Reader small image

You're reading from  Hands-On Industrial Internet of Things

Product typeBook
Published inNov 2018
PublisherPackt
ISBN-139781789537222
Edition1st Edition
Right arrow
Authors (2):
Giacomo Veneri
Giacomo Veneri
author image
Giacomo Veneri

Giacomo Veneri graduated in computer science from the University of Siena. He holds a PhD in neuroscience context with various scientific publications. He is Predix Cloud certified and an influencer, as well as SCRUM and Oracle Java certified. He has 18 years' experience as an IT architect and team leader. He has been an expert on IoT in the fields of oil and gas and transportation since 2013. He lives in Tuscany, where he loves cycling.
Read more about Giacomo Veneri

Antonio Capasso
Antonio Capasso
author image
Antonio Capasso

Antonio Capasso graduated in computer automation in 1999 and computer science in 2003 from the University of Naples. He has been working for twenty years on large and complex IT projects related to the industrial world in a variety of fields (automotive, pharma, food and beverage, and oil and gas), in a variety of roles (programmer, analyst, architect, and team leader) with different technologies and software. Since 2011, he has been involved in building and securing industrial IoT infrastructure. He currently lives in Tuscany, where he loves trekking and swimming.
Read more about Antonio Capasso

View More author details
Right arrow

Applying Cybersecurity

Cybersecurity is a very hot topic and is becoming increasingly important, not just from an economic perspective but also from a political and social perspective. The economic impact of cybersecurity is easy to understand: if information technology infrastructure is compromised in some way, it is logical to expect some kind of economic impact. What is not so apparent is the importance that cyber security has from a political and social perspective. The Cambridge Analytica scandal is representative of the importance of cybersecurity from a political perspective. In this case, the personal data of several million Facebook users was used, or at least was attempted to be used, to influence the US elections. If you take a look at international airports, the fights they are battling are now more to do with cyberwars than traditional conflicts. Many companies manage...

What is a DiD strategy?

Today, all companies have been effectively forced to consider the risks they face and evaluate the vulnerability of their assets with regard to their related potential economic impact. Once risks have been assessed, priorities can be established and a defense strategy can be arranged. This means that we need to adopt DiD logic, without being discouraged by the apparent difficulty of this approach. But what is DiD?

DiD is an approach to information security by which a security posture is achieved through the coordinated and combined use of multiple security countermeasures. It is based on the integration of three different categories of elements: people, technology, and operating methods. The redundancy and distribution of countermeasures is based on two main concepts: defense in multiple places and layered defenses.

These concepts are certainly not new...

Firewalls

One of the best practices of the DiD strategy is to isolate the Control Network (CN), which is also often called the Process Control Network (PCN), from the corporate and internet systems using firewalls. While firewalls are widely used in the traditional IT sector, their adoption in CN/PCN environments is quite recent. Most IT firewalls are generally unaware of industrial-control protocols and may introduce unacceptable latency into time-critical systems. They may also face operational constraints that are not typical in the IT world. The reality is that firewalls can be complex devices that need careful design, configuration, and management to be efficient and effective. In this section, we are going to look at some basic information about firewalls and how they are usually deployed in the factory to segregate the control network and protect industrial devices.

Basically...

Common control-network-segregation architectures

This section outlines the most common security practices that are currently used in industrial-control environment in terms of the architecture, design, deployment, and management of the firewall in order to separate the PCN network from the corporate network.

The solutions presented are related to two main scenarios:

  • Two-zone firewall-based designs without a DMZ
  • Three-zone firewall-based designs with a DMZ

There is also another scenario, which is often referred as dual-homing. In this scenario, dual-network interface cards are installed either in a workstation or in a control device that requires access to both the corporate and process control networks.

Dual-homing is an easy way to connect the corporate network to the control network, but it puts the dual-homed device at a significant security risk, even if a personal firewall...

Securing the I-IoT data flow

In Chapter 4, Implementing the Industrial IoT Data Flow, we analyzed five different options for connecting the edge to industrial data sources, highlighting the strengths and weaknesses of each. The five options that we analyzed were the following:

  • Edge on fieldbus
  • Edge on OPC DCOM
  • Edge on OPC Proxy
  • Edge on OPC UA
  • OPC UA on controller

We have not yet considered the cybersecurity requirements and constraints for each of these options. In this section, we will understand how to secure them from a networking perspective, according to the standards of the ICS and the related best practices. As we outlined in the previous Common control-network-segregation architectures section , securing the control network is just one of the recommendations of the DiD strategy that can be used to mitigate the cyber risks of the whole control system environments. There...

Summary

In this chapter, we outlined the DiD approach. You learned that the goal of a DiD strategy is the achievement of a security posture through the coordinated and combined use of multiple security countermeasures that is based on two main concepts: defense in multiple places and layered defenses. We looked at how DiD is based on the integration of three different elements: people, technology, and operating methods. Since firewalls are an important part of securing the control network, we also provided a short description of the different classes of firewall. After that, we explored the most common architectures to secure the industrial devices linked to the control network.

Following this, we looked at how to segregate a control network by means of DMZ and VLAN. We examined the most common security practices currently used in the industrial control environment and analyzed...

Questions

  1. What are the three main elements that make up a DiD strategy?
    1. People, technology, and operating methods
    2. Firewall, antivirus, and people
    3. Patching, physical barrier, and people
  2. Which is the main feature that differentiates a stateful firewall?
    1. Packet filtering
    2. TCP session modelling
    3. Packet inspection at the application layer
  1. What is the main advantage of a DMZ?
    1. Segregation of the control network
    2. Being able to create and deploy devices that act as dual-homes in a specific network
    3. Monitoring traffic crossing networks
  1. What is the main advantage of a VLAN?
    1. Segregating the control network
    2. Building up a DMZ
    3. Building logical networks that share the same physical infrastructure
  1. What is the main security constraint of the edge in an OPC DCOM deployment setup?
    1. Allowing DCOM traffic to cross the firewall
    2. Using a DPI firewall for filtering OPC packets
    3. Building...
lock icon
The rest of the chapter is locked
You have been reading a chapter from
Hands-On Industrial Internet of Things
Published in: Nov 2018Publisher: PacktISBN-13: 9781789537222
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
undefined
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime

Authors (2)

author image
Giacomo Veneri

Giacomo Veneri graduated in computer science from the University of Siena. He holds a PhD in neuroscience context with various scientific publications. He is Predix Cloud certified and an influencer, as well as SCRUM and Oracle Java certified. He has 18 years' experience as an IT architect and team leader. He has been an expert on IoT in the fields of oil and gas and transportation since 2013. He lives in Tuscany, where he loves cycling.
Read more about Giacomo Veneri

author image
Antonio Capasso

Antonio Capasso graduated in computer automation in 1999 and computer science in 2003 from the University of Naples. He has been working for twenty years on large and complex IT projects related to the industrial world in a variety of fields (automotive, pharma, food and beverage, and oil and gas), in a variety of roles (programmer, analyst, architect, and team leader) with different technologies and software. Since 2011, he has been involved in building and securing industrial IoT infrastructure. He currently lives in Tuscany, where he loves trekking and swimming.
Read more about Antonio Capasso