Brksec 2111
Brksec 2111
Brksec 2111
Francesca Martucci –
Technical Solutions Architect
CyberSecurity - EMEAR
BRKSEC-2111
Cisco Webex Teams
Questions?
Use Cisco Webex Teams to chat
with the speaker after the session
How
1 Find this session in the Cisco Events Mobile App
2 Click “Join the Discussion”
3 Install Webex Teams or go directly to the team space
4 Enter messages/questions in the team space
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 3
Who am I?
Main focus on
• Policy and Access
• Monitoring
• Segmentation
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 4
Digitalization and Industrial IoT (IIoT)
Traditional automation The Industrial Internet of Things
systems SMART
INDUSTRY
Energy, Manufacturing,
Transportation, Process
Industries
SMART
INDUSTRY 4.0 SMART CITIES
GRIDS
DISTRIBUTED DEVICES INTELLIGENT
BUILDINGS
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 5
Security is Top-of-Mind for Industrial Customers
Downtime and Health & Safety issue
@ $2+ B in losses
Sources:
• Kaspersky Lab & PAC 2018
• Forbes
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 7
• OT vs. IT challenges
• Industrial Control Systems
Networks
• Practical approach for
securing industrial systems
Agenda •
•
Visibility and Monitoring
Secure Access
• Segmentation
• Incident response
• Conclusion
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 9
Network Convergence: challenges
IT vs. OT
Different Priorities
Different Knowledge
Different Perspectives
Different Concerns
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 10
OT/IT Requirements
Security = Safety
Reliability and Business
Continuity
OT Requirements Easy to replace
Simple to operate
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 12
OT/IT Actions for Collaboration
The Sooner the Better for Your Business—But Are You Ready?
• Be open to sharing
• Become familiar with OT
knowledge of processes
processes
and operations with IT
• Understand and address
• Understand the risks of OT concerns
connecting insecure
• Become “bilingual” (i.e. be
devices to your IP
able to speak the language
network
of both IT and OT)
• Be open to sharing Each team does what can do best
control with IT
• OT defines the intent
• IT deploys the intent
• OT remains self-sufficient
• OT/IT plan jointly
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 13
Industrial Control
Systems Networks
Purdue Model
A general architecture for IACS networks.
Level 5 Enterprise Network
Enterprise
Security
Level 4 E-Mail, Intranet, Site Business Planning and Logistics Network
Zone
etc.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 15
ISA-99 and IEC 62443 standards
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 16
Purdue Reference Model (simplified version)
Enterprise Network Level 5
Enterprise
Security
Zone
Site Business Planning and Logistics Network Level 4
Firewall
Area
AreaControl
Control Level
Level22
Industrial
Zone
Level Cell/
Basic
BasicControl
Control Level11 Area
Zone
Process Level 0
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 18
Industrial Networks vs. Enterprise Networks
IT Networks: OT Networks:
• Many dynamic applications. • Continually operating.
• Interoperability unconstrained. • Availability and safety first!
• IT teams manage the data. • Few defined long conversations.
• Equipment are known, modern and • OT assets are very old.
controlled. • Attacks look like legitimate
• IT attacks can be identified. instructions.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 22
The road of adding
Security to OT
Security Challenges in Industrial Environments
Lack of Visibility
Aging Systems of what’s out there
Unpatched, legacy
systems
Access Control
Flat Design Access needs evolving
Lack of segmentation
Change Control
24/7/365 Operations
OT Security Skills
IT sec Ops knowledge
Business Needs
Real-time Information
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 24
Steps to successfully securing your infrastructure
Most customers are having trouble getting off the starting block:
They don’t have accurate Asset Inventory and are blind to what
their assets are communicating with
You cannot secure the “things” if you don’t know what they are!
