Cisco Secure Ops Solution

Cisco Secure Ops Solution

Solution Overview

The Cisco

®

Secure Ops Solution supports cybersecurity risk management and compliance for industrial automation environments. It is a combination of on-premises technology, processes, and managed services that helps companies implement and maintain secure access, cybersecurity, and compliance for industrial networks, including layered security controls. Through increased organization transparency, central leadership is able to better understand risks and compliance and make informed investment decisions.

Cisco Secure Ops delivers a standardized, comprehensive and integrated approach to security. It is supported by automation suppliers such as Yokogawa and Rockwell and technology providers such as McAfee and Symantec and provides a framework for a wide range of partners to participate.

Challenges

Operators of industrial control networks have historically relied on a combination of “security by obscurity” and physical segregation to protect their networks against cyber attacks. More recently, this viewpoint has begun to evolve for several reasons:

● Interconnecting industrial systems, networks, and data applications to enable better information flow and decision making opportunities have become highly desirable.

● Proactive monitoring is needed to avoid risks affecting industrial control system (ICS) networks, such as device failures.

● Operating costs for site personnel to implement and maintain security controls are high, affecting overall productivity.

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 10

ICS security architects face a difficult task. First, security controls and solutions tend to be built up over time, and industry vendors tend to approach the problem with point products, expecting security architects to create a smooth-running, integrated solution. But the reality is that this approach is difficult, time consuming, and prohibitively costly to implement and maintain. Second, most security teams don’t fully know what their respective

ICS environments look like from an asset inventory point of view. Without this knowledge, it is impossible to truly harden and secure the environment. Finally, as threats continue to increase, the operating costs of meeting security and compliance needs can be high.

Clearly, a more robust, flexible, and secure solution is required. The solution must connect networks and enable monitoring and data flow over a secure network. It must be flexible and capable of being deployed in existing environments. Most important, it must deliver defense-in-depth features to organize, harden, defend, and respond to threats.

Solution Overview

The Cisco Secure Ops solution is designed to provide an integrated and standardized solution for securing industrial automation environments, protect against risks, improve efficiency, and reduce site downtime. Customers can choose to implement security controls using a building block approach that allows them to address various attack vectors as their business demands (Figure 1).

Figure 1. Building Block Approach to Security

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 2 of 10

Cisco Secure Ops Main Benefits

● Lower risk to ICS domain environment

● Reduced cost of delivering ICS security

● New services that improve productivity and reduce cost of production

● Improved ROI: an independent customer study found approximately US$700,000 savings per site over a 5 year period

Business Benefits

Cisco Secure Ops delivers a wide range of benefits across the organization:

● Business leaders gain situational awareness for better security maturity and compliance within various parts of the business.

● Site leadership and management benefit from reduced management complexity and increased consistency across individual sites, leading to optimized operating costs.

● Site technical leaders are provided with a technical solution to help manage security and compliance on a per-site basis as well as valuable tools to increase security through standardized interfaces and capabilities.

● Corporate risk and compliance leaders receive near-real-time information about operation risks associated with cybersecurity threats and adherence to compliance policies.

Business Results

The Cisco Secure Ops solution provides critical infrastructure security as a service, and customers who implement the solution have experienced:

● A consistent, integrated solution for addressing security and other risks in the industrial control domain

● Increased site productivity and significantly lower operating costs

● Improved, and in some cases, automated compliance

Solution Components

Cisco Secure Ops consists of tightly integrated Cisco and third-party products and services (Figure 2) and is unique in several ways:

● It is designed to be dropped into the demilitarized zone (DMZ), between the enterprise and industrial control domains.

● The solution is designed to be easily deployed in either existing or new environments.

● The integration goes beyond the technology and extends into commercial arrangements with automation suppliers for services such as qualified patches and antivirus updates.

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 3 of 10

Figure 2. Cisco Secure Ops Solution Components

Main features include:

● Single, global information repository

● Situational awareness dashboards and reports (network status, access and inventory management, and security compliance and assurance)

● High-availability infrastructure (for system-to-system and user-to-system connectivity)

● Secure access

● Asset discovery and inventory

● On-premises backup and restore capabilities

● Automated Microsoft Windows and automation-vendor-qualified patches

● Automated signature updates approved by automation suppliers

● Automated daily log collection and management

● Global support 24 hours a day, 365 days a year, using a “follow the sun” support model

● Proactive performance and fault monitoring

● Global security incident response and monitoring services

● Security event correlation and incident notifications

● Network availability and performance monitoring and reporting

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 4 of 10

Cisco Secure Ops Services

Cisco Secure Ops consists of Cisco SecureCenter and SecureSite services. Table 1 lists Cisco SecureCenter services.

