engineers, scaling to support clients throughout their cybersecurity solution implementation, and providing expert OT threat hunting and forensic analysis.
  • SCADAguardian Live in Schneider Electric Sites: Schneider Electric customers can experience Nozomi Networks’ real-time operational visibility and cybersecurity solutions via live threat scenarios running in Schneider Electric sites around the world.

EcoStruxure is Schneider Electric’s open, interoperable, IoT-enabled system architecture and platform.

“Years of multi-industry experience discerning the complexities of industrial control system networks, continuous innovation and expertise in artificial intelligence and machine learning have made Nozomi Networks SCADAguardian the most comprehensive, scalable and mature product in its category,” said Edgard Capdevielle, chief executive officer, Nozomi Networks. “Our partnership with Schneider Electric accelerates our joint efforts to further protect global infrastructure while helping to improve the safety, efficiency, reliability and profitability of the world’s most critical operations.”

“The digital enterprise requires a holistic security approach that not only provides safeguards, but continually assesses, manages and monitors business and operating systems, which Nozomi Networks’ solutions do seamlessly,” Marcotte said. “Addressing cybersecurity head on can’t be limited to a single company, segment or region. That is why we are committed to being open, transparent and collaborative when it comes to helping global industry prevent and respond to cyberattacks. As this partnership shows, we will continue to collaborate with industry leaders who have the technology, expertise and unique skills required to secure and protect our customers’ people, production and profits.”

Mocana Integrates with Unified Automation’s High Performance OPC UA SDK

Simplifies Replacement of OpenSSL with Mocana’s FIPS 140-2 Validated Cryptographic Engine

Mocana announced the integration of Mocana TrustPoint, the company’s embedded cybersecurity software, with Unified Automation’s High Performance OPC Unified Architecture (UA) Software Development Kit (SDK). This integration enables industrial manufacturers and operators to easily replace OpenSSL, an open source crypto library, with Mocana’s proven cybersecurity software solution that is FIPS 140-2 validated and compliant with leading industrial cybersecurity standards.

“Mocana’s embedded cybersecurity solutions are used by the largest industrial companies for mission critical systems,” said Uwe Steinkrauss, Executive Director at Unified Automation. “We’re committed to partnering with Mocana to provide the OPC UA community with solutions that are secure and compliant with industry standards.”

OPC UA is an open machine-to-machine communication platform for industrial automation developed by the OPC Foundation. The OPC UA standard enables industrial control system (ICS) devices across multiple platforms to communicate using a services-oriented architecture (SOA) including enhanced publish / subscribe capabilities. The standard is broadly used across many industries including pharmaceutical, oil and gas, building automation, industrial robotics, security, manufacturing, process control, and transportation.

By default, most OPC UA SDKs have been designed to use OpenSSL, open source security software, to handle security functions such as authentication and encryption. Besides the large footprint hindering implementation on the smallest embedded devices, OpenSSL has been shown to have thousands of vulnerabilities, a hard to maintain complex code base, and slow vulnerability remediation times. Additionally, the latest NIST 140-2 standards cannot be met by the current version of OpenSSL. As a result, industrial companies are migrating away from OpenSSL to meet cybersecurity compliance standards.

Mocana’s integration with Unified Automation’s OPC UA SDKs makes it easy to replace OpenSSL with Mocana’s FIPS 140-2 validated cryptographic engine and comprehensive device security lifecycle management platform. Mocana provides an OpenSSL Connector, a shim that transparently intercepts the device application’s OpenSSL API calls, changes the arguments, and passes them onto Mocana’s cryptographic engine without requiring any application code changes.

“Unified Automation has deep expertise with OPC UA and was instrumental in developing the OPC UA stacks, in particular the ANSI C stack,” said Srinivas Kumar, Vice President of Engineering at Mocana. “We are committed to making it easy to enable the highest level of security and device integrity for OPC UA-enabled industrial devices.”

Mocana’s proven device security solution facilitates compliance with cybersecurity standards, such as the NIST FIPS 140-2, IEC 62443, NIST 800-63, and CIP-007. Mocana and Unified Automation are members of the OPC Foundation.