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 27
Security Capabilities in Industrial Security
Secure Access Secure and manage partner and vendor plant floor
access
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 28
Visibility and
Monitoring
You cannot secure what you don’t know
55% have no or low confidence that they ICS equipment deployed over the years
know all devices in their network without strict security policies
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 31
Identity Services
Engine (ISE)
Endpoint Visibility based on context
Cisco Identity Services Engine (ISE) : a policy access control server
Network
What Guest Access
Door
When
BYOD Access
Where
Role-based Access
How
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 33
Context Is Everything
Context information allows implementation of Principle of Least Privilege
Poor context awareness Rich context awareness
IP Address: 192.168.2.101 Infusion Pump
Unknown Vendor
ISE pxGrid
WSA NGIPS FMC NGFW Controller Stealthwatch AMP TrustSec
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 34
Cisco ISE Profiling
Profiling process:
1. Uses probes to collect device attributes
when they connect to the network
2. The attributes are matched against profile
policies (Signatures)
3. Device is classified against the profile
with the highest match
Cisco ISE
Feed Service
(Online/Offline)
ACTIVE PROBES Netflow DHCP DNS HTTP RADIUS NMAP SNMP AD
External Tools pxGrid ISE data collection methods for Device profiling
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 35
Out-of-Box IoT Device Fingerprints
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 36
600+ Automation and Control Profiles
© 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public
Defining security policies without visibility is
complex
Security Platforms
Camera ?
??
Laptop
???
????
Printer
Phone
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 38
Sharing Industrial Asset Identity with ISE
Industrial Asset
Cisco ISE Asset Identity
Network Management
iotMacAddress
for OT users This is a…
iotIpAddress
• CompactLogix Controller…
iotName
• Manufactured by Rockwell
iotVendor
pxGrid iotProductId Automation …
iotSerialNumber • With serial number xxx …
Modbus iotDeviceType • Running firmware xxx …
PROFINET
iotSwRevision • Speaks CIP industrial protocol
CIP BACNet
iotHwRevision
…
iotProtocol
• Attached to switch xxx …
iotConnectedLinks
PLC IO DRIV CONTROL • and it it is in Cell-1 in the Austin
E LER iotCustomAttributes
Plant.
Example of parameters
shared by Cisco IND.
Might vary.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 39
ICS Profile creation in ISE
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 40
IOT Asset Solutions that integrates with ISE
Industrial Network
Director (IND)
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 41
A new standard for profiling
MUD: Manufacturer Usage Descriptions
MUD File:
Access ISE/DNA-C
Device emits
Switch queries
a URL
forwards manufacturer
https://manufacturer.example.com/mydevice.json
Internet
Device
approved
Internet
Enterprise Network
Level 3
Level 2
Level 0-1
4. Provides advanced anomaly detection,
and real-time alerts for any threat to
operational continuity and system Cyber Vision Sensors embedded
integrity. in your industrial network equipment
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 45
Cyber Vision – Visibility
Uses DPI technology to extract meaningful information (data &
metadata) from OT networks using 100% passive sensors
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 46
Monitoring
Cisco Cyber Vision – Activities and Flows
2 Flows list
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 49
Cyber Vision - Monitoring
Maps with all components and activities filtered Purdue Model map with components grouped
by the Preset parameters and by the time frame by Layer of the Purdue Model.
selected.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 50
Cyber Vision – Anomalies Detection
Creates a baseline of traffic, correlating with known malicious behavior (IoC) and
Threat Intelligence feeds to detect abnormal events;
Uses machine learning to classify behaviors and continuously improve detection.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 51
Stealthwatch
Transactional Telemetry NetFlow/IPFIX
eth0/1
eth0/2
Flow
10.2.2.2 Sensor
10.1.1.1
port 1024 port 80
Start Tim
Time Iterface
Interface I
Src IP Src
Src Dest
Dest IP
IP Dest Proto Pkts Bytes SGT DGT TCP Flags
Por
Port Port Sent Sent
Non-NetFlow enabled
10:20:12.221
10:20:12.221 eth0/1
eth0/1 10.2.2.2
10.2.2.2 1024
1024 10.1.1.1
10.1.1.1 80
80 TCP
TCP 5
5 1025
1025 100
100 101
1010 SYN,ACK,PSH
SYN,ACK,PSH equipment
10:20:12.871 eth0/2 10.1.1.1 80 10.2.2.2 1024 TCP 17 28712 101 100 SYN,ACK,FIN
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 53
Visibility and Anomalies
Comprehensive data set optimized Security events to detect anomalies Alarm categories for high-risk,
to remove redundancies and known bad behavior low-noise alerts for faster response
Anomaly detected
in host behavior
~100 Security Events
Threshold
Number of concurrent New flows Number of
flows created SYNs received
Duration
Bits per second Time of day
of the flow
Flows
Exchange Servers
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 54
Host Report - PLC
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 55
Flow Search - PLC
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 56
Visibility – Custom Security Events
?
