Industrial Automation Security April 6 th, 2011 Oliver Niedung Microsoft OEM EMEA Embedded Server.

Slides:



Advertisements
Similar presentations
Customer success stories: Empower people-centric IT.
Advertisements

Speaker Name, Title Windows 8 Pro: For Small Business.
EMERGING TOPICS IN DATA, APPLICATION AND INFRASTRUCTURE PROTECTION Taher Elgamal ITU
Microsoft Security Solutions A Great New Way of Making $$$ !!! Jimmy Tan Platform Strategy Manager Microsoft Singapore.
The Big Picture on Security Frank O’Keeffe Regional Information Security Manager Microsoft Corporation.
The future of Desktops Transform Your Desktop with Virtualization.
Bernhard van der Feen Product Solution Manager Security Microsoft.
A Technical Overview of Microsoft Forefront Client Security (FCS) Howard Chow Microsoft MVP.
Defense-in-Depth Against Malicious Software Jeff Alexander IT Pro Evangelist Microsoft Australia
Unified Logs and Reporting for Hybrid Centralized Management
Ronald Beekelaar Beekelaar Consultancy Forefront Overview.
Copyright 2011 Trend Micro Inc. Trend Micro Web Security- Overview.
Gabriel Fedorko Microsoft Slovakia. Evolving Security Threat Landscape Methods to Addressing Security Threats Microsoft Trustworthy Computing Addressing.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
Small Business Security By Donatas Sumyla. Content Introduction Tools Symantec Corp. Company Overview Symantec.com Microsoft Company Overview Small Business.
Kaspersky Open Space Security: Release 2 World-class security solution for your business.
Smart Card Deployment David Gautrey IT Manager – Microsoft New Zealaand Microsoft Corporation.
Microsoft Cloud Services Training and Certification Presented by Name Goes Here, Title.
Norman Endpoint Protection Advanced security made easy.
CISCO CONFIDENTIAL – DO NOT DUPLICATE OR COPY Protecting the Business Network and Resources with CiscoWorks VMS Security Management Software Girish Patel,
Cliff Evans Security and Privacy Lead Trustworthy Computing Group Microsoft UK.
Solution Briefing Business Productivity in Action Keynote.
Microsoft Internet Safety Enforcement: A worldwide team of lawyers, investigators, technical analysts and other specialists whose mission it is to make.
The Difficult Road To Cybersecurity Steve Katz, CISSP Security Risk Solutions Steve Katz, CISSP Security.
Norman SecureSurf Protect your users when surfing the Internet.
Windows XP Migration Jumpstart Offering Offering Datasheet The Challenges With less than one year until the end of support for Windows XP, customer are.
Partnering For Profitability Growing your business with Microsoft Forefront Security Solutions Mark Hassall Director Security & Access BG Microsoft Corporation.
©2012 Check Point Software Technologies Ltd. | [Confidential] For Check Point users and approved third parties Building Your Security Strategy with 3D.
1 Managed Security. 2 Managed Security provides a comprehensive suite of security services to manage and protect your network assets –Managed Firewall.
Copyright 2009 Trend Micro Inc. OfficeScan 10.5 VDI-aware endpoint security.
1 Brett Roberts Director of Innovation | Microsoft NZ | 28 Aug 07 Technology and Privacy.
1. Windows Vista Enterprise And Mid-Market User Scenarios 2. Customer Profiling And Segmentation Tools 3. Windows Vista Business Value And Infrastructure.
Microsoft Windows Vista “Longhorn” Client Operating System
Dell Connected Security Solutions Simplify & unify.
POSITIONING STATEMENT For people who operate shared computers with Genuine Windows XP, the Shared Computer Toolkit is an affordable, integrated, and easy-to-use.
Virtual techdays INDIA │ 9-11 February 2011 Security Discussion: Ask the Experts M.S.Anand │ MTC Technology Specialist │ Microsoft Corporation Anirudh.
© British Telecommunications plc BT Managed Services Innovate
Security Professional Services. Security Assessments Vulnerability Assessment IT Security Assessment Firewall Migration Custom Professional Security Services.
Doug Cavit Chief Security Strategist Trustworthy Computing.
Asif Jinnah Microsoft IT – United Kingdom. Security Challenges in an ever changing landscape Evolution of Security Controls: Microsoft’s Secure Anywhere.
Microsoft and Community Tour 2011 – Infrastrutture in evoluzione Community Tour 2011 Infrastrutture in evoluzione.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CUTTING COMPLEXITY – SIMPLIFYING SECURITY INSERT PRESENTERS NAME HERE XXXX INSERT DATE OF EVENT HERE XXXX.
The Infrastructure Optimization Journey Kamel Abu Ayash Microsoft Corporation.
Virus and anti virus. Intro too anti virus Microsoft Anti-Virus (MSAV) was an antivirus program introduced by Microsoft for its MS-DOS operating system.
Introducing Microsoft Azure Government Steve Read Barbara Brucker.
1 Evolution and Revolution: Windows 7 and Desktop Virtualization How to Accelerate Migration to Windows 7 Miguel Sian, Sr. Enterprise Solutions Consultant.
Enabling Secure Always-On Connectivity [Name] Microsoft Corporation.
Are cybersecurity threats keeping you up at night? Your people go everywhere with devices, do the apps and data they need go with them? Can you adopt.
Microsoft and Symantec
Välkommen till Forefront Tour 2008!. Forefront Partners här idag.
Reducing server sprawl and IT power/cooling costs Moving from reactive to proactive state Quickly troubleshooting PC and laptop issues Deploying new.
Computer Security By Duncan Hall.
Windows Small Business Server 2003 R2 Powering Small Businesses.
Opening up SMB with the exciting and new range of Windows Essential Server Solutions Robbie Upcroft, Microsoft Australia Wayne Small, SBS MVP.
Connect with life Ravi Sankar Technology Evangelist | Microsoft Corporation Ravisankar.spaces.live.com/blog.
Tim Rains Group Product Manager Microsoft Session Code: SIA101.
Delivering Assured Services John Weigelt National Technology Officer Microsoft Canada.
Infrastructure for the People-Ready Business. Presentation Outline POINT B: Pro-actively work with your Account manager to go thru the discovery process.
Kaspersky Small Office Security INTRODUCING New for 2014!
Securing a Host Computer BY STEPHEN GOSNER. Definition of a Host  Host  In networking, a host is any device that has an IP address.  Hosts include.
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Microsoft’s Security Strategy
11/23/2018 3:03 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
Securing the Threats of Tomorrow, Today.
Implementing Client Security on Windows 2000 and Windows XP Level 150
Agenda The current Windows XP and Windows XP Desktop situation
Security in the Real World – Plenary Day One
In the attack index…what number is your Company?
Cloud Computing for Wireless Networks
Presentation transcript:

