1
© 2018 AVEVA Group plc and its subsidiaries. All rights reserved. AVEVA is a global leader in engineering and industrial software driving digital transformation across the entire asset and operational life cycle of capital-intensive industries. The company’s engineering, planning and operations, asset performance, and monitoring and control solutions deliver proven results to over 16,000 customers across the globe. Its customers are supported by the largest industrial software ecosystem, including 4,200 partners and 5,700 certified developers. AVEVA is headquartered in Cambridge, UK, with over 4,400 employees at 80 locations in over 40 countries. AVEVA believes the information in this publication is correct as of its publication date. As part of continued product development, such information is subject to change without prior notice and is related to the current software release. AVEVA is not responsible for any inadvertent errors. All product names mentioned are the trademarks of their respective holders. About AVEVA @avevagroup linkedin.com/company/aveva www.aveva.com We are dedicated to earning and retaining your digital trust. That is why we transparently publish our security statement. View it for yourself at sw.aveva.com/trust When it comes to cybersecurity, who you partner with is crucial. Software vendors play an important part in your cyber defence strategy. When considering a cloud or IIoT partner here are some key questions to consider. CYBERSECURITY CHECKLIST FOR YOUR VENDOR 200+ Refineries 600+ Food and Beverage Processing Plants 9/10 Shipyards 10 of the Top 15 Mining, Metals and Minerals Companies 1,000+ Power Generation Units There is no better time to take advantage of the IIoT and cloud technologies. Digital transformation is a journey that allows you to transform your existing automation investment into an improved way of doing business. Discover new insights today. START YOUR FREE TRIAL NOW connect.aveva.com/insight Cybersecurity is a multi-faceted discipline requiring a proactive approach across the business. Best-prepared businesses report a focus on the following key areas. YOUR CYBERSECURITY CHECKLIST Partners Select vendors that will partner with you to protect your critical data Understand their security, privacy and legal policies Determine where your data will be collected and stored Devices Change your IoT device passwords from the factory default Extend your security and password policies to mobile devices Conduct regular intrusion testing and anomaly detection on your devices Network Ensure a unidirectional gateway between IT and OT systems Run vulnerability scans and issue patches regularly Install anti-malware solutions for industrial end points Processes Develop, document and validate your cybersecurity program Ensure cross department buy-in e.g. from management, IT, security Cover a range of activities including security audits and vulnerability scans People Invest in security training for staff, contractors and 3 rd parties Educate on dangers of USBs, malware, phishing Make your people active cybersecurity partners Physical Security Where are their cloud services physically deployed? Where will my data actually reside? Where and how will my data be captured, stored and used? Data Security How is your information protected – at rest and in motion? Dœs your vendor support unidirectional data transfer? How dœs your supplier deal with network outages? Application Security How do they handle authentication, authorization and account management? What is their approach to identity and access management (IAM)? Do they offer a flexible, scalable solution? Continuous Monitoring Do they have proactive monitoring and active security policies in place? Can they identify abnormal behavior and catch anomalous activity? What procedures are there to detect and isolate suspicious activity online? Security Assessments Do they have a proactive program of external security audits? How do they deal with ongoing compliance with regulations e.g. GDPR? Do they have a published security statement that you can read? Projects and Delivery Are their project delivery teams certified to global standards such as CMMi Level 5, or ISO 9001? Do they have a Computer Security Incident Response Team (CSIRT) ready to mobilize? Do they have strategic partnerships with key security experts such as Cylance or Claroty? THE PROOF IS IN THE PORTFOLIO Connected devices We build security from the ground up – using components that meet recognized standards, and include enforced encryption. Edge control We incorporate security protection into our system design and development process, including rigorous testing and validation. Apps, analytics, and cloud services Security must be integral to design and fundamentally built into the services that support the operation of your systems. Extreme cases could result in loss of life Exposure of intellectual property Damaging brand and reputation loss Serious fines and penalties Serious environmental impact Lost production and waste End-to-end security Potential Risks of an OT Breach CYBERSECURITY BY THE NUMBERS KEY SECURITY CONSIDERATIONS FOR OPERATIONAL TECHNOLOGY +2100% Increase in industrial cyber attacks over the past three years $3.8 million Typical financial impact of a single cyber attack. Source: Ponemon Institute 300,000+ Number of new Malware programs created every day 928 Number of cloud applications used in the average enterprise $547.2 million Estimated spend on internet of things (IoT) security in 2018 COUNTED ON BY THE WORLD’S MOST TRUSTED INDUSTRIAL LEADERS Rapid advances in technology have seen a corresponding rise in cybersecurity risks. Yet according to most experts, industrial systems are not protected well enough. With many underestimating the risks and impact a breach may have on their business. Cybersecurity requires a proactive stance involving the entire organization. Balance needs to be achieved between mitigating risks and enabling new business initiatives. Focus not only on training staff but on selecting appropriate technology partners. The safety and security of your data is our top priority. As an established leader with over 30 years experience delivering industrial software portfolio, we recognize that your data demands a stringent cybersecurity posture and the highest set of operating standards. Deployed in 100,000+ sites globally Monitoring 20 Billion industrial parameters Processing 10 Trillion industrial transactions per day Storing and managing 12,000 TB of information per year INDUSTRIAL CYBERSECURITY: PROTECTING YOUR DIGITAL TRANSFORMATION INITIATIVES The industrial landscape is changing at an unprecedented rate. Digital transformation initiatives such as IIoT, Cloud and AR/VR not only provide new ways to enhance business performance, but also pave the way for improved business processes and procedures. Along with safety, the most critical area to address during this change is industrial cybersecurity.