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 57
IE Switching Portfolio Wall Mount Din-Rail Modular – Din-Rail Rackmount * Select Models
Aggregation
Access
IE5000
IE 3400 (H) IE4000 IE4010
• L2 or L3 (IP service)
• 4 10G* uplinks
IE 3300 • L2 • L2 or L3 (IP service) • L2 or L3 (IP service) • 24 GE downlinks
IE 3200 • L3 • 4 GE uplinks • 4 GE uplinks • Up to 12 PoE/PoE+
• PoE/PoE+ • Up to 20 GE ports • 28 total GE ports • Conformal coating*
• L2 • 2 GE uplinks • Up to 8 PoE / PoE+ • Up to 12 or 24
IE2000 IE2000U • L2 • • Up to 24 GE ports ports PoE/PoE+ • IEEE1588 PTP
Feature
L3
• 2 GE uplinks • 2 GE uplinks • IP30, IP67 • REP, PRP, HSR
• 8 GE downlinks • Up to 24 GE ports • IEEE1588 PTP • IEEE1588 PTP • FNF
• L2 or L3 (IP lite) • L2 or L3 (IP services) • Up to 8 PoE/PoE+ • Up to 16 PoE/PoE+ • IEEE1588 PTP • REP, PRP, HSR • REP, PRP, HSR • Layer 2 NAT
• 2 GE uplinks* • 2 GE uplinks* ports • REP • FNF • FNF • PROFINET, MRP
IE1000 • Up to 8 PoE/PoE+ • Up to 4 PoE/PoE+ • IEEE1588 PTP • FNF • Layer 2 NAT • Layer 2 NAT • Dying gasp
• Small form factor ports • IEEE1588 PTP • REP • MACSec • PROFINET, MRP • PROFINET, MRP • Cisco® TrustSec
• IP30, IP67 • Small form factor • REP • FNF • TrustSec® • Dying gasp • Dying gasp SGT/SGACL
• Lightly-managed • Conformal coating* • MACsec • MACSec SGT/SGACL* • Cisco® TrustSec • Cisco® TrustSec • MACSec
• Layer 2 only • IEEE1588 PTP • PROFINET, MRP • Layer 2 NAT • Layer 2 NAT SGT/SGACL SGT/SGACL • Time-Sensitive
•
•
2 GE uplinks*
30 second boot-up
• IEEE1588 PTP • REP, PRP • PROFINET, MRP • PROFINET, MRP • NetFlow
MACSec • MACSec Network (TSN)
HW-ready
• REP • Time-Sensitive • Time-Sensitive
time • Layer 2 NAT Network (TSN) Network (TSN) • Stacking*
• Web config tool • PROFINET, MRP • IOx HW-ready • IOx-ready
• Up to 8 PoE/PoE+
ports
•
•
Cisco DNA Essentials
DLR (only Stratix)
Rockwell Stratix Series do support Netflow aswell •• •
•
MRP, REP, HSR, PRP
Cisco DNA E/A
IOx-ready
Cisco DNA E/A
• Timing interfaces
(IRIG-B, GPS, TOD)
Stratix 5400 (IE-4000) 5410 (IE-5000) 5800 (IE-3400) • • SDA Extended Node SDA Extended Node •
•
Cisco DNA E/A
SDA Extended Node
10/100M 1G 10G
https://community.cisco.com/t5/security-documents/netflow-support-matrix/ta-p/3644638
General Cisco devices Netflow support matrix
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 59
Full visibility within the Network
Flow based Threat Detection Threat Intelligence
IT User Stealthwatch
Detect breaches, malware,
Enterprise data hoarding, exfiltration... Management
Console
Network
Flow
Level 3 SCADA Engineering Domain Collector
Historian
Operations & Control Server Workstation Controller
Level 0
Sensors Drives Actuators Robots Sensor
Process Application Metadata
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 60
Architecture for Visibility and Monitoring
Enterprise Network Level 5
Area
AreaControl
Control Level
Level22
CyberVision
Monitors mainly East Basic
BasicControl
Control Level
Level11
West Traffic in the
Cell-Area network Process Level 0
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 61
Secure Access
Authenticate everything…
...Even if with MAB...