Table 1. Cisco SecureCenter Services

Data Center Planning, Design, and Implementation (PDI):

High-Level Design (HLD), Low-Level Design (LLD), etc.

Operational Readiness Testing

Application Monitoring Services

Services Transition and Activation

Technology and Architecture

● High-Level Architecture Build

● Identity Services and Policy Management

Service Operations

● Incident Management

Break and Fix x

Third-Party Escalation Management x

● Situation Management (Critical Issue with Defined Process) x

● Problem Management

● Change Management

Customer Requested Policy Updates (Standard

Changes)

Firmware Updates

Maintenance Window Management and Release

Planning

Track Change History

● Business Continuity Plan (BCP)

● Disaster Recovery x x x x

Service Management

● Service-Level Reporting

● Tracking and Demand Generation

● Business-Level Escalations

● Service Upgrade Management

● Ticketing Integration and E-bonding

● Services Dashboard

● Services Catalog

Managed ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Customer

Premises)

x

Virtual ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Cisco

Premises) x x x x x x

Customer selected and Cisco validated

Virtual cloud x x x x x x x x x x x

Cisco SecureCenter x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x

Hybrid ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Customer

Premises) x x

Private cloud and on-premises kit

Optional x

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 5 of 10

Managed ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Customer

Premises)

Solution Management

● Solution Evergreening and Lifecycle Management

● Core Solution Architecture Validation x

Through

Operational

Readiness Testing

(ORT) x

● Customer Environment Validation

Through

Operational

Readiness Testing

(ORT)

● Network Optimization Services (Cisco Secure Ops Scope) x x

● Solution Roadmap Reviews (4 Times a Year)

● Detailed Release Planning x x x x

● Supplier Management

● Sandbox Monitoring for Testing x x x

Configuration Management

● Asset Reporting

● Asset Management x x

Cisco SecureCenter

Virtual ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Cisco

Premises)

Hybrid ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Customer

Premises) x x x x x x x x x x

Security Bundle

● Password Change Management

● 2-Factor Authentication

● Security Monitoring

● Secure Access x

● Asset Discovery, Asset Inventory, and Compliance

● Automation Supplier Approved Antivirus Management x x

● Automation Supplier Approved OS and Automation Supplier

Patch Management x

● Access and Inventory Management and Status Dashboard x

● Situational Analysis Dashboard (ICS and IT Network Status) x

● Compliance Reporting and Dashboard

● Log Collection and Management

● Identity Services and Policy Management

● Vulnerability Scans

● Advanced Malware Detection

● Cyberthreat Defense (Managed Threat Defense)

Backup and Recovery and Redundancy

● Virtual Machine Replication, Backup, and Restore

● Geographic Redundancy

Service Levels

● Service Window

● Time to Notify (TTN)

● Time to Respond (TTR)

● Change Management Success Rate x x x x x x x x x

7x24 x x x x x x x x x x x x x x x x x x x x x

7x24 x x x x x x x x x x x x x x x x x x x x x

7x24 x x x

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

Optional x x x x x x x x

Page 6 of 10

● Remote Service Restoration

● Technical Availability

4 elapsed hours

● Standard Request (Percentage Completed Without Errors)

Depends on service provider

SLA

● Aged-Ticket Analysis x

● Percentage of Problem Tickets Raised x

● Percentage of Problems with Root Cause Found x

● Percentage of Problems Without Root Cause Found

● Percentage of Problems Resolved

Depends on service provider service-level agreement (SLA) x x

● Service Reliability (Clean Days)

● Operational Key Performance Indicator (KPI) Report

Managed ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Customer

Premises) x x

● Service Request Fulfilled Report x

Cisco SecureCenter

Virtual ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Cisco

Premises)

Hybrid ICS

SecureCenter

(Cisco Owned,

Cisco Managed, and Customer

Premises)

4 elapsed hours

99.90%

>= 99.75% x x x x x x x x

4 elapsed hours

99.90%

>= 99.75% x x x x x x x x

Optional

Table 2 summarizes the services provided for each Cisco SecureSite according to the service tier.

