MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for...

21
© 2017 WIND RIVER. ALL RIGHTS RESERVED. MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL INFRASTRUCTURE SYSTEM TO THE IOT SECURELY WITH VIRTUALIZATION Alex Wilson Director, Market Development

Transcript of MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for...

Page 1: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

© 2017 WIND RIVER. ALL RIGHTS RESERVED.

MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL INFRASTRUCTURE SYSTEM TO THE IOT SECURELY WITH VIRTUALIZATION

Alex Wilson

Director, Market Development

Page 2: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

2 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

DIGITAL BUSINESS TRANSFORMATION

Business Drivers

New approach for business strategy

Increased efficiency, safety, resource sustainability

Need for smart maintenance approaches

The Use of Technology to Radically Improve the Performance or Reach of Enterprises

Page 3: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

3 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

DIGITAL TRANSFORMATION

Business Impact

Data-enabled intelligent systems

Lifecycle costs

Safety while enabling connectivity

Security maintenance

Industrial IoT

Consolidation & Virtualization

Functional safety

Cybersecurity

Page 4: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

4 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

THE INDUSTRIAL INTERNET OF THINGS (IIOT)

Driving digital business transformation

Enabling optimization at scale

Services based on machine data enabling:

– Reduced operational expenditure

– Efficiency of resource usage

– Flexibility of manufacturing

CLOUD

FOG

Page 5: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

5 © 2017 WIND RIVER. ALL RIGHTS RESERVED. © 2016 Wind River. All Rights Reserved. 5

An Intel Company

EAST - WEST

NO

RT

H - S

OU

TH

CONSOLIDATION & VIRTUALIZATION 2 DIFFERENT COMPETENCIES

Page 6: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

6 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

IIOT EXPOSES SYSTEMS TO VULNERABILITIES

Each node in the end-to-end topology represents one or more attack vectors

CLOUD

FOG

https://krebsonsecurity.com/2016/10/hacked-cameras-dvrs-powered-todays-massive-internet-outage/

http://www.zdnet.com/article/target-confirms-breach-40-million-accounts-affected/

https://ics-cert.us-cert.gov/alerts/IR-ALERT-H-16-056-01

https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/

Page 7: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

7 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

KEY IOT DEVICE CYBERSECURITY REQUIREMENTS

How to migrate your critical infrastructure system securely to the IoT

1. Cybersecurity development plan

2. Cybersecurity development process

3. Secure your device in all phases of operation

4. Secure your communications

5. Partition and separate your safe/certified applications and add new IoT applications

6. Cybersecurity remote monitoring and updates

7. Real-time cybersecurity analytics

Page 8: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

8 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

Implementation Protect Detect

Respond Recover

Return on Investment (ROI)

Return on Security Investment (ROSI)

Risk and business

discussions

Risk

Likelihood Scale

Impact Scale

Incident

Consequences

Quantify Risk

Business Justification

CYBERSECURITY DEVELOPMENT PLAN Start with a cybersecurity risk assessment plan

Page 9: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

9 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

NIST CYBERSECURITY FRAMEWORK

Broad appeal across Industries Specified by

– FDA for Medical

– DoE for Energy

– DoHS Guides

Critical Infrastructure Guides (7 sectors)

– Manufacturing Profile (2017)