Centralize Access Control on a Policy Most IIOT devices will not have authentication
Server (ISE) capabilities and will rely on MAB
Authenticate everything
Implement Principle of Least Privilege 802.1X
No access to
unknown devices
Resource
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 63
Industrial Asset Authentication
Industrial DMZ
DACL or Named ACL VLANs Scalable Group Tags
Cisco TrustSec
Downloadable ACL (Wired) Dynamic VLAN Assignments
Software Defined Segmentation Level 3 MES / DCS
Historian
Remediation
Level 0-2
Flat Layer-2 Network
OT User
Vision
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 65
Authentication and Authorization flow
IACS Device is Switches
attached to the authentictes the
network device
Device
Does it match How open
any ISE
authenticated Yes
profiling Yes should the
successfully
conditions? default policy
No No be?
Apply an
approrpiate
access policy
Apply dafult
access policy
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 66
Architecture for Secure Access
Enterprise Network Level 5
Level 3.5
Industrial Demilitarized Zone — Shared Access
Area
AreaControl
Control Level
Level22
Basic
BasicControl
Control Level
Level11
Process Level 0
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 68
Segmentation
Why Segmentation?
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 70
Industrial capabilities for NGFW
Cisco ISA3000 (Industrial
Firepower Security Appliance)
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 71
NGFW Industrial Protocol support
Protocol/App. detectors IDS capability
BACNet Snort has industrial protocols
COSEM preprocessors.
COTP
Can do analysis and anomaly
DNP3
Emission control protocol
detection on them.
Fujitsu device control Modbus
GOOSE DNP3
GSE
IEC-60870-5-104 OpenAppID CIP
IEC-60870-5-104
ISO MMS
Modbus Allows to create IEC 61850 – MMS
OPC-UA application detectors for S7COM*
Q931 custom application
SRC e.g., detect Modbus read coils,
TPKT write single coil etc
CIP
Honeywell Control Station/NIF Server * Roadmap
Honeywell Experion DSA Server Monitor
The firewall can identify the protocol, and Snort can analyze the protocol and
decide if allow in the access control policies check conformace to the standard
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 72
Industrial protocols visibility with detectors
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 74
OpenAppID for specific commands
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 75
Industrial protocols signatures (i.e. SCADA)
• Based on Vulnerabilities
discovered in protocols,
devices
• Protection against
Known/Unknown threats.
• Updated regularly
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 76
Architecture for basic segmentation
Enterprise Network Level 5
Cell-1
Cell-2
Which policy is easier?
Unknown
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 81
TrustSec concepts
Application
Servers
SGT:10
SGT:6
SGT:5 Network
Surveillance
Servers
SGT:12
• Assignment of Security Group Tag (SGT) based on context (identity, device group, etc.).
• SGT are carried propagated through the network
• Firewalls, routers and switches use SGT to make filtering decisions via SGACL.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 82
Classification Mechanisms
Dynamic
Dynamic Classification
Classification Static
Static Classification
AD
PassiveID
Campus
Access Distribution Core DC Core DC Access
Enterprise
Backbone
Hypervisor SW
WLC Firewall
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 83
SGT Propagation
In data plane In control plane
• SGT information stays with traffic • Propagate SGT over an OOB protocol
802.1Q Length
Branches
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 84
Handling enforcement
Identity
Services permit tcp dst eq 6970 log
permit tcp dst eq 6972 log
Engine permit tcp dst eq 3804 log
permit tcp dst eq 2748 log
permit tcp dst eq 5060 log
permit tcp dst eq 5061 log
permit tcp dst range 30000 39999 log
permit udp dst range 5070 6070 log
deny ip log
Authentications
Employee
Application
Servers App Servers
TRAFFIC SGFW
SGACL (Firewall)
ZBFW
(Switch)
(Router)
Database
DB Servers
Servers
IE5000
IE 3400 IE4000 IE4010
• Designed for all
industries
IE 3300 • Layer 2 • For all industries • For all industries • Layer 2 or 3
IE 3200
Feature
10/100M 1G 10G
‘*’ –Selected Models
https://www.cisco.com/c/dam/en/us/solutions/collateral/enterprise-networks/trustsec/6-5-gbp-system-bulletin.pdf
TrustSec Support Matrix for Cisco product Line
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 87
IE Switch Trustsec Capabilities
PLATFORM Trustsec Supported
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 88
Architecture for segmentation
Enterprise Network Level 5
AreaControl
Control Level 2
2
Area
Z1 ✓ ✘ ✓ ✘
PLC ✓ ✓ ✓ ✓
1. CyberVision discovers industrial assets and groups
it into Zones. MES ✘ ✘ ✓ ✓
Stealth
ISE 3 Watch
Zone-1 Zone-2
OT user and IT user are working with asset
identities rather than IP addresses
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 92
Use Case:
Remote Access –
A Challenging
Necessity
Remote Access with Multi Factor AuthC
Adaptive Multi Factor Authentication with DUO
DUO works with Remote Access and any type of Portal Access
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 95
On-Demand Remote Access
AnyConnect to check security posture, Field Engineer
establish VPN From Manufacturer X
Tracks user session in ISE along with
TAG role.
