Challenges Of Using IEC 62443 To Secure IIoT

S4 Events
6 Apr 202325:54

Summary

TLDRRyan de Souza, a principal Solutions architect at AWS, discusses the application of 62443 standards to the Industrial Internet of Things (IIoT). He covers the evolution of industrial IoT, its impact on operational technology (OT), and the security challenges it introduces. De Souza highlights the importance of the ISA/IEC 62443 standards in securing OT environments and the need for updates to accommodate IIoT devices. He also touches on the role of cloud providers in IIoT security and the available certifications like the ISASecure certification for IIoT components.

Takeaways

  • πŸ˜€ Ryan de Souza, a principal Solutions architect at AWS, discussed the application of 62443 standards to the Industrial Internet of Things (IIoT).
  • 🏭 Industrial IoT is utilized across various industries to improve operational efficiencies, reduce downtime, enhance product quality, and create new revenue opportunities.
  • 🌐 The evolving manufacturing data landscape is influenced by the convergence of Operational Technology (OT) and Information Technology (IT), leading to industrial digital transformation.
  • πŸ”’ Security is a critical factor slowing the transition to full OT and IT convergence due to the need to protect the expanding attack surface introduced by IIoT devices.
  • πŸ“š The 62443 standards, developed by ISA and IEC, provide comprehensive security guidance for industrial automation and control systems, though they predate IIoT.
  • 🚧 Challenges in applying 62443 to IIoT include the need for updated standards to reflect IIoT's impact on OT environments and the lack of a formal role for cloud providers.
  • πŸ”„ The introduction of IIoT upsets the traditional ISA 95 model, necessitating a move towards a zero trust security model to address the increased attack surface.
  • 🌐 Technical Report 62443-4-3 offers prescriptive guidance for asset owners on integrating IIoT into OT environments while adhering to 62443 security standards.
  • 🏒 The shared responsibility model in cloud security involves cloud providers securing the cloud infrastructure and asset owners securing their applications and data within the cloud.
  • ⛑️ ISA Secure offers certifications like the IoT Component Security Assurance Certification for IIoT devices and is working on a system certification that will consider IIoT use cases.

Q & A

  • What is the main topic of the session presented by Ryan de Souza?

    -The main topic of the session is the application of 62443 standards to the Industrial Internet of Things (IIoT), discussing changes in the standards and certifications relevant to IIoT.

  • What roles does Ryan de Souza hold at AWS?

    -Ryan de Souza is a Principal Solutions Architect at AWS.

  • What are the key use cases for Industrial IoT (IIoT) devices?

    -Key use cases for IIoT devices include improving operational efficiencies, reducing unplanned downtime through predictive maintenance, enhancing product quality, improving supply chain management, and creating new revenue opportunities with smart products and services.

  • How does the introduction of IIoT change the traditional OT environment?

    -The introduction of IIoT changes the traditional OT environment by integrating modern devices like IP-based cameras and edge gateways, leading to increased connectivity, data exchange, and new functionalities, while also expanding the attack surface and introducing new security risks.

  • What are the challenges in applying 62443 standards to IIoT?

    -Challenges include the fact that 62443 predates IIoT and thus needs updating, the lack of a formal role for cloud providers in the standards, and the need for a shift from a segmented environment to a zero trust security model due to the increased connectivity of IIoT devices.

  • What is the significance of the technical report 62443-4-3?

    -The technical report 62443-4-3 provides prescriptive guidance for asset owners on introducing IIoT into OT environments while adhering to 62443 security standards. It discusses the application of 62443 to IIoT and is seen as valuable for asset owners.

  • What is the purpose of the Zone and Conduit models in the context of IIoT?

    -The Zone and Conduit models are used to understand threats and vulnerabilities in IIoT environments, informing risk assessments and helping to manage the security of different layers of the OT stack.

  • What is the shared responsibility model for cloud security?

    -The shared responsibility model distinguishes between 'security of the cloud' and 'security in the cloud'. Cloud providers are responsible for security of the cloud infrastructure, while asset owners are responsible for security in the cloud, which includes their applications and data within the cloud.

  • What security capabilities can cloud providers offer to support IIoT implementations?

    -Cloud providers can offer capabilities such as connected asset inventory, identity and access control, over-the-air updates, securing the industrial edge, encrypting data at rest and in transit, alerting and monitoring, security analytics, and backup and recovery of OT and IIoT data.

  • What certifications are available or in progress for IIoT devices and systems?

    -The IIoT Component Security Assurance Certification is available for IIoT devices and gateways, based on 62443-4-1 and 62443-4-2 standards. The System Certification, which will consider IIoT use cases, is a work in progress and will be based on 62443-4-1, 62443-3-3, and 62443-2-4.