Table 2. Cisco SecureSite: Service Tiers, Service Levels, and Service Windows

Enhanced x

Cisco SecureSite

Cisco SecureSite PDI: HLD, LLD, and

Implementation

Standard x

High x

Services Transition and Activation

Technology and Architecture

● High-Level Architecture Build x

Service Request Management

● Site Survey x

● Order Equipment (Site Instantiation) x

● Stage and Provision Devices

● Build, Configure, and Test

● Hand Over x x x x x x x x x x x x x x x

Standard highavailability connectivity design

High-availability connectivity design and active-standby

High-availability connectivity design and active-active

● Identity Services and Policy

Management

● Physical Security and Safety

● Wi-Fi

● 3G and 4G

Optional x x x x

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 7 of 10

Standard

Service Operations

● Incident Management

Break and Fix

Third-Party Escalation

Management

● Situation Management (Critical Issue with Defined Process)

● Problem Management

● Change Management

Customer Requested Policy

Updates (Standard Changes)

Firmware Updates

Maintenance Window

Management and Release

Planning

Track Change History x x x x x x x x x

Service Management

● Service-Level Reporting

● Tracking and Demand Generation

● Business-Level Escalations x x x

● Service Upgrade Management

● Services Catalog x x

● Ticketing Integration and E-bonding

● Services Dashboard x x x x x

Solution Management

● Solution Roadmap Reviews

(4 Times a Year) x

● Core Solution Architecture Validation x

● Sandbox Monitoring for Testing

● Solution Evergreening and Lifecycle

Management x

● Customer Environment Validation

● Network Optimization Services

(Cisco Secure Ops scope)

● Supplier Management

● Detailed Release Planning

Configuration Management

● Asset Management

● Asset Reporting x x x x x x

Security Bundle

● Layer 3 and 4 Firewall Management

(Sites)

● Password Change Management

● 2-Factor Authentication x x x x x x

● Security Monitoring

● Secure Access x x x x

● Network Segmentation x x

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. x x x x x x x x x x x x x x

Cisco SecureSite

Enhanced x x x x x x x x x x x x x x x x x

High x x x x x x x x x x x x x x x

Optional x

Page 8 of 10

● Asset Discovery, Asset inventory, and Compliance

● Automation Supplier Approved

Antivirus Management

● Automation Supplier Approved OS and Automation Supplier Patch

Management

● Log Collection and Management

● Identity Services and Policy

Management

● Managed ICS Application Hosting

● Vulnerability Scans

● Cyber threat Defense (Managed

Threat Defense)

● Advanced Malware Detection

● Intrusion Protection Service

(Managed IPS)

● Intrusion Detection System (IDS)

● Whitelisting and Blacklisting

● IPS Supervisory Control and Data

Acquisition (SCADA) Signatures x x x

Backup and Recovery and

Redundancy

● Virtual Machine Replication and Data

Backup (Site Level) x x x x x x x x

Standard x

Service Levels

● Service Window

● Time to Notify (TTN)

5x8 x

● Time to Respond (TTR) x

● Change Management Success Rate x

● Deployment Period (3 Months or

Less)

● Remote Service Restoration

● Technical Availability x

8 business hours

● Standard Request (Percentage

Completed Without Errors)

● Aged-Ticket Analysis

● Percentage of Problem Tickets

Raised

● Percentage of Problems with Root

Cause Found

● Percentage of Problems Without

Root Cause Found

● Percentage of Problems Resolved

● Service Reliability (Clean Days)

● Operational KPI Report

● Service Request Fulfilled Report

Training

● ICS IT Team Remote Training

(Twice Annually) x x x x x x x x x x x x x x x x x x x x x x x

Cisco SecureSite

Enhanced x

High x x x x

7x24 x

8 elapsed hours

98.50%

>=90%

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. x x x x x x x x x x x x x x x x x x x x x x x

7x24 x

4 elapsed hours

99.50%

>=95% x x x x x x x x x

Optional x x

Page 9 of 10

Cisco Services

Cisco Services helps ensure that your expectations are met: from planning to building to implementing your solution. Consult with Cisco Services to increase your return on investment and achieve your goals in every phase of your project, even after deployment.

For More Information

For more information about Cisco Secure Ops, please contact your account manager or visit the Cisco Secure Ops

Solution website: http://www.cisco.com/go/secureops .

Printed in USA

© 2014 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information.

C22-732983-00 10/14

Page 10 of 10