ICS-Security-Using-TNC-Technology-Architects-Guide
ICS-Security-Using-TNC-Technology-Architects-Guide
GLOBAL
IT INTRANET INTERNET GLOBAL
INTERNET
IT INTRANET
PLANT
WORKER
Figure 1: The transition from isolated to integrated networks requires a Secure ICS and IT Intranet.
IP OVER BACKHAUL
time. This easily pro- UNTRUSTED
vides sufficient justifi- IP NETWORK
cation for an alterna- Protection
• Authentication
tive methodology.
• Confidentiality
Designed for retro- X • Integrity
fitting new security • Policy Enforcement
X
functionality into ex-
ISOLATION BOUNDA
isting industrial con- FIELD OVERLAY X RY
trol systems as well WORKER NETWORK X
as incorporating into
Transparency
ETHERNET
new ICS products,
IF-MAP-based tech- • Existing
nology creates virtual ICS protocols
• Layer 2 VPLS
overlay networks
on top of standard ICS OPS CENTER FIELD ICS
shared IP network in-
frastructure. This ap-
proach allows for ag- Figure 3: An overlay network architecture that delivers connectivity and protection.
gregation and coordi-
nated/controlled response across multiple, frequently re- IF-MAP provides the capabilities needed for the BHIs to
mote sites. A specific site can get help from headquarters deliver the overlay network functionality, including:
and from other sites, and headquarters can respond to a • Coordination (including current IP addresses,
common problem at multiple sites. Vendors and contrac- identity, certificates, etc.) between the BHIs
tors can be provided constrained, as-needed access to • Administrative policy defining communication
equipment. There are significant advantages to the over- between BHIs
lay approach, particularly when it involves crossing admin-
• BHI overlay policies controlling which ICS devices
istrative/management boundaries of the networks.
the BHI allows to communicate across the overlay
System components include the operator, BHI, overlay • Administration policies controlling who is allowed
network, and ICS devices (such as sensors, actuators, to access and alter the configuration of the overlay
controllers, and supervisory systems such as SCADA network and the BHIs
systems). Network security policies are orchestrated by
IF-MAP using standard metadata. As shown in Figure 3,
BHIs communicate with each other, and with the envi-
ronment’s Metadata Access Point (MAP) service, over
2
http://www.networkworld.com/news/2013/042213-boeing-268986.html
3
http://www.rtcmagazine.com/articles/view/101522
4
http://www.trustedcomputinggroup.org/resources/tcg_security_automation_architects_guide
5
http://www.trustedcomputinggroup.org/resources/tnc_ifmap_binding_for_soap_specification
6
http://www.trustedcomputinggroup.org/resources/tnc_ifmap_metadata_for_network_security
Call to Action
• Design ICS security solutions customized for your unique environments.
• Contact vendors and insist on acquiring TCG-certified ICS security solutions based
on the TNC and ISA standards.
• Deploy solutions in pilot first, observe and correct issues, then deploy into production.
• For more information on TCG technologies and architects guides, please visit the
Trusted Computing Group web site www.trustedcomputinggroup.org.
• Additional information on ICS security will be available over the next several months.
Learn about the latest advances by following us on LinkedIn and Twitter.
Contact TCG at admin@trustedcomputinggroup.org with any questions.