Industrial Automation Security April 6 th, 2011 Oliver Niedung Microsoft OEM EMEA Embedded Server

2 Today’s Security Challenge Securing current Windows Embedded based Automation Systems Managing security in modern Windows based Automation System environment How to benefit from Cloud Computing in securing Automation Systems Q&A Agenda

What are the questions that you would like to get answered today? Introduction 3

Botnets and rootkits Viruses and worms Phishing and fraud Unauthorized access Spam Spyware Regulatory compliance Inappropriate content Corporate policies Information loss/leakage Patch management Unmanaged PCs Today’s IT Security Challenges Need 24/7 uptime Personal info online Consumerization of IT

Slide 3 of 16 Examples Spyware Rootkits Application attacks Phishing Social engineering Attacks Getting More Sophisticated Traditional defenses are inadequate Hardware O/S Drivers Applications GUI User Physical National Interest Personal Gain Personal Fame Curiosity AmateurExpertSpecialist Largest area by volume Largest area by $ lost Script-Kiddy Largest segment by $ spent on defense Fastestgrowingsegment Author Vandal Thief Spy Trespasser Crime on the Rise mainframe client/server Internet mobility B2E B2C B2B Pre- 1980s 1980s1990s2000s Number of Digital IDs Exponential Growth of IDs Identity and access management challenging 2010 Increasingly Sophisticated Malware Antimalware alone is not sufficient Changing mix of malicious and potentially unwanted software Source: Microsoft Security Intelligence Report (January – June 2007) 3Q09 4Q09 1Q10 2Q % 35.3% 32.3% 29.9% 24.0% 24.2% 19.6% 20.8% 18.0% 12.7% 13.3% 13.1% 11.4% 5.3% 3.1% 6.0% 6.1% 1.0%.6% 40%35%30%25%20%15%10%5%0%

High number of security threats (Viruses, worms, intrusions,...) also in automation environments. Stuxnet. Long term availability of industrial automation solutions (lifecycle) & availability of patches. More connectivity between manufacturing and business networks  process insights. Ongoing management of users, devices, configurations, patches. Increasing knowledge required for IT security and administration. Industry specific: Often a requirement to keep production going even when system is compromized. 6