INDUSTRI˜L CYBERSECURITY: PROTECTING YOUR DIGIT˜L …...INDUSTRI˜L CYBERSECURITY: PROTECTING YOUR DIGIT˜L TR˜NSFORM˜TION INITI˜TIVES The industrial landscape is changing at

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

  • © 2018 AVEVA Group plc and its subsidiaries. All rights reserved.

    AVEVA is a global leader in engineering and industrial software driving digital transformation across the entire asset and operational life cycle of capital-intensiveindustries. The company’s engineering, planning and operations, asset performance, and monitoring and control solutions deliver proven results to over 16,000customers across the globe. Its customers are supported by the largest industrial software ecosystem, including 4,200 partners and 5,700 certified developers.AVEVA is headquartered in Cambridge, UK, with over 4,400 employees at 80 locations in over 40 countries.

    AVEVA believes the information in this publication is correct as of its publication date. As part of continued product development, such information is subjectto change without prior notice and is related to the current software release. AVEVA is not responsible for any inadvertent errors. All product names mentionedare the trademarks of their respective holders.

    About AVEVA

    @avevagrouplinkedin.com/company/avevawww.aveva.com

    We are dedicated to earning and retaining your digital trust. That is why we transparentlypublish our security statement. View it for yourself at sw.aveva.com/trust

    When it comes to cybersecurity, who you partner with is crucial. Software vendorsplay an important part in your cyber defence strategy. When considering a cloudor IIoT partner here are some key questions to consider.

    CYBERSECURITY CHECKLIST FOR YOUR VENDOR

    200+Refineries

    600+Food and BeverageProcessing Plants

    9/10 Shipyards

    10 of the Top 15Mining, Metals and

    Minerals Companies

    1,000+Power Generation

    Units

    There is no better time to take advantage of the IIoT and cloud technologies. Digital transformation is ajourney that allows you to transform your existing automation investment into an improved way of doingbusiness. Discover new insights today. START YOUR FREE TRIAL NOW

    connect.aveva.com/insight

    Cybersecurity is a multi-faceted discipline requiring a proactive approach acrossthe business. Best-prepared businesses report a focus on the following key areas.

    YOUR CYBERSECURITY CHECKLIST

    Partners

    Select vendors that will partnerwith you to protect your critical data

    Understand their security, privacyand legal policies

    Determine where your data willbe collected and stored

    Devices

    Change your IoT device passwordsfrom the factory default

    Extend your security and passwordpolicies to mobile devices

    Conduct regular intrusion testing andanomaly detection on your devices

    Network

    Ensure a unidirectional gatewaybetween IT and OT systems

    Run vulnerability scans and issuepatches regularly

    Install anti-malware solutionsfor industrial end points

    Processes

    Develop, document and validateyour cybersecurity program

    Ensure cross department buy-in e.g.from management, IT, security

    Cover a range of activities includingsecurity audits and vulnerability scans

    People

    Invest in security training for staff,contractors and 3rd parties

    Educate on dangers of USBs,malware, phishing

    Make your people activecybersecurity partners

    Physical SecurityWhere are their cloud services physically deployed?

