Why Internal Network Security Monitoring (‘INSM‘) Begins with Visibility
The concept of visibility was introduced to most of us at an early age. The message was clear. Seeing is important.
What is Network Security Monitoring and Visibility for IT
If you've been to an airport in recent years, you've likely seen the proliferation of self-serve check-in kiosks. Maybe you even caught one roaming around the airline ticket counter. If you insert your credit card, the kiosk retrieves and displays your flight information, allows you to change your seat, check your bags, and one day might offer you a cup of coffee. When you're finished, the kiosk transmits your check-in status to the airline, prints your boarding pass and luggage tags, and tells you where to pick up your coffee.
IT data includes everything sent over the internet to retrieve your flight information, like keystrokes, your credit card number, or biometric data. OT data includes the control signals sent along an internal 'network' used by components inside the kiosk, like the display screen, the printer, and the computer that instructs them.
Cybersecurity for IT and OT have a lot in common in that they both require the ability to inspect data to ferret out hackers and malware. The devices and systems used in the collection and handling of network data for threat analysis are commonly referred to by IT as Network Security Monitoring aka Visibility.
What is Network Security Monitoring for Critical Infrastructure?
FERC recently issued a Notice of Public Rulemaking ('NOPR') directing NERC to develop Reliability Standards for Internal Network Security Monitoring ('INSM') for Critical Infrastructure. Existing NERC CIP Reliability Standards focus on defending the network perimeter. NERC CIP Standards for INSM will focus on improving visibility inside your network.
Patrick Miller, CEO of Ampere Industrial Security, explains Network Security Monitoring for Critical Infrastructure as something akin to the flight data recorder, or black box, used on airplanes to collect and record information about the flight. Stuff like fuel, altitude, heading, and airspeed are collected by sensors and stored in a crash-survivable medium used for accident and incident investigation.
When something goes wrong, the 25 hours of data recorded onto the data recorder can often provide insight into what went wrong. But even the best recording device is only as good as the inputs it receives. And that's where Visibility comes in.
Visibility/Monitoring for critical infrastructure (and OT), typically begins with the addition of network TAPS at the Control System level. Network TAPS are purpose-built devices that capture and send vast amounts of hidden bits and bytes to packet brokers and security tools that inspect and respond to abnormal or malicious activity.
Once TAPS are installed, network packet brokers filter, aggregate, regenerate and efficiently route network traffic to security tools, and are useful for mitigating the challenge of examining vast quantities of network data. Systems that capture all network packets, especially while under attack, create a complete historical archive of required data to meet strict NERC CIP audit requirements. The addition of TAPS creates a tightly integrated, compliant, security solution for critical infrastructure. They give you ready access to data from critical infrastructure systems without adding to the compliance footprint or the need to reprogram network switches. So, when the next supply chain attack happens or new reporting regulations are enforced, you'll have the ability to see whether or not you're affected.
- +1 Like
- Add to Favorites
Recommend
- Keysight Technologies Acquires Quantum Benchmar, Augmenting Keysight‘s Quantum Portfolio
- Keysight First to Gain OmniAir Qualified Test Equipment Status, Accelerating C-V2X Device Certification
- Keysight First to Gain GCF Approval of Cases for Validating 5G New Radio mmWave Devices in Standalone Mode
- Keysight Massively Parallel Board Test System Selected by LACROIX in Automotive Printed Circuit Board Manufacturing
- Keysight, TIM and JMA Wireless Join Forces to Showcase O-RAN Technology at Mobile World Congress 2021
- Keysight, Xilinx and Cisco Showcase Solutions that Support Smooth Migration from 4G LTE Networks to 5G Open RAN
- Keysight Unveils the First Media Access Control Security Test Solution for High Speed Ethernet
- Keysight, MediaTek Join Forces to Establish 5G Connectivity Based on 3GPP Release 16 Specifications
This document is provided by Sekorm Platform for VIP exclusive service. The copyright is owned by Sekorm. Without authorization, any medias, websites or individual are not allowed to reprint. When authorizing the reprint, the link of www.sekorm.com must be indicated.