Microsoft acknowledges high responsibility as a result of the broad installed base. This clearly is a software industry problem. Secunia 2010 Half Year Report: −The overall conclusion is that despite considerable security investments, the software industry at large still proves unable to produce software with substantially less vulnerabilities, highlighting the continued need for Vulnerability Intelligence and Patch Management. −Further, the report shows an alarming development in 3rd party program vulnerabilities, representing an increasing threat to both users and business, which, however, continues to be greatly ignored. This trend is supported by the fact that users and businesses still perceive the operating system and Microsoft products to be the primary attack vector, largely ignoring 3rd party programs, and finding the actions to secure these too complex and time-consuming. Ultimately this leads to incomplete patch levels of the 3 rd party programs, representing rewarding and effective targets for criminals. −In the two years from 2007 to 2009, the number of vulnerabilities affecting a typical end-user PC almost doubled from 220 to 420, and based on the data of the first six months of 2010, the number is expected to almost double again in 2010 to 760. −A typical end-user PC with 50 programs installed had 3.5 times more vulnerabilities in the 24 3rd party programs installed than in the 26 Microsoft programs installed. It is expected that this ratio will increase to 4.4 in

Reduce Time-to-Market and cost Increase End-Product reliability Reap the benefits of application compatibility Long-term availability and support To thrive in today’s economy, factories and plants that produce manufactured goods, oil, gas, food, and pharmaceuticals must run at the highest efficiency while ensuring flawless quality. This requires total infrastructure and management control—from Sensors to Servers. Windows® Embedded integrated solutions from Microsoft provide that foundation for control by supporting the entire process and by helping to reduce time-to-solution, increase plant reliability, and lower production costs. 8

Fast time-to-market Broad ecosystem of partners −Many partners to chose from −Rich applications Product support Long lifecycle High ROI (return on invest) Easy and powerful management (System Center) Easier to find experienced administrators Less training required System Reliability End-to-End solutions 9

ANSI Standard: Security for Industrial Automation Most industrial automation vendors are members 10

MES – Manufacuting Execution System (Produktionsplanung) MCS – Manufacturing Control System (Automatisierungsebene) 11

Awareness −General staff security training and secure processes, e.g. password, no USB key access −Ask your vendor for their security concept and how it can be implemented in your current environment. Active Protection −Network segmentation: −Avoid exposure of the Manufacturing systems to the internet. −Hide Manufacturing sytems from business networks. −Example: Microsoft Threat Management Gateway Appliance from SecureGUARD −Clients −Antivirus tools, e.g. −Microsoft Security Essentials (MSE) −Forefront Endpoint Protection Unified patching −Patch management tools (e.g. System Center) and processes – for all applications and operating systems. Good website:

Business Practices Privacy Reliabili ty Commitment to customer-centric interoperability Recognized industry leader, world-class partner Open, transparent Dependable, available Predictable, consistent, responsive service Maintainable Resilient, easily restored Proven, ready Secures against attacks Protects confidentiality, integrity, and availability of data and systems Helps manage risk Protects from unwanted communication User choice and control Products, online services adhere to fair information principles Security SQL Server ® 2005 Visual Studio ® 2005 Malicious SW Removal Tool Windows ® XP SP2 DSI Launched Trustworthy Computing announced; SDL begins Windows Server ® 2003 Windows Defender Windows Live ® OneCare Windows Vista ® Office 2007 Forefront ® Windows Server 2008 SQL Server 2008 End-to-End Trust Microsoft Security Essentials Windows 7 Windows Azure Microsoft Security Essentials v2 U-Prove Office

A Secure Web Gateway Solution

Secure Web Gateway Features

Windows Embedded Device Manager 2011 −New product based on Microsoft System Center Configuration Manager. Use the differential VHD to always boot from a secure image Ask your vendor to use Windows Server Core to reduce the number of required patches by approx. 59% 16 Windows XP Embedded Windows Embedded Standard 2009 Windows Embedded Standard 2009 Windows Embedded Standard 7 Windows XP Embedded Windows Embedded for Point of Service Windows Embedded POSReady 2009 Windows Embedded Standard 2009 Windows Embedded Standard 7 Digital SignageThin ClientPoint Of Service

Microsoft Intune −Manage and secure PCs using Windows cloud services and Windows 7. IT staff can remotely perform a number of essential management tasks including Microsoft updates, malware protection, and inventory management so IT and end-users can remain productive from virtually anywhere. Windows Azure and SQL Azure CloudGUARD 17

Call to Action Learn more about Microsoft Products −Threat Management Gateway: −SecureGUARD: −Microsoft Security Essentials (MSE): −Forefront Endpoint Protection −Microsoft Embedded: −Embedded Device Management: us/library/ff aspxhttp://msdn.microsoft.com/en- us/library/ff aspx −Windows Intune management.aspxhttp:// management.aspx Developing Secure Code: −Secure Development Lifecycle (SDL) on MSDN:Lifecycle (SDL) on MSDN Secunia − andwww.secunia.com −2010 half year report.2010 half year report Industrial Automation −ISA 99 WebsiteWebsite −Example Siemens Security Framework PCS7 and WinCC − 18Microsoft Confidential

Q&A Questions and Answers 19Microsoft Confidential