Its 2024, what are the major OEMs suggesting for security?
Overview by SecureStepPartner
# Recommended Security Measures for Operational Technology (OT) Environments from specific vendors. I am using www.perplexity.ai to find and train based on OEM PDFs that are avaliable online.Here are the specific security measures recommended by Rockwell Automation, Siemens, ABB, Schneider Electric and Mitsubishi Electric for OT environments:##Rockwell Automation1. Endpoint Security
- Develop a risk-based security plan.
- Determine baseline behavior for each endpoint.
- Implement real-time monitoring.
- Align security measures with regulatory standards.
- CrowdStrike is tested on their Servers for FTAC2. Network Segmentation
- Segment networks to limit the impact of security breaches.
- Use firewalls and create demilitarized zones (DMZs) to protect critical data and manage external communications securely.
- ISA/IEC 62443-3-3 has great recommendation on network segmentation3. Zero Trust Architecture
- Implement a zero-trust policy to dynamically authenticate devices before granting network access.4. NIST Cybersecurity Framework
- Follow the NIST Cybersecurity Framework, which includes:
- Identifying risks
- Protecting systems
- Detecting incidents
- Responding to threats
- Recovering operations---## Siemens1. Network Access Protection
- Protect network access to devices using appropriate mechanisms.
- Configure environments according to Siemens' industrial security operational guidelines.2. Operational Guidelines
- Operate devices within a protected IT environment.
- Follow the specific operational guidelines outlined in product manuals.---## ABB1. Vulnerability Management
- Identify and address vulnerabilities in systems, such as cross-site scripting vulnerabilities in Ellipse APM equipment.2. Secure Configuration
- Configure systems securely to prevent unauthorized access and potential exploitation of vulnerabilities.---## Schneider Electric1. Network Segmentation and Isolation
- Emphasizes the importance of separating OT from IT networks.
- Helps contain potential breaches and limit the spread of threats.2. Zero Trust Security Model
- Advocates for a zero-trust approach, verifying every user, device, and connection.
- Assumes nothing is inherently trusted within the network.3. Access Control and Multi-Factor Authentication (MFA)
- Implement robust access controls with MFA.
- Ensures only authorized personnel can access critical systems.4. Patch Management and Regular Audits
- Regularly update systems with security patches.
- Conduct security audits to identify and address vulnerabilities.5. Supply Chain Security
- Review security practices of vendors and third-party suppliers.
- Prevent vulnerabilities from being introduced into the OT environment.---## Mitsubishi Electric1. Zero Trust Remote Access
- Partners with Dispel to integrate secure remote access solutions.
- Monitors, controls, and verifies remote-access operations using a zero-trust model.2. Integration of OT and IT Security Technologies
- Combines OT expertise with information-system security technologies.
- Creates secure environments for remote maintenance and enhances digital manufacturing processes.3. Secure Remote-Access Technology
- Collaborates with Dispel to provide secure remote access services.
- Aligns with NIST 800-53 standards, ensuring cybersecurity measures do not compromise uptime, availability, or crew safety.
Suggestions for me to do a deep dive?
Send me specific deep dive criteria and I will combine my on site hands-on experience with these vendors with what they have started publicly.
Thank You
More OT Content to come
Check out our page SecureStepPartner.com