Outlines

00:00

🌐 Introduction to Industrial IoT and 62443 Standards

Ryan de Souza, a principal Solutions architect at AWS, introduces the session on 62443 and IoT for industrial applications. He outlines the session's agenda, which includes discussing changes in standards and certifications relevant to the Industrial Internet of Things (IIoT). Ryan emphasizes the widespread use of IIoT across various industries and its integration into the Operational Technology (OT) environment. He differentiates between traditional OT devices like PLCs and HMIs and modern IIoT devices such as IP cameras and edge gateways. The session aims to explore how these devices enhance operational efficiencies, reduce downtime, improve product quality, and create new revenue streams for manufacturers.

05:01

πŸ”’ IIoT Threat Vectors and the 62443 Standards

The paragraph discusses the threat vectors associated with IIoT devices, which are not unique but pose significant risks when compromised, such as denial of service attacks, lateral threat escalation, network surveillance, sabotage, and ransomware. Ryan explains that the 62443 standards, developed by ISA and IEC, provide a comprehensive set of security standards for industrial automation and control systems. However, these standards predate the IIoT and require updates to address the new communication channels and functionalities introduced by IIoT. The paragraph highlights the need for the standards to evolve, including the recognition of cloud providers' roles and the adoption of a zero trust security model to manage the increased attack surface due to IIoT integration.

10:03

πŸ“š Application of 62443 to IIoT and Zone-Conduit Models

Ryan introduces a technical report, 62443-4-3, which is a draft document providing prescriptive guidance for integrating IIoT into OT environments while adhering to 62443 security standards. The document discusses the application of security concepts like zones and conduits to IIoT, emphasizing the need for a new interpretation of these concepts. The paragraph also explains the use of zone and conduit models in risk assessments for IIoT use cases, such as connecting a sensor to an industrial IoT gateway, which then connects to external networks like the internet for cloud services. The models help understand threats, vulnerabilities, and consequences, informing risk management strategies.

15:05

🌐 Cloud Provider's Role and Shared Responsibility Model

This section delves into the role of cloud providers in IIoT projects and the shared responsibility model for cloud security. It explains that while cloud providers are responsible for the security of the cloud infrastructure, asset owners are responsible for security within the cloud, including applications and data. The paragraph highlights the various roles a cloud provider can play, such as a product supplier, maintenance service provider, and system integrator. It also outlines the security services and prescriptive guidance provided by cloud providers to assist asset owners in securing their IIoT applications, such as connected asset inventory, identity and access control, patching and software updates, and securing the industrial edge.

20:06

πŸ›‘οΈ Certifications and Security Capabilities for IIoT

Ryan discusses the importance of certifications like the ISASecure certification for IIoT devices and the ongoing development of system certifications for cloud services. He details the IIoT component security assurance certification, which focuses on device and gateway security, including compartmentalization, software update control, secure remote access, and resilience against DDoS attacks. The paragraph also covers the security capabilities that cloud providers can offer, such as asset inventory management, identity and access control, patching, secure edge gateways, data encryption, alerting and monitoring, and backup and recovery services. The session concludes with a call for standards and certification bodies to evolve rapidly to support the growing adoption of IIoT in OT environments.

25:06

πŸ“š Resources and Conclusion

The final paragraph wraps up the presentation by highlighting the availability of resources, including study reports and certification materials related to IIoT and 62443. Ryan invites attendees to engage with him for further discussions and questions, emphasizing the importance of the presented information for asset owners looking to improve operational efficiencies and maintain competitiveness through the adoption of IIoT technologies.

Mindmap

Keywords

πŸ’‘Industrial Internet of Things (IIoT)

The Industrial Internet of Things (IIoT) refers to the integration of industrial systems with internet connectivity, allowing for the exchange of data and insights to improve efficiency and productivity. In the video, IIoT is discussed as a transformative force across various industries, enabling use cases like predictive maintenance and supply chain improvements. It's highlighted as a key component in the evolving manufacturing data landscape, where traditional OT (Operational Technology) devices are being integrated with modern IIoT devices.

πŸ’‘Operational Technology (OT)

Operational Technology (OT) encompasses the hardware and software systems that detect or measure physical phenomena in the industrial sector to control physical devices or processes. The video describes OT devices such as PLCs (Programmable Logic Controllers), HMIs (Human-Machine Interfaces), and SCADA (Supervisory Control and Data Acquisition) systems. These are contrasted with IIoT devices, and the convergence of OT and IT (Information Technology) is a central theme, discussing how IIoT introduces new risks and opportunities that need to be managed.

πŸ’‘ISA 95

ISA 95 is a standard that defines methods for the integration of enterprise and control systems. The video uses ISA 95 as a framework to discuss the historical and future states of the manufacturing data landscape, showing a transition from standalone applications and data silos to a more connected and cloud-transformed environment. The script mentions how the introduction of IIoT devices into the OT environment is changing the traditional ISA 95 model.