    Where will my data actually reside?

    Where and how will my data be captured, stored and used?

    Data SecurityHow is your information protected – at rest and in motion?

    Dœs your vendor support unidirectional data transfer?

    How dœs your supplier deal with network outages?

    Application SecurityHow do they handle authentication, authorization and account management?

    What is their approach to identity and access management (IAM)?

    Do they offer a flexible, scalable solution?

    Continuous MonitoringDo they have proactive monitoring and active security policies in place?

    Can they identify abnormal behavior and catch anomalous activity?

    What procedures are there to detect and isolate suspicious activity online?

    Security AssessmentsDo they have a proactive program of external security audits?

    How do they deal with ongoing compliance with regulations e.g. GDPR?

    Do they have a published security statement that you can read?

    Projects and DeliveryAre their project delivery teams certified to global standards such as CMMi Level 5, or ISO 9001?

    Do they have a Computer Security Incident Response Team (CSIRT) ready to mobilize?

    Do they have strategic partnerships with key security experts such as Cylance or Claroty?

    THE PROOF IS IN THE PORTFOLIO

    Connecteddevices

    We build security from theground up – using componentsthat meet recognized standards, and include enforced encryption.

    Edgecontrol

    We incorporate securityprotection into our system design

    and development process, includingrigorous testing and validation.

    Apps, analytics,and cloud services

    Security must be integralto design and fundamentally

    built into the services that supportthe operation of your systems.

    Extreme casescould resultin loss of life

    Exposureof intellectual

    property

    Damagingbrand and

    reputation loss

    Seriousfines andpenalties

    Seriousenvironmental

    impact

    Lostproductionand waste

    End-to-end security

    Potential Risks of an OT Breach

    CYBERSECURITY BY THE NUMBERS

    KEY SECURITY CONSIDERATIONSFOR OPERATIONAL TECHNOLOGY

    +2100%Increase in industrial

    cyber attacks over thepast three years

    $3.8 millionTypical financial impactof a single cyber attack.

    Source: Ponemon Institute

    300,000+Number of new

    Malware programscreated every day

    928Number of cloud

    applications used inthe average enterprise

    $547.2 millionEstimated spend on

    internet of things (IoT)security in 2018

    COUNTED ON BY THE WORLD’SMOST TRUSTED INDUSTRIAL LEADERS

    Rapid advances in technology have seen a correspondingrise in cybersecurity risks. Yet according to most experts,industrial systems are not protected well enough. Withmany underestimating the risks and impact a breachmay have on their business.

    Cybersecurity requires a proactive stance involvingthe entire organization. Balance needs to be achievedbetween mitigating risks and enabling new businessinitiatives. Focus not only on training staff but onselecting appropriate technology partners.

    The safety and security of your data is our top priority.As an established leader with over 30 years experience delivering

    industrial software portfolio, we recognize that your data demands astringent cybersecurity posture and the highest set of operating standards.

    Deployed in

    100,000+sites globally

    Monitoring

    20 Billionindustrial parameters

    Processing

    10 Trillionindustrial transactions per day

    Storing and managing

    12,000 TBof information per year

    INDUSTRIALCYBERSECURITY:PROTECTINGYOUR DIGITALTRANSFORMATIONINITIATIVESThe industrial landscape is changing at anunprecedented rate. Digital transformation initiativessuch as IIoT, Cloud and AR/VR not only provide newways to enhance business performance, but also pavethe way for improved business processes andprocedures. Along with safety, the most critical area toaddress during this change is industrial cybersecurity.

    https://insight.connect.aveva.com/https://sw.aveva.com/trusthttps://www.aveva.com/https://www.aveva.com/https://www.linkedin.com/company/aveva/https://www.linkedin.com/company/aveva/https://twitter.com/avevagroup?lang=enhttps://twitter.com/AVEVAGrouphttps://twitter.com/avevagroup?lang=en