NEWSLETTER
Thursday, June 5, 2025
The Novum Times
No Result
View All Result
  • Home
  • World
    • USA
    • United Kingdom
    • India
    • China
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • Australia
  • Politics
  • Business
  • Health
  • Economy
  • Sports
  • Entertainment
  • Technology
  • Cryptocurrency
  • Gossips
  • Travel
  • Lifestyle
  • Home
  • World
    • USA
    • United Kingdom
    • India
    • China
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • Australia
  • Politics
  • Business
  • Health
  • Economy
  • Sports
  • Entertainment
  • Technology
  • Cryptocurrency
  • Gossips
  • Travel
  • Lifestyle
No Result
View All Result
The Novum Times
No Result
View All Result

Cisco and Rockwell strengthen OT/ICS security with visibility for converged plantwide ethernet (CPwE)

by The Novum Times
9 November 2023
in Business
Reading Time: 3 mins read
A A
Home Business
Share on FacebookShare on TwitterShare on Whatsapp


The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center—the industrial control systems (ICS) the business depends on.

But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once it makes it past the iDMZ conflicts with the zero-trust security principle to never trust, always verify. And as companies look to “digitize” manufacturing and apply more cloud-based services also known as Industry 4.0, more devices need access to production systems.

The answer is micro-segmentation—but there’s a barrier

You can limit the spread of malware that makes it past the iDMZ using a technique called micro-segmentation. The idea is to tightly restrict which devices can communicate and what they can say, confining the damage from cyberattacks to the fewest number of devices. It’s an example of zero-trust in action: instead of taking it on faith that devices only talk to each other for legitimate reasons, you lay down the rules. An HVAC system shouldn’t be talking to a robot, for example. If it is, the HVAC system may have been commandeered by a bad actor who is now traipsing through the network to disrupt systems or exfiltrate information.

So why isn’t every industrial organization already using micro-segmentation? The barrier I hear most often from our customers is a lack of security visibility. To micro-segment your network you need to know every device connected to your network, which other devices and systems it needs to talk to, and which protocols are in use. Lacking this visibility can lead to overly permissive policies, increasing the attack surface. Just as bad, you might inadvertently block necessary device-to-device traffic, disrupting production.

Gain visibility into what’s on the network and how they’re talking

Good news: Cisco and our partner Rockwell Automation have integrated security visibility into our Converged Plantwide Ethernet (CPwE) validated design. With Cisco Cyber Vision you can quickly see what’s on your network, which systems talk to each other, and what they’re saying. One customer told me he learned from Cyber Vision that some of his devices had a hidden cellular backdoor!

Security visibility has three big payoffs. One is awareness of threats like that backdoor, or suspicious communications patterns like the HVAC system talking to the robot. Another benefit is providing the information you need to create micro-segments. Finally, visibility can potentially lower your cyber insurance premiums. Some insurers give you a discount or will increase coverage limits if you can show you know what’s connected to your network.

Visibility sets the stage for micro-segmentation

Once you understand which devices have a legitimate need to communicate, explicitly allow those communications by creating micro-segments, defined by the ISA/IEC 62443 standard. Here’s a good explanation of how micro-segments work. Briefly, you create zones containing a group of devices with similar security requirements, a clear physical border, and the need to talk to each other. Conduits are the communication mechanisms (e.g. VLANs, routers, access lists, etc.) that allow or block communication between zones. In this way, a threat that gets into one zone can’t easily move to another.

Both Cisco and Rockwell Automation provide tools for segmenting the network. Use Cisco Identity Services Engine (ISE) for devices that communicate via any industrial protocol, including HTTP, SSH, telnet, CIP, UDP, ICMP, etc. For your CIP devices, you can enforce even tighter controls over traffic flow using Rockwell Automation’s CIP Security, which secures production networks at the application level. We have several Cisco Validated Designs (CVDs) on a range of security topics, many jointly developed and tested with Rockwell. Examples of our collaboration with Rockwell include Converged Plantwide Ethernet, or CPwE, and the recently added Security Visibility for CPwE based on Cisco Cyber Vision.

A lesson from nature

Combining an iDMZ with micro-segmentation is like blending the protective abilities of a turtle and a lizard. Like the turtle’s shell, the iDMZ helps keep predators out. And like lizards who can drop their tails if a predator gets hold, micro-segmentation limits damage from an attack.