πŸ’‘Security

Security in the context of the video refers to the protection of industrial systems from potential threats and vulnerabilities. It is highlighted as a critical factor slowing down the full convergence of OT and IT due to the increased attack surface that IIoT introduces. The video discusses the need for asset owners to secure their OT environments when implementing IIoT and cloud projects, emphasizing the importance of managing new risks associated with the expanded connectivity.

πŸ’‘Attack Surface

The attack surface in cybersecurity refers to all the potential points where a system can be attacked or breached. The video explains how the introduction of IIoT devices into the OT environment increases the attack surface, as these devices can connect to external or untrusted networks. This expansion of connectivity introduces new risks that need to be addressed by asset owners.

πŸ’‘ISA/IEC 62443

ISA/IEC 62443 is a series of international standards for industrial automation and control systems security. The video discusses how these standards, developed by ISA and IEC, provide a comprehensive set of guidelines for securing industrial systems. It also points out the need for these standards to evolve to accommodate the unique aspects of IIoT, such as the inclusion of cloud providers and the management of new communication channels.

πŸ’‘Zero Trust Model

The Zero Trust Model is a security concept that assumes no automatic trust for any entity inside or outside a network and verifies everything trying to connect to the system before granting access. The video suggests moving towards a Zero Trust security model due to the increased complexity and risk associated with IIoT devices connecting to various layers of the OT stack.

πŸ’‘Shared Responsibility Model

The Shared Responsibility Model is a concept where different parties involved in cloud computing share the responsibility for security. In the video, it is explained that cloud providers are responsible for 'security of the cloud' (infrastructure), while asset owners are responsible for 'security in the cloud' (their applications and data). This model is crucial for understanding how security is managed when implementing IIoT in the context of cloud services.

πŸ’‘Purdue Model

The Purdue Model is a reference model for interconnecting systems in manufacturing and other industries. The video uses the Purdue Model to illustrate the layers of the OT Network and how IIoT devices can connect to external networks, potentially disrupting the traditional model. It also shows how the Purdue Model can be adapted to incorporate IIoT security architectures, such as the use of secure protocols and industrial demilitarized zones.

πŸ’‘ISA Secure

ISA Secure is a certification program for industrial automation control systems that adhere to the ISA/IEC 62443 series of standards. The video discusses the availability of the first IIoT certification under ISA Secure, known as the Industrial Internet of Things Component Security Assurance Certification. This certification is for IIoT devices and gateways, emphasizing the importance of industry-wide standards and certifications in ensuring the security of IIoT implementations.

Highlights

Introduction to the session on 62443 and IIoT by Ryan de Souza, a principal Solutions architect at AWS.

Industrial IoT's application across various industries and its integration into the OT environment.

Definition and examples of industrial IoT use cases, such as improving operational efficiencies and predictive maintenance.

The evolving manufacturing data landscape based on ISA 95, with comparisons between past, present, and future scenarios.

The impact of cloud technology on the transformation of OT in the context of industrial digital transformation and Industry 4.0.

Challenges in the convergence of OT and IT, particularly the security concerns that slow down full integration.

Discussion on the increased attack surface due to new connections introduced by IIoT devices.

Overview of IIoT threat vectors, including denial of service attacks and lateral threat escalation.

Explanation of the comprehensive nature of the 62443 standards and its structure into different groups.

Challenges with using 62443 for IIoT, including the need for updates to the standards to accommodate IIoT.

Introduction of the technical report 62443-4-3, which discusses the application of 62443 to IIoT.

Use of Zone and Conduit models in 62443 for risk assessments and understanding threats and vulnerabilities in IIoT.

The role of cloud providers in IIoT projects and the need for recognition in the 62443 standards.

Explanation of the shared responsibility model for cloud security, distinguishing between security of the cloud and in the cloud.

The Purdue model's usefulness in aligning IIoT security architecture with industrial automation and control systems.

Overview of security capabilities provided by cloud providers for securing the edge and cloud in IIoT applications.

Introduction of the first IIoT certification by ISASecure and its focus on component security assurance for IIoT devices.

Details on the component certification process, including certification tiers and requirements for IIoT devices and gateways.

Ongoing work on the system certification for cloud services in the context of IIoT.

Call for faster updates to standards and certifications to keep pace with the rapid adoption of IIoT in OT environments.

Availability of resources and materials for further study on IIoT component certification and related standards.