– FCC for Telecoms

– United Nations for Maritime Security

Translations and Adaptations

– Italy’s National Framework for Cyber Security

– Philippine National Security Plan

– Japanese Translation

Page 10: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

10 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

HELIX SECURITY FRAMEWORK

Develop your cybersecurity plan

Based on the CIA Triad

– Industry standard model to represent security

Each principle is broken into security-related categories

Each category is decomposed into implementations

When the implementations are brought together,

– The Security Policy is defined Trusted Platform

Development Processes

• Privacy

• Separation

• Key Management

Confidentiality

Security Policy

Security Assessment

• Data Integrity

• Boot Process

• AAA

Integrity

• Whitelisting

• Intrusion Protection

• Management

• Counter- measures

Availability

Page 11: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

11 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

CYBERSECURITY DEVELOPMENT PLAN

Using the cybersecurity triad

Confidentiality

– Rules to limit access to the device and data

Integrity

– Assure the device and data is trustworthy

Availability

– Assure access is available to the device and data

Device and Data

Security

Page 12: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

12 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

CYBERSECURITY DEVELOPMENT PROCESS

Select and

review process

standards

Select and

review process

checklists

Establish

and review

requirements

baseline

Architecture

definition

Architecture

review

Design definition

Design review

Test plan

preparation

Static analysis

Manual

code review

Test execution

Process

compliance

analysis

Security validation

Final release

review

PSIRT

Implement Deploy Assessment Architecture Design

CVE Checker

Page 13: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

13 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

SECURING THE DEVICE

Design

Secure Development Processes

Signed binary

delivery

IEC 62443

IEC 27034

Boot

Secure boot/load

Measured boot/load

Signed binary

application

authentication

Runtime

Secure Partitioning

Cryptography

User authentication /management

Auditing/logging

Power Down

Encrypted storage

Sanitization

Page 14: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

14 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

SECURING THE COMMUNICATIONS

Design

Secure Development Processes

Signed binary

delivery

IEC 62443

IEC 27034

Boot

Secure boot/load

Measured boot/load

Signed binary

application

authentication

Digital

certificates/PKI

Remote attestation

Runtime

Secure Partitioning

Cryptography

User authentication /management

Auditing/logging

Network security

SSL/SSH

IPSEC/IKE

Firewall

Power Down

Encrypted storage

Sanitization

Page 15: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

15 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

PARTITION AND SEPARATE NON-SECURE APPLICATIONS

Migrate legacy critical infrastructure

Use virtualization to separate critical applications

Add new IoT functionality without re-certification cost and effort

Reduce overall project risk

VxWorks

Secure New Applications

Non-Secure IoT

Application

Secure Legacy Application

Core 1 Core 2 Cores 3-4

Page 16: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

16 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

CVE-2010-2943 CVE-2011-

1020 CVE-2012-3412 CVE-2013-4312

Releases

Alerts

Fixed

2010 2011 2012 2013 2014

2 4 3 3

645 433 70 341

5186 5288 4150 4639 7937 6488

4 4

2015

1844 2330

2016

5157

6449

4

CVE-2014-0160 aka

Heartbleed

CVE-2015-0235 aka Ghost

CVE - CVE-2016-0800 aka

DROWN

CYBERSECURITY REMOTE MONITORING

Page 17: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

17 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

CYBERSECURITY REMOTE MONITORING AND UPDATES

Cybersecurity protection for deployed devices

MITRE CERT

Customers security-alert@ windriver.com

Product Security Response Team

Defect Filed

Consolidated OLS Notification

Proactive OLS Notification

Does Not Affect Product

Applicable to Product

Patch and OLS Notification

Page 18: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

18 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

REAL-TIME CYBERSECURITY ANALYTICS

Real-time cybersecurity insight realization and response

Your system itself needs to be self-monitoring

– Autonomous actions

– Monitor for data leaks / insertion

– Potential data taint

– Communications other than what is expected

Page 19: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

19 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

WIND RIVER SECURITY SOLUTION PORTFOLIO

Wind River Professional Services Helix Security Framework

VxWorks Portfolio | hard real-time safety & security

Wind River Linux | secure embedded Linux

Pulsar | ready-to-use embedded Linux

Device Agents | connectivity, monitoring, &

management

Titanium Edge | carrier grade NFV/SDN

Titanium Control | embedded xFV/SDx

Pulsar | ready-to-use embedded Linux

Helix Device Cloud | device management

Helix CarSync | secure OTA updates

Titanium Cloud | carrier grade NFV/SDN

Sim

ics

| s

imu

lation –

de

vic

e to

syste

m

CLOUD

FOG

Page 20: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

19 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

Cybersecurity must

– Begin with the project design

– Cover all aspects from process, deployment, maintenance

– Last for entire project lifecycle

Legacy systems can be brought into the IIoT using virtualization

Virtualization can also help ensure cybersecurity in your systems by isolating potential vulnerabilities from your critical code and communications

Page 21: MIGRATING YOUR LEGACY INDUSTRIAL CRITICAL … · –Manufacturing Profile (2017) –FCC for Telecoms –United Nations for Maritime Security Translations and Adaptations –Italy’s

21 © 2017 WIND RIVER. ALL RIGHTS RESERVED.