splunk and control systems enabling a secure iot strategy

17
Copyright © 2016 Splunk Inc. Terry McCorkle Global IoT Architect, Splunk Splunk And Control Systems Enabling A Secure Iot Strategy Menno Vanderlist Sales Engineer, Splunk

Upload: phamtuyen

Post on 03-Feb-2017

227 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: Splunk And Control Systems Enabling A Secure Iot Strategy

Copyright  ©  2016  Splunk  Inc.  

Terry  McCorkle  Global  IoT  Architect,  Splunk  

Splunk  And  Control  Systems  Enabling    A  Secure  Iot  Strategy  

Menno  Vanderlist  Sales  Engineer,  Splunk  

Page 2: Splunk And Control Systems Enabling A Secure Iot Strategy

Disclaimer  

2  

During  the  course  of  this  presentaGon,  we  may  make  forward  looking  statements  regarding  future  events  or  the  expected  performance  of  the  company.  We  cauGon  you  that  such  statements  reflect  our  current  expectaGons  and  esGmates  based  on  factors  currently  known  to  us  and  that  actual  events  or  results  could  differ  materially.  For  important  factors  that  may  cause  actual  results  to  differ  from  those  contained  in  our  forward-­‐looking  statements,  please  review  our  filings  with  the  SEC.  The  forward-­‐looking  statements  made  in  the  this  presentaGon  are  being  made  as  of  the  Gme  and  date  of  its  live  presentaGon.  If  reviewed  aQer  its  live  presentaGon,  this  presentaGon  may  not  contain  current  or  

accurate  informaGon.  We  do  not  assume  any  obligaGon  to  update  any  forward  looking  statements  we  may  make.  In  addiGon,  any  informaGon  about  our  roadmap  outlines  our  general  product  direcGon  and  is  

subject  to  change  at  any  Gme  without  noGce.  It  is  for  informaGonal  purposes  only  and  shall  not,  be  incorporated  into  any  contract  or  other  commitment.  Splunk  undertakes  no  obligaGon  either  to  develop  the  features  or  funcGonality  described  or  to  include  any  such  feature  or  funcGonality  in  a  future  release.  

Page 3: Splunk And Control Systems Enabling A Secure Iot Strategy

Who  are  we?  

  Terry  McCorkle  –  Global  IoT  Architect,  Splunk  

  Menno  Vanderlist  –  Sales  Engineer,  Splunk    

3  

Page 4: Splunk And Control Systems Enabling A Secure Iot Strategy

the  biggest  challenge  

4  

Systems  Created  and  Managed  by  IT  teams   Systems  Created  and  Managed  by  Engineers  vs    

icscompsociety.weebly.com   www.aiche.org  

Page 5: Splunk And Control Systems Enabling A Secure Iot Strategy

Agenda  

  GeWng  Control  System  data  into  Splunk    Other  important  data  for  OperaGons  and  Security    CreaGng  security  communicaGon  

5  

Page 6: Splunk And Control Systems Enabling A Secure Iot Strategy

GeWng  Data  In  is  Easy  

Develop  Visualize   Predict  Alert  Search  

Engineers   Data    Analysts    

Security  Analysts    

Business    Users    

NaAve  Inputs    

TCP,  UDP,  Logs,  Scripts,  Wire,  Mobile      

SDKs  and  APIs    

Java,  JS,  C#,    Python,  Ruby,  PHP      

Modular  Inputs    

MQTT,  AMQP,  COAP,  REST,  JMS      

HTTP  Event  Collector    

Token  AuthenGcated  Events  

Real  Time  

Technology  Partnerships    

Kepware,  AWS  IoT,  Cisco,  Palo  Alto  

Maintenance  Info  

Asset  Info  

Data  Stores  

External  Lookups/Enrichment  

OT  

Industrial  Assets  

IT  

Consumer  and    Mobile  Devices  

IoT  

6  

Page 7: Splunk And Control Systems Enabling A Secure Iot Strategy

Splunk’s  IoT  and  Industrial  Partner  Ecosystem  

7  

There  is  a  partner  to  help  bring  in  your  data  

Development  Partners  Technology  Partners   ConsulGng  Partners  

Page 8: Splunk And Control Systems Enabling A Secure Iot Strategy

Finding  the  other  data  sources  Using  Splunk  across  mulGple  use  cases  with  the  same  data    