Transcripts

play00:00

foreign

play00:08

just making sure that you're all in the

play00:10

right room this is the session on 62443

play00:13

and iiot

play00:16

okay

play00:21

so welcome to this session uh I'm Ryan

play00:24

de Souza and I'm a principal Solutions

play00:27

architect at AWS it's a real pleasure to

play00:29

be with you all here today and the topic

play00:32

I'm going to discuss is 62443 and how to

play00:35

apply it to iiot or the industrial

play00:37

Internet of Things uh in this session

play00:40

we'll be going over some of the changes

play00:43

in the standards as well as the

play00:45

certifications we've got really a lot of

play00:47

content to cover uh so let's get started

play00:51

so as most of you know or most of you

play00:53

are aware industrial iot is used across

play00:56

Industries

play00:57

and uh

play00:59

these are some of the industries that

play01:01

it's it's used in it gets introduced

play01:05

into the OT environment so industrial

play01:06

iot or iiot devices integrate into the

play01:11

OT environment and you do that when you

play01:13

implement industrial iot use cases

play01:17

throughout the stock today I will be

play01:20

discussing and talking about

play01:21

OT devices as well as I iot devices and

play01:25

just to level set when I mention OT

play01:27

devices I mean traditional OT devices

play01:30

like plcs hmis scada systems when I

play01:35

mentioned I iot devices I mean modern

play01:38

iiot devices like IP based cameras

play01:40

secondary sensors as well as Edge

play01:43

gateways these iiot devices get

play01:47

introduced into the OT environment when

play01:49

you implement industrial iot use cases

play01:54

so what are these industrial iot use

play01:57

cases here are some of them it's

play01:59

improving operational efficiencies in

play02:01

the factory okay reducing unplanned

play02:03

downtime with predictive maintenance

play02:05

improving product quality

play02:08

supply chain improvements in Supply

play02:10

Chain management as well as creating new

play02:13

Revenue opportunities for manufacturers

play02:15

with smart products and services

play02:19

let's go ahead and take the take a look

play02:21

at the evolving manufacturing data

play02:23

landscape and I've tried to lay this out

play02:25

based on Isa 95 and based on three

play02:29

different time zones okay so the first

play02:32

time zone we'll take a look at is

play02:34

yesterday

play02:35

in yesterday's world you had asset

play02:37

owners that implemented the traditional

play02:40

para model or Isa 95 model OKAY in this

play02:43

model you had Standalone applications

play02:45

you had data silos very little

play02:47

connectivity between the different

play02:49

layers and few connections to external

play02:52

networks right so that's the yesterday

play02:54

scenario let's go ahead and take a look

play02:57

at what's happening today and tomorrow

play02:59

in the today tomorrow time frame

play03:02

what we have over here is the

play03:04

introduction of iiot so the ongoing

play03:07

convergence of OT and it and the

play03:09

introduction of industrial iot into the

play03:12

OT landscape what is also happening is

play03:14

that in the same way that the cloud

play03:16

transformed the I.T landscape the cloud

play03:19

is transforming and revolutionizing OT

play03:22

in new ways in what is called industrial

play03:25

digital transformation or industry 4.0

play03:30

what's going to happen in the future is

play03:33

even more convergence continued

play03:35

convergence of 40 and it okay I would

play03:38

say full convergence of otnit with any

play03:40

to any Communications in this scenario

play03:42

you have digital factories and smart

play03:45

factories this trend is going to

play03:47

continue this trend is going to

play03:49

accelerate there's nothing stopping this

play03:52

from happening uh what is slowing this

play03:55

down is security right so security is

play03:59

one of the factors that is slowing down

play04:01

this transition towards a full

play04:02

convergence and uh understandably so

play04:05

because asset owners need to secure

play04:08

OT when doing iiot and Cloud projects so

play04:12

this convergence of otnit introduces new

play04:15

opportunities

play04:16

for manufacturers for industrial digital

play04:20

transformation for industry for a door

play04:22

but it also introduces new risk which

play04:25

needs to be properly managed okay if you

play04:28

look at this this architecture over here

play04:30

it is drawn out to the ISA 95 model what

play04:34

iiot introduces is new connections so

play04:37

you can have iiot devices at different

play04:39

layers of the stack establishing

play04:42

connections to external networks or

play04:44

untrusted networks and when this happens

play04:46

you increase the attack surface okay so

play04:49

this introduces new risk into the

play04:51

environment which asset owners need to

play04:53

be aware of and need to be able to

play04:55

protect the full attack surface

play04:58

so let's go ahead and look at the iiot

play05:01

threat vectors these threat vectors are

play05:04

not unique to iiot but they do exist

play05:07

with the industrial internet of things

play05:09

okay and essentially an iiot device can

play05:13

get compromised or may be compromised

play05:15

and may be then used for a denial of

play05:17

service attack

play05:19

an iiot device can lead to lateral

play05:21

threat escalation on the network

play05:23

it can lead to surveillance of the

play05:26

network

play05:27

an iiot device can lead to sabotage

play05:29

attacks on operational technology

play05:32

some of these devices are pretty

play05:33

powerful right some of these Edge

play05:35

Computers are powerful devices and if

play05:38

compromised they can be used for

play05:39

cryptocurrency mining activities

play05:42

lastly the data on the device or the

play05:45

date on the edge Gateway can get

play05:46

encrypted leading to a ransomware attack

play05:48

okay or you could have data that is

play05:51

being exfiltrated from the factory once

play05:54

again these threat vectors are not

play05:57

unique to iiot what is different is that

play05:59

these devices when introduced into the

play06:01

OT environment significantly increase

play06:03

the attack surface which needs to be

play06:06

protected the consequences of a

play06:08

compromise is also what is different

play06:09

because if there is a compromise it can

play06:12

have environment health and safety

play06:15

implications as you're well aware

play06:18

so I'll give you a second to read uh

play06:20

this view of little Bob that or what

play06:23

little Bobby has on the six two four

play06:25

four three standards

play06:27

[Music]

