Westermo Group

Transcription

Westermo Group
Building Secure Networks for the Industrial World
Anders Felling
Vice President, International Sales Westermo Group
Managing Director Westermo Data Communication AB
1
Westermo – What do we do?
Robust data communication devices for harsh environments
We supply products that:
 provide the communication infrastructure for control and monitoring systems
 are used in mission critical systems, where commercial grade products are not
sufficiently resilient
 are derived from proven commercial communication technology
The built in safety, reliability and redundancy is a high value for customers
2
Westermo Group 2010
 Founded in 1975
 Turnover: 33 MEur
 Uninterrupted growth since 1994
 No. of employees: 160
 14% R&D spend
 Extensive IPR portfolio for key technologies
 Production 100 000 units
 Sales and support units in 10 countries, distributors in another 36
 Member of the Beijer Electronics Group
3
Westermo Group
Westermo Head Office
Sweden
Stora Sundby
+ 36 Distributors
Worldwide
Westermo Branch Offices
Sweden
Västerås
United States
Chicago
United Kingdom
Southampton
Taiwan
Taipei
Germany
Waghäusel
Austria
Wien
France
Paris
Switzerland
Leimbach
Singapore
Singapore
Belgium
Chievres
4
Critical Infrastructure Projects
5
Cyber Security and Physical Security
6
Security Awareness Physical and Cyber
Physical & cyber security is now a key issue
The threat of terrorist attacks is real
CCTV, intruder and chemical detectors are now
part of every system
Cyber attacks are an increasing problem
One UK utility reported that they are
dealing with 8000 attacks a day!
There is now a worm virus actively
seeking and attacking PLC’s
Most serious attacks or infections are
from within i.e. the employees
7
Security Issues and how these can be Addressed
Creating secure connections over insecure networks like the Internet
Security issues and vulnerabilities need to be addressed from the start
It is too late once a vulnerability has been exposed and the system
compromised
How can we address these vulnerabilities using;
Firewall
VLAN’s
DMZ
VPN’s
8
Firewall
9
Firewall
Effective means of stopping unwanted intrusions from insecure networks
Block unauthorised traffic from the remote site
Block IP ports
Prevent unauthorised access to the management of the router
Prevent the router from replying to probing traffic (ping, port scanning)
10
Firewalls in Industrial networks
192.168.245.159
195.168.1.xxx
VLAN 3
VLAN 1
VLAN 4
Connection from corporate
LAN 192.168.10.xxx
VLAN 2
10.10.10.xxx
VLAN 5
This would
normally require 5
discrete Firewalls
172.10.10.xxx
11
VLANs - (Virtual LANs)
12
How Would You Use VLANs?
Automation network VLAN ID 100
Corporate network VLAN ID 200
Security network VLAN ID 300
13
DMZ - (Demilitarized Zone)
14
DMZ (Demilitarized Zone)
The DMZ acts a buffer between the trusted and un-trusted zones
The DMZ prevents direct communication between the trusted and
un-trusted zones. All communications from the un-trusted zone are
terminated on an intermediate server or historian
The DMZ can offer protection against cyber attacks such as the
STUXNET worm or many of the other malicious worms and viruses
present in cyberspace
The servers in the DMZ still need to run strong, regularly updated
antivirus software
15
DMZ
SCADA
Server
Un-Trusted
Citrix
Server
Trusted
Communications to
trusted network will
typically be industrial
protocols i.e. Ether IP
Profinet, CC Net,
Modbus TCP
Typically incoming
traffic will be HTTP,
HTTPS from untrusted network
X
16
VPNs - Virtual Private Networks
17
VPNs
IPsec VPNs are key in allowing industrial networks on different sites to
communicate
VPNs are, in effect, tunnels linking the sites (leased lines)
All connections need to be authenticated before accepted
All data passing through the tunnel is encrypted
IPsec VPN via untrusted Network
Corporate network
Internet
MPLS Network
WAN
18
Cyber Security Policy
No matter how powerful the firewall, you also need good policies
Large corporate or telemetry systems should look at IDS (Intrusion
Detection Software)
SCADA machines need regularly updated antivirus software
Any machines likely to be connected to the industrial LAN should also
have antivirus software
Use a strong password policy, never words that can be looked up in a
dictionary
Servers should be located on trusted networks
Pour glue in the USB ports so they can never be used!
Have a recovery policy should system become infected or compromised
19
Physical Security through
- Robustness
- Redundancy
- Monitoring
- Compatibility
20
Robust products = Secure products
Galvanic isolation
- Galvanic isolation of the interfaces
Transient suppression
- Handles interference from high power cables,
reactive loads and transients.
Power supply
- DC-supplied units, redundant power supply
Mechanical performance
- Handles high mechanical strain, DIN-mounted
Extended temperature range
- – 40º to +70ºC
Classifications and Approvals
- EMC, Rail, Isolation, Vibration, Shock, MTBF, DNV,
ATEX
21
Redundancy
Secure connectivity through redundancy
FRNT
RSTP/STP
OSPF and VRRP
22
FRNT – Fast Recovery of Network Topology
L2 Ring Redundancy
FRNT is able to reconfigure redundant ring network
consisting of up to 200 switches within 20ms of the initial
failure, regardless of network load
Media failure
message
Member
Member
X
Ports in blocking
mode
Focal
Point
Re-learn MAC
tables message
Member
Media failure
message
Member
Member
23
RSTP – Rapid Spanning Tree Protocol
RSTP builds loop free topologies by creating a logical tree of the
connected nodes in the network.
This means that some ports needs to be set in a blocking state depending
on how the nodes are connected together.
X
24
OSPF and VRRP
Layer 3 redundancy with OSPF and VRRP
OSPF keeps track of the active routers and calculates best path to
the connected networks
VRRP creates redundant Default Gateways for the connected nodes
on the LAN network.
Layer 2
Network
Layer 3
Backbone
Layer 2
Network
Layer 2
Network
25
Monitoring
Alarm handling and remote monitoring through
SNMP
Syslog
Configurable alarms
Link alarm
FRNT link alarm
Power supply alarm
Temperature alarm
Digital In alarm
Digital I/O that can be used for intrusion detection
Connect the I/O contact to the cabinet door and receive an SNMP
trap or Syslog message to the central monitoring system if someone
opens the door.
26
Questions
27