Bottom line: To get started with micro-segmentation—and potentially lower your cyber insurance premiums—use Cyber Vision to see what devices are on your network and what they’re saying.

To learn more about how Cisco and Rockwell can help strengthen OT/ICS security with visibility for CPwE, join us for a webinar on November 14. Register here.

 

Learn more

Share:



Source link

Tags: CiscoconvergedCPwEethernetOTICSplantwideRockwellsecuritystrengthenvisibility

Related Posts

7 Safety Tips For Using A Dumpster Rental

7 Safety Tips For Using A Dumpster Rental

by The Novum Times
10 November 2023
0

Construction projects create a lot of waste. According to Industrial Safety & Hygiene News (ISHN), construction and demolition activities account...

Worker Is Crushed by a Robot That Mistook Him for a Box

Worker Is Crushed by a Robot That Mistook Him for a Box

by The Novum Times
10 November 2023
0

Police are investigating a horrific incident that occurred in South Korea when a man was crushed to death by an...

‘Murder Is The Case’ Keefe D Faces For Allegedly Killing Tupac

‘Murder Is The Case’ Keefe D Faces For Allegedly Killing Tupac

by The Novum Times
10 November 2023
0

by Cedric 'BIG CED' Thornton November 9, 2023 Keefe D is the only living person who was in the vehicle...

Michael Oher Allegedly Received 8K In Proceeds From ‘The Blind Side’ Film Despite Claiming He Never Saw Profits From His Story

Michael Oher Allegedly Received $138K In Proceeds From ‘The Blind Side’ Film Despite Claiming He Never Saw Profits From His Story

by The Novum Times
9 November 2023
0

by Iman Milner November 9, 2023 Michael Oher, the subject of the 2009 film The Blind Side, allegedly received more...

Simplified Partner Tools: Cisco’s First-Ever MSP Support for Exceptional Customer Experiences

Simplified Partner Tools: Cisco’s First-Ever MSP Support for Exceptional Customer Experiences

by The Novum Times
9 November 2023
0

At Cisco we are creating more business value by customizing Cisco tools and services for our partners. In a recent...

Next Post
Dwayne ‘The Rock” Johnson should not run for president

Dwayne 'The Rock" Johnson should not run for president

Colleagues are fed up with Sen. Tommy Tuberville blocking military appointments : NPR

Colleagues are fed up with Sen. Tommy Tuberville blocking military appointments : NPR

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • China
  • Cryptocurrency
  • Economy
  • Entertainment
  • Europe
  • Gossips
  • Health
  • India
  • Lifestyle
  • Mental Health
  • Middle East
  • News
  • Opinions
  • Politics
  • Sports
  • Technology
  • Travel
  • United Kingdom
  • USA

CATEGORIES

  • Africa
  • Asia Pacific
  • Australia
  • Business
  • Canada
  • China
  • Cryptocurrency
  • Economy
  • Entertainment
  • Europe
  • Gossips
  • Health
  • India
  • Lifestyle
  • Mental Health
  • Middle East
  • News
  • Opinions
  • Politics
  • Sports
  • Technology
  • Travel
  • United Kingdom
  • USA

Browse by Tag

Biden Bitcoin Business Canada case Channel China court Cup day dead deal Death Diplomat free global Health Home India Jammu Kashmir killed latest Life Live man National News NPR people Police POLITICO Russia South Time Times Top Tourism Trump U.S UAE Ukraine war world Years
  • About Us
  • Advertise With Us
  • Disclaimer
  • Privacy Policy
  • DMCA
  • Cookie Privacy Policy
  • Terms and Conditions
  • Contact Us

Copyright © 2023 Novum Times.
Novum Times is not responsible for the content of external sites.

No Result
View All Result
  • Home
  • World
    • USA
    • United Kingdom
    • India
    • China
    • Europe
    • Africa
    • Middle East
    • Asia Pacific
    • Canada
    • Australia
  • Politics
  • Business
  • Health
  • Economy
  • Sports
  • Entertainment
  • Technology
  • Cryptocurrency
  • Gossips
  • Travel
  • Lifestyle

Copyright © 2023 Novum Times.
Novum Times is not responsible for the content of external sites.

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In