play06:34

uh so what I am going to add is that uh

play06:36

62443 is comprehensive

play06:39

it's a comprehensive set of Standards it

play06:42

also uh is consensus based and it can

play06:46

actually run into thousands of pages

play06:48

right thousands of pages of guidance

play06:50

which makes reading all of this a

play06:52

challenge

play06:55

in order to level set on 62443 and the

play06:59

standards uh so that we are all on the

play07:01

same page it is a series of security

play07:04

standards for Industrial Automation and

play07:06

control systems it was jointly developed

play07:09

and supported and managed by Isa and IEC

play07:12

and therefore it's called Isa

play07:15

iec62443 standards

play07:18

it is structured into different groups

play07:20

and you can see the groups of years you

play07:22

have a general category you've got uh

play07:24

policies and procedures components as

play07:27

well as system

play07:29

uh it is important to note that these

play07:32

standards predate iiot right so they

play07:35

were written before iiot uh you know

play07:38

came into existence and therefore iiot

play07:42

is not already represented in 62443 that

play07:45

needs to change and that's one of the

play07:47

challenges

play07:48

so let's go ahead and take a look at the

play07:50

the challenges uh with using 62443 for

play07:53

the industrial Internet of Things the

play07:56

first is that it predates iiot so it

play07:58

came basically before iiot and therefore

play08:01

you know the standards need to be

play08:02

updated

play08:04

um iiot introduces new communication

play08:07

channels into the OT environment but

play08:09

also brings in lots of new functionality

play08:12

which asset owners can take advantage of

play08:15

uh there are different roles in 62443 so

play08:19

there is the asset owner role uh there

play08:21

is the product supplier role there's

play08:23

also a service provider role there is no

play08:25

formal role for the cloud provider okay

play08:28

so that needs to change a recognition

play08:30

that a cloud provider can play a role in

play08:33

62443 in the iiot environment uh and and

play08:36

that's one of the changes that needs to

play08:37

happen many of the requirements that

play08:40

62443 has or does actually apply to

play08:43

Cloud providers okay so it's not that so

play08:46

there are some changes that need to be

play08:48

made but many of the requirements

play08:49

already apply to a cloud provider

play08:53

uh six two four four three considers a

play08:56

segmented environment so it considers

play08:58

the segmentation it considers this

play09:00

parameter-based security guess what when

play09:02

you have iiot and you have these

play09:04

connections coming in

play09:06

um from that iiot introduces into the OT

play09:09

environment and if you look at the

play09:10

Purdue model you've got these

play09:12

connections to external networks and

play09:14

untrusted networks okay uh so Network

play09:17

segmentation

play09:18

is important but parameter-based

play09:20

security alone is not sufficient you

play09:23

really need to get into a zero trust

play09:24

security model because now you have

play09:26

these incremental connections uh that

play09:29

are different layers of the OT stack

play09:32

that have connections to external

play09:33

untrusted Networks uh iiot upsets the

play09:37

traditional para model and we took a

play09:39

look at that in one of my earlier slides

play09:40

where I showed you a different layers of

play09:42

the Purdue model you can have iot

play09:44

devices making connections to external

play09:46

untrusted Networks

play09:48

so what's actually changing in the

play09:50

standards uh this is one of the

play09:52

important changes that you will see to

play09:55

the standard it is uh the TR or

play09:58

technical report six to four four three

play10:00

four dash three this was jointly created

play10:03

and published by Isa 99 working group

play10:06

nine I'm part of that committee and they

play10:09

published this technical report it's

play10:10

called 62443 4-3 it's also available as

play10:14

an iecpas 62443 4-3 it is yet in draft

play10:19

so it is not yet part of the standards

play10:22

but it will be

play10:23

uh it discusses the application of 62443

play10:27

to iiot and in my view it's a great

play10:30

document for asset owners because it

play10:32

provides asset owners with prescriptive

play10:34

guidance on introducing iiot into OT

play10:38

environments and yet following the 62443

play10:41

security standards

play10:45

security Concepts like zones and

play10:47

conduits have a new meaning for iiot and

play10:49

we'll take a look at that momentarily

play10:51

there is a section in the document that

play10:53

has that talks about the special

play10:55

considerations of using iiot with

play10:58

cloud-based services

play11:01

the document has no normative content so

play11:03

there are no obligations and also this

play11:06

document has got guidance but no

play11:08

technical requirements the technical

play11:10

requirements have not yet been written

play11:12

and and that's one of the ongoing works

play11:14

for the standards

play11:17

so we'll now transition and take a look

play11:19

at using Zone and conduit models uh

play11:22

those of you in the room that have used

play11:23

62443 this should not be a surprise

play11:26

these are Zone and conduit diagrams they

play11:29