• Only a specific asset being serviced must
be accessible over remote access AnyConnect
Level 3
2
IT User ISE
C O N T E X T
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 96
Architecture for Remote Access
Enterprise Network Level 5
Level 3
Firewall
Remote Access
with MultiFactor
AreaControl
Control Level 2
2
Area
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 99
pxGrid – Industry Adoption
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 100
Rapid Threat Containment Level 3
H O S T G R O U P S
• Group assets in
Q u a r a n t i n e
Stealth
ISE IT User
3 Watch
communication trust C O N T E X T 2
behavior Cell-1
Port
4
Cell-2
Scan
1
• Easily detect the source
of anomaly & quarantine
if necessary
• Quarantine can be non
invasive (Not impacting
communication).
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 101
Conclusion
What we have seen…
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 103
Full architecture
Enterprise Network Level 5
SWE
Site Business Planning and Logistics Network Level 4
ISE
Level 3.5
Remote Access Industrial Demilitarized Zone — Shared Access
with MultiFactor
ISE / Trustsec
AreaControl
Control Level 2
2
Area
Cisco Industrial
Application Data Network
OT Context Cisco Stealthwatch
Security Policies Network Flow Analysis
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 105
What we have seen…
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 106
Threat Prevention and Control for Human devices
Malware Umbrella
C2Callbacks Blocks malicious requests before
Phishing connections are even made,
blocking Threats.
Protects Users
User endpoint
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 107
IT-OT collaboration is vital for securing ICS
Industrial
Cybersecurity skills Industrial process skills
Network Operational events context
Network hygiene
Security policies Traffic OT Asset criticality levels
Detection & Remediation IT Equipment configuration
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 108
Key Takeaways IT-OT collaboration is key to securing ICS
environments
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 110
Complete your
online session
survey • Please complete your session survey
after each session. Your feedback
is very important.
• Complete a minimum of 4 session
surveys and the Overall Conference
survey (starting on Thursday) to
receive your Cisco Live t-shirt.
• All surveys can be taken in the Cisco Events
Mobile App or by logging in to the Content
Catalog on ciscolive.com/emea.
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 111
Continue your education
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 112
Reference sessions
Security
• BRKSEC-2462: (Stealthwatch Beyond Alarms )
• BRKSEC-2430: (ISE Deployment Staging and Planning )
• BRKSEC-1003: (Cisco Platform Exchange Grid (pxGrid) Inside Out )
• BRKSEC-3690: (Advanced Security Group Tags: The Detailed Walk Through )
• BRKSEC-2348: (Deploying AnyConnect with Firepower Threat Defense with posture and MFA )
• BRKSEC-2140: (2 birds with 1 stone: DUO integration with Cisco ISE and Firewall solutions )
• BRKSEC-2382 : (Application and User-centric Protection with Duo Security )
• BRKSEC-2433: (Threat Hunting and Incident Response with Cisco Threat Response )
• BRKSEC-2047: (Behind the Perimeter: Fighting Advanced Attackers )
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 113
Reference sessions
IoT
• BRKIOT-2204: (Leveraging industrial device visibility and operational intent to inform
security policies and controls )
• BRKIOT-2100: (IoT and Intent-Based Networking Solutions for Smart Cities and
Connected Roadways )
• BRKIOT-2600: (Enabling OT-IT collaboration by transforming traditional industrial
networks to modern IoT Architectures )
• DEVNET-1343: (A to Z of MUD Usage for secure IOT Onboarding )
• BRKIOT-1618: (Industrial IoT Network Management using Cisco Industrial Network
Director – A Deep Dive. )
• PSOIOT-1156 : (Securing Industrial Networks: Introduction to Cisco Cyber Vision )
BRKSEC-2111 © 2020 Cisco and/or its affiliates. All rights reserved. Cisco Public 114
Document Links
• Network & Security in Automation Validated Design Guide
https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/Industrial_Automation/IA_Horizontal/DG/Industrial-
AutomationDG/Industrial-AutomationDG.html