8  

Security  •  Windows  Logs  (login  concerns)  •  Network  Events  (traffic  profiles)  •  ApplicaGon  Logs  (unauthorized  apps)  •  Windows  Updates  (missing  patches)  •  Audit  Events  •  Access  Card  Events  (entry/exit)  •  Unresponsive/Lost  Assets  (missing  data)  

IT  OperaGons  •  Windows  Logs  (login  issues)  •  Network  Events  (availability)  •  ApplicaGon  Logs  (HMI  issues)  •  Windows  Updates  (patch  compleGon)  •  Performance  Counters  

Page 9: Splunk And Control Systems Enabling A Secure Iot Strategy

9  

No  connecGvity?  Air  gap  between  networks?  

RestricGve  firewalls?  

Page 10: Splunk And Control Systems Enabling A Secure Iot Strategy

Isolated  Process  Control  Networks  

10  

How  do  we  communicate?  •  Gaining  visibility  •  Corporate  vs.  Control  Networks  •  Bringing  data  back  to  corporate  •  Is  the  network  truly  isolated?  

isolated?  

vendor  

Page 11: Splunk And Control Systems Enabling A Secure Iot Strategy

Centralized  vs  Isolated  Networks  

11  

How  do  we  gain  visibility?  •  Geographically  separated  sites  •  Slow  links  •  Centralizing  Data  •  What  would  you  collect  from?  

Corporate  Network  

Geographical  LocaAons  

Control  Site  

Process  Control  Network  

Page 12: Splunk And Control Systems Enabling A Secure Iot Strategy

Network  CommunicaGon  

12  

Splunk-­‐to-­‐Splunk  (S2S)  vs.  Syslog  vs.  other  •  TCP  vs.  UDP  

Page 13: Splunk And Control Systems Enabling A Secure Iot Strategy

Network  CommunicaGon  

13  

Splunk-­‐to-­‐Splunk  (S2S)  vs.  Syslog  vs.  other  •  TCP  vs.  UDP  •  EncrypGon  •  Acknowledgement  •  Compression  •  Cloud  

OPC  DA  OPC  UA  OPC  HDA  

Splunk  Universal  Forwarder  

Local  Data  CollecAon  •  SCADA  •  HMI  

Page 14: Splunk And Control Systems Enabling A Secure Iot Strategy

Industrial  Firewall  

14  

Difference  between  tradiGonal  and  industrial  firewall  •  Similar  to  Next  gen  firewall  •  Device  and  protocol  awareness  •  Protocol  DetecGon  and  InspecGon  •  Custom  drivers  may  be  needed  to  

communicate  back  

ics-­‐cert.us-­‐cert.gov  

Page 15: Splunk And Control Systems Enabling A Secure Iot Strategy

CommunicaGng  through  a  data  diode  

15  

Data  Diode  Benefits:  secure  one-­‐way  communicaAon  •  One-­‐way  fiber  opGcs  restrict  flow  •  Sending  using  Splunk-­‐to-­‐Splunk  •  Syslog  •  Custom  drivers  for  communicaGon  

corporate  network  

control  network  

data  diode  

network  boundary  

Page 16: Splunk And Control Systems Enabling A Secure Iot Strategy

Quick  Recap  

  Valuable  data  and  insights  within  control  systems  –  OT:  availability,  data  consistency,  and  data  insights  –  IT:  System  Performance  and  Availability  –  Security:  AudiGng  of  System,  User  and  ApplicaGon  events  

  Data  Diodes  facilitate  one-­‐way  communicaGon  –  RestricGons  enable  small  paths  to  communicate  out  

  Access  to  Data  in  Splunk  for  those  who  need  it  –  OperaGonal  and  Business  AnalyGcs  use  cases  –  Centralizes  all  data  to  compare  against  mulGple  data  sets  and  environments  –  Reduces  requirements  for  users  to  log  into  control  systems  

16  

Page 17: Splunk And Control Systems Enabling A Secure Iot Strategy

THANK  YOU