follow six to four four three three-2

play11:31

for risk assessments this is a really

play11:34

simple example where I have a secondary

play11:35

sensor connected to in the OT

play11:38

environment connected to an asset so it

play11:40

could be a temperature sensor or a

play11:41

vibration sensor it is connected to an

play11:43

industrial iot Gateway this gateway then

play11:47

establishes a connection to an external

play11:48

network or an untrusted Network like the

play11:50

internet in order to get out get

play11:53

connected to cloud services running

play11:55

remotely okay so this is really a simple

play11:58

use case in this use case we're using

play12:01

the zone and conduit model so you've got

play12:03

different zones you've got the local

play12:04

Zone you've got an edge Zone and you can

play12:07

have multiple trust zones in the cloud

play12:09

as you can see right over here

play12:12

uh this Zone and conduit model diagrams

play12:14

are very useful even for industrial iot

play12:18

use cases in order to understand threats

play12:21

and vulnerabilities right in order to in

play12:24

order to then inform your risk as well

play12:26

as understanding consequences

play12:29

so we briefly spoke about this earlier

play12:31

that 62443 has got standards uh has got

play12:35

sorry roles these roles are the acetona

play12:38

role the product supplier role the

play12:40

service provider role there is no role

play12:42

for cloud provider okay and the cloud

play12:45

provider can actually play multiple

play12:47

roles multiple of the multiple existing

play12:49

roles that 62443 has so for example uh

play12:53

the cloud provider can be a product

play12:54

supplier why is that because cloud

play12:56

services is the product

play12:58

uh the cloud provider can also be a

play13:00

maintenance service provider and why is

play13:02

that because the cloud provider

play13:04

maintains cloud services and in some

play13:06

cases the cloud provider can even be a

play13:08

system integrator if the cloud provider

play13:10

is playing the role of a system

play13:11

integrator on an iiot project

play13:14

so these are the changes that need to

play13:16

happen in the standards in order to

play13:18

recognize that there is a cloud provider

play13:20

and the cloud provider does play a role

play13:22

on iiot projects and related with 62443

play13:27

so when asset owners do use iiot and

play13:31

introduce iiot into their OT

play13:33

environments uh there's always going to

play13:36

be cloud services

play13:38

so it's important for the asset owner to

play13:40

understand what is called the shared

play13:42

responsibility model for the cloud so

play13:45

what is the shared responsibility model

play13:46

essentially it is defined as security of

play13:49

the cloud versus Security in the cloud

play13:52

okay so the cloud provider is

play13:54

responsible for security off the cloud

play13:56

and the asset owner is responsible for

play13:59

security in the cloud what does that

play14:01

mean exactly

play14:04

so this is another view of what I just

play14:08

mentioned where the cloud provider is

play14:10

responsible for the cloud infrastructure

play14:12

right the data centers the services the

play14:15

cloud infrastructure that's the cloud

play14:17

provider's responsibility to secure that

play14:19

part of the solution the asset owner on

play14:22

the other hand is responsible for

play14:24

security in the cloud which means that

play14:26

they are applications okay they are OT

play14:29

and iot applications that they place in

play14:31

the cloud security for those

play14:33

applications and security of that data

play14:35

is the responsibility of the asset owner

play14:37

the cloud provider does provide a lot of

play14:39

Security Services as well as

play14:41

prescriptive guidance in order to help

play14:44

the asset owner with their part of the

play14:46

responsibility

play14:48

in addition to that the cloud provider

play14:50

is continuously monitoring and achieving

play14:52

third-party validation for literally

play14:55

thousands of different

play14:57

compliance requirements security

play14:58

compliance requirements and the asset

play15:01

owner can take advantage of all of that

play15:02

okay because the asset owner inherits

play15:04

those security controls that are

play15:06

operated by the cloud provider

play15:13

so we talked about the Purdue model and

play15:16

how the Purdue model gets upset I do

play15:18

want to mention that the Purdue model is

play15:20

yet very useful okay and this is an

play15:23

example of using the Purdue model with

play15:26

industrial internet of things with

play15:28

Industrial Automation and control

play15:30

systems and uh this is the iiot security

play15:33

architecture it is aligned and it is

play15:36

based on the Purdue model you can see

play15:39

the different layers or levels of the

play15:40

model at the bottom so you've got level

play15:42

zero one two and three zero one two and

play15:46

three that's part of the OT Network or

play15:48

the operational technology network if we

play15:50

take a look at that I actually have some

play15:53

details in this architecture which is

play15:56

shown in in different cells so in the

play15:59

top cell you've got plcs or industrial

play16:01

automation systems that support insecure

play16:04

protocols and in this security

play16:06

architecture we're converting the

play16:07

insecure protocol to a secure protocol

