Using dimensional virtue prepare network security services to prevent network attacks

On March 12, 2021

Connected to the production environment and critical infrastructure are increasingly subjected to cyber attacks.Therefore, maintain the security level of the automation system and keep it updated is crucial.Automation d virtue in providing network security services, help them to ensure business continuity, and in the worst case, enables customers to quickly recover from the network attack.

D virtue in process industry and power plant digital aspects of the long history can be traced back to the 1960 s, since then I have been constantly develop digital solutions.In today's interconnected and integrated production environment, this is an advantage.Under the environment of Internet integration, however, we face a new kind of take the form of network attack to the business continuity threat.

Process automation system is vital for the reliable operation of the factory, so for the cyber attacks, also more and more incentive target.This means that the company must ensure that the use of information technology (IT) not only security, but also must pay attention to operating technology (OT), the safety of the process automation system.Existing attack several instances of "success", they closed the whole production factory, or to pay a ransom to avoid a shutdown.

Create a safe production environment

Valmet DNA Cybersecurity Services network security Services designed to support the customer to create and maintain a safe production environment.In addition, the virtue of network security consulting services may also include the possible attacks after rapid recovery plan and disaster drill services."Our starting point is that automation system at the time of delivery is safe.Through a service agreement, the client can be sure that the system is handed over to them later."

D virtue solution managerTeemu KiviniemiSaid.D virtue constantly tracking by the leading information security in institutions (such as Microsoft, CERT to wi-fi and ICS - CERT) released the latest information about security threats and malware, and according to these information to take the necessary action.

"D virtue automation has obtained the certificate of information security and comply with ISO/IEC 27001:2013 information security management system standard.In addition, our product development methods and has passed the IEC 62443-4-1 ISASecure guarantee security development life cycle (SDLA) network security authentication certificate.The certification confirmed our processes are safe."

"We know better than anyone else Valmet DNA automation system, we can rapid assessment which will affect the network threats.After the test, we can automatically provide to the customer need to update."Kiviniemi explains.

To ensure that the automation system availability and business continuity of services

D virtue automation for its customers with two sets of protocol based network security service: Valmet DNA Cybersecurity essen-based - tials Valmet DNA System Monitoring and System Monitoring.

Valmet DNA Cybersecurity Essentials is an almost automatically updates, keep customer system security services.It includes antivirus software, patch management, asset list and system recovery related services.It is independent of the used Valmet DNA version, because it is based on a virtual machine image, Valmet Cy - bersecurity Server.

Valmet DNA System Monitoring including network and node Monitoring, intrusion detection, Monitoring and centralized logging Monitoring.System identification of DNA anomalies of network traffic, and alarm when detect the abnormal situation.But, still need to read the findings.

"Intrusion detection monitoring has become a hot topic.In some business and market, this is a must, is also the government requirements.We can foresee that in the near future, will be the standard functions in the network security system.Kiviniemi said.Personnel to solution

To prepare

Despite all the preparation, the network security system and training, but sometimes can be malicious attacks.In the worst cases, formulate appropriate automation system recovery plan is very important.

The company's business continuity plan should always include automation system recovery plan

"Our network security consulting service to customers customized recovery plan.As we have seen, the company's business continuity plan should always include automated system recovery plan."Kiviniemi said.D virtues provide another popular consulting service is network attack crisis drills.These exercises are usually make the factory management.The threat is there.Is true.Therefore to be prepared.

D virtue based network security training

Valmet DNA network security is based on a one-day training, to provide customers the Valmet DNA automation system architecture, network security control and service details.

After the training, participants will learn about different network threats, and know how to use the Valmet DNA network security solutions and services, protect the ICS/OT environment from typical malicious attacks.

During the training areas:

  • Industry control system, IT and network security foundation of OT
  • Today's attack with the typical medium and tactics
  • In need of protection technology
  • Assets liquidation plan and life cycle
  • Terminal (reinforcement, anti-virus protection, patch management, white list, etc.)
  • Network monitoring (network segmentation, firewall, IDS/IPS, etc.)
  • The remote connection (Valmet SCS and Secomea)
  • Recovery plan
  • Network security drills

Wen: Sanna Haanpaa - Liukko

Information technology (I T)

Refers to the technology used to process information, including software, hardware, communication technology and related services.IT does not control any process.Regular security updates.Leading information security company about a month released a patch (" patch Tuesday "), and then corporate IT department to decide when to release patches within the organization.Every few years in the IT environment system will replace the new version.

Operating technology (OT)

OT refers to monitor or control the company's physical equipment, machine, process, and the hardware and software of events, like automation system.OT related security updates the execution of the frequency is far lower than the IT side, because the operation or production does not stop just because the update.The OT system life cycle is usually in decades.

Today, under the impetus of the virtualization, mobility and cloud computing, OT and IT is faster and faster convergence.