play16:10

right so taking like modbus or ethernet

play16:12

IP and converting it to a secure

play16:14

protocol like OPC UA or mqtt and doing

play16:18

that as close to the source as possible

play16:21

I have a second cell there and in that

play16:23

second cell if you notice I have a data

play16:25

diode or a unidirectional Gateway in

play16:28

order to Able so that you can get data

play16:30

out of that cell without allowing

play16:32

anything to go into that cell

play16:34

in my third cell I've got modern PLC so

play16:38

modern Industrial Automation and control

play16:40

systems that support secure protocols

play16:42

out of the box

play16:44

under the last cell at the bottom is an

play16:46

iiot device in the OT Network that

play16:49

supports secure protocols like mqtt

play16:52

between layer 3 and layer 4 I I'm

play16:56

crossing the otit network boundary so

play16:59

level four and level five is ITN cloud

play17:01

between level three and four I cross the

play17:03

otit network boundary and I've

play17:05

introduced an idmz or an industrial

play17:08

demilitarized zone which can inspect all

play17:11

the traffic going northbound as well as

play17:13

southbound you can establish there are

play17:16

different ways to establish secure

play17:17

connectivity to cloud services you can

play17:20

see on the top you can go over a VPN

play17:23

connection so you can have side to side

play17:25

VPN you can have a private connection or

play17:27

Direct Connect

play17:29

in addition in the center uh you can

play17:32

have uh you can go over the public

play17:34

internet in order to connect to cloud

play17:36

services on the cloud side you've got

play17:38

different services that can ingest data

play17:40

manage devices store data and build

play17:43

industrial iot applications in addition

play17:46

to that the cloud provider provides

play17:47

Security Services in order to secure the

play17:50

edge the industrial Edge and the cloud

play17:52

so in the technical report 62443 4-3

play17:56

there is a section in that report which

play17:59

talks about

play18:01

the security capability is that cloud

play18:03

providers can provide okay so when

play18:05

implementing industrial iot use cases

play18:07

the asset owner can take advantage of

play18:10

different security capabilities provided

play18:12

by the cloud provider what are some of

play18:14

these capabilities so you have connected

play18:17

asset inventory to manage your assets

play18:19

your connected assets and iiot devices

play18:21

you have identity and access control so

play18:25

the cloud provider provides mechanisms

play18:27

that every device every iot device is

play18:29

given a unique identity with an x.509

play18:32

certificate and you can manage

play18:34

fine-grained policies using iot policies

play18:36

in addition to that the cloud provider

play18:39

provides mechanisms in order to generate

play18:41

rotate and revocate credentials for your

play18:45

iiot devices

play18:47

patching and software updates is super

play18:49

important and critical for iiot devices

play18:51

and these are capabilities and services

play18:53

for over-the-air updates

play18:55

securing The Edge Gateway so in iiot

play18:58

you'll always have an industrial Edge

play19:00

that consolidates the data pre-processes

play19:03

the data and then sends it off to the

play19:04

cloud so you've got to secure the

play19:06

industrial Edge you've got to secure the

play19:09

edge Gateway and you've got to secure

play19:10

the credentials on the edge Gateway

play19:13

uh there are different ways as I

play19:15

mentioned to establish secure

play19:16

connections to cloud services as well as

play19:19

secure remote access to on-prem

play19:21

resources you go to encrypt data both at

play19:24

rest as well as in transit and the cloud

play19:26

provider provides services to encrypt

play19:27

your data at the edge in transit in the

play19:30

cloud

play19:32

alerting and monitoring across the full

play19:34

attack surface

play19:35

as well as alerting and mitigation the

play19:39

ability to create a security data Lake

play19:41

in the cloud and security analytics in

play19:44

the cloud can be provided by the cloud

play19:45

provider and last but not the least is

play19:48

backup and recovery of OT data and iiot

play19:51

data in the cloud so the cloud provider

play19:54

provides lots of different Services very

play19:57

useful for asset owners to take

play19:59

advantage of when building and securing

play20:01

industrial iot applications at scale

play20:05

foreign

play20:07

so let's transition to Let's transition

play20:10

to certifications so Isa secure is the

play20:13

certification Institute for 62443 uh and

play20:17

with that we've got the first iiot

play20:20

certification that is available today it

play20:23

is the icsa certification or the iiot

play20:26

component security Assurance

play20:28

certification

play20:30

it is for iiot devices so these include

play20:33

iiot sensors they could be temperature

play20:35

sensors vibration sensor any iot device

play20:38

that establishes a direct connectivity

play20:40

to cloud services or it could be an edge

play20:43

Gateway that consolidates data from

play20:45

multiple devices processes the data at

play20:47

the edge and then sends it to the cloud

play20:49

so if you have any of these devices an

play20:52

iiot sensor or an iot device or an iiot

play20:56

Gateway you can take advantage of this

play20:58

certification that's available today

play21:00

okay by Isa secure

play21:04

getting into some details on the

play21:06

certification it is for devices and

play21:08

gateways there are two certification

play21:10

tiers you have the code here as well as

play21:12

the advanced tier it is based on 4-1 and

play21:15

4-2 which is the component grouping of

play21:18

standards

play21:20

um it does have extensions as well as

play21:22

exceptions in terms of extensions it

play21:25

provides the ability for

play21:28

compartmentalization on the device

play21:31

um

play21:32

controlling software updates so these

play21:34

devices need to have the ability to

play21:35

control and manage software updates

play21:38

secure remote access to the device

play21:41

uh strong methods of authentication

play21:43

using pki and we talked about x.509

play21:45

certificates earlier as well as

play21:47

component resilience of to DDOS attacks

play21:51

there is also a requirement for security

play21:53

maintenance audit in order to maintain

play21:56

your certifications it's important to

play21:59

note that this certification the

play22:01

component certification does not include

play22:03

does not incorporate and does not have

play22:05

in it cloud services okay so for cloud

play22:08

services we've got the system

play22:10

certification the system certification

play22:12

is yet work in progress it is again

play22:15

going to be based on

play22:18

um 4-1 3-3 as well as 2-4 it's going to

play22:22

consider iiot use cases so one type of I

play22:26

iot use case is data being sent to the

play22:29

cloud for visualization and analytics a

play22:32

second type of use case could be a

play22:33

closed loop use case where you have

play22:35

command and control from the cloud down

play22:37

to on-prem resources yeah so this

play22:39

certification the system certification

play22:41

is going to consider industrial iot use

play22:43

cases most of the requirements that

play22:46

62443 has does apply to Cloud providers

play22:49

as I mentioned earlier and risk

play22:51

assessment and Zone and conduit models

play22:52

can be used we took a look at that

play22:54

earlier when I showed you a simple iiot

play22:57

use case which used the zone and conduit

play22:59

model

play23:02

so these are the two certifications the

play23:04

the component certification and the

play23:06

system certification which is yet a work

play23:08

in progress

play23:10

so finally and I'm almost out of time

play23:13

I'd like to end by saying that

play23:17

uh 62443 right in terms of

play23:22

uh in terms of the standards

play23:24

there's a lot in there that can support

play23:26

industrial iot use cases okay uh it

play23:30

really provides a strong Foundation

play23:31

there's no need to start over 62443 can

play23:35

be reused and built upon right and and

play23:38

the required iot requirements can be

play23:40

added four six two four four three to

play23:42

support industrial iot use cases a new

play23:46

interpretation of six to four for three

play23:47

concepts is needed uh the new

play23:49

requirements that need to be added to

play23:51

the 62443 standards and specifically the

play23:54

sections 4-1 4-2 3-3 and 2-4

play24:00

it's important to note that the

play24:02

technical report that is published and

play24:03

the feedback that is received that's

play24:05

going to provide valuable inputs to the

play24:07

different committees and the different

play24:09

working groups in order to go and create

play24:11

the technical requirements okay that

play24:13

then finally get added and incorporated

play24:15

into the standards uh these

play24:17

certifications Isa secure certification

play24:20

and Ice certifications need to be

play24:23

updated new training materials will need

play24:25

to be added uh related to iiot and 62443

play24:29

and last but not the least uh my view is

play24:32

that these standards and certification

play24:34

bodies need to move faster because this

play24:36

is happening industrial iot is already

play24:39

used and will continue to be used in OT

play24:42

environments because asset owners need

play24:44

to improve and and want to improve

play24:46

operational efficiencies as well as you

play24:49

know ensure that these continue to stay

play24:51

competitive

play24:53

a couple of wrap-up slides in terms of

play24:55

IC secure supporters you have all the

play24:58

traditional Industrial Automation and

play24:59

control companies but you can also see

play25:01

you've got Cloud providers uh supporting

play25:03

the ISA secure standards as you can see

play25:05

on the top right hand side

play25:08

foreign

play25:09

and then finally there's lots of good

play25:12

content and material both in terms of

play25:14

the study reports as well as the iiot

play25:17

component certification and these

play25:19

materials are available you know on on

play25:21

on these links and the presentation of

play25:23

course is is available to to all of you

play25:27

uh so with that I want to wrap it up I

play25:29

really uh it was a pleasure to give this

play25:32

presentation today thank you for taking

play25:34

the time uh to attend this uh to attend

play25:36

this this presentation I'm happy to take

play25:39

questions now I'm going to be around for

play25:41

the rest of the week so please find me

play25:42

and would love to chat thank you

play25:45

thank you

play25:48

[Applause]