CRITICAL INFRASTRUCTURE

advertisement
Owl Computing
Technologies, Inc.
CRITICAL INFRASTRUCTURE
Securing Digital Assets Against Cyber Threats
38 GROVE STREET, SUITE 101
RIDGEFIELD, CT 06877 USA
TOLL FREE: 866-695-3387
PHONE: +1 203-894-9342
FAX: +1 203-894-1297
WWW.OWLCTI.COM
© Owl Computing Technologies, Inc.
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
TABLE OF CONTENTS
2.................................................................
About Owl Computing Technologies, Inc.
3.................................................................
Owl Computing Technologies Global Reach
4.................................................................
Protecting the Networks of Critical Infrastructure
5.................................................................
Critical Infrastructure Process Control Networks
6.................................................................
Owl Solutions for Comprehensive Perimeter Defense
7 - 8............................................................
Security Architecture to Permit OT & IT Efficiency
9.................................................................
Customer Case Studies
10...............................................................
Use Case I: Gas Co.
11...............................................................
Use Case II: Tennessee Valley Authority (TVA)
12...............................................................
Owl DualDiode Technology® Benefits
13...............................................................
Perimeter Defense Product Line
14...............................................................
Current Industry Standards & Regulations
www.owlcti.com
22
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
THE NEXT GENERATION OF CYBERSECURITY SOLUTIONS
Owl Computing Technologies is the proven source for cybersecurity, with reliable solutions deployed globally in government,
military, and critical infrastructure industry networks.
Owl is the unparalleled provider of security products to protect
important information and connections into and out of sensitive
networks, enabling operational efficiencies and mission results.
Owl solutions are a key component of your network defense-indepth securit y strateg y. DualDiode Technology® and Owl
software applications integrate seamlessly into existing network
infrastructures.
Global Compliance & Certifications
US NRC and NERC-CIP Compliant
Common Criteria Certified
UCDSMO Approved Configurations
OPC Certified
EU-TUV Compliant
Owl next generation solutions enable executives to meet their
responsibilties to mitigate cybersecurity threats.
THE OWL ADVANTAGE
Owl’s advanced technology is an unparalleled, impenetrable network security solution designed for absolute network
confidentiality, data integrity, and system availability.
Owl DualDiode Technology®, a patented data diode, coupled with Owl transfer applications—for all data types—results in
hardware-enforced, non-routable technology enabling secure and robust information sharing.
The Owl Perimeter Defense Solutions, and other Owl applications, provide corporate networks, confidential databases, plant
networks, and other more isolated networks with advanced security technology.
THE OWL FOCUS
•
•
•
•
•
•
Mission specific and enterprise security solutions delivered ready for use
US personnel and Subject Matter Experts
US secure supply chain, research, development, and manufacturing
Known costs with no operations and maintenance cost creep
Data transfer applications integrate seamlessly using transport layer protocols
Specialized application transfer products available: OPC, OSIsoft® PI, Invensys™ ArchestrA®, and others
1500+ SECURITY SOLUTIONS DEPLOYED
• Nuclear, Fossil, and Hydro generation
• Oil & Gas and Mining industries
• US National Intelligence Community
• Department of Defense
• Telecommunications
• European and Asian Ministries of Defense
www.owlcti.com
3
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
GLOBAL REACH
SWEDEN
POLAND
NORWAY
CANADA
USA
ENGLAND
GERMANY
FRANCE
JAPAN
SOUTH KOREA
UAE
QATAR
IRAQ
AFGHANISTAN
AUSTRALIA
SAUDI ARABIA
NEW ZEALAND
Patented Network Security Solutions for Government
and Commercial Entities Across the Globe
CRITICAL INFRASTRUCTURE
• Oil and Gas
North America, Europe, and
Middle East
DEFENSE
INTELLIGENCE COMMUNITY
• North America
• North America
• Europe
• Europe
• Electric and Water Utilities
North America and Europe
• Asia
• Asia
• Chemicals
Asia and Middle East
• Australia
• Telecommunications
North America and Europe
• Mining
North America
• Middle East
• Services
Air Force, Navy, Marine Corps,
Army, and Combat Commands
www.owlcti.com
4
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
DEFENSEIN-DEPTH
HIGH
SECURITY
ENTRY-LEVEL
PRICING
SEAMLESS
INSTALLATION
INTEROPERABLE
PROTECTING THE CONFIDENTIAL INFORMATION NETWORKS AND
CONTENT SYSTEMS OF CRITICAL INFRASTRUCTURE
Critical infrastructure supports not only the global economy but also our way of life. The fundamental need to fuel cars, power
homes, and light cities is essential to industry, government and stability. Without secure network architecture, operations
will be hampered in all sectors of the world’s critical infrastructure if exposed to cyber attack.
Divided into four areas – electricity, petroleum, telecommunications, and natural gas – the interdependency and reliance
of the entire economy on these basic industries heightens the risk that a cyber-attack can disrupt energy supplies, cause
blackouts, or worse.
The critical infrastructure industries are aware of their vulnerability to cyber threats and are voluntarily taking steps to
improve security and preparedness. This brochure is intended to provide critical infrastructure industries with information
about advanced, proven network security technology for those industry leaders whose goal is to have the best cyber threat
mitigations.
THE OWL ADVANTAGE
Owl‘s proven solutions, previously only deployed to protect the classified networks of the United States government,
are now commercially available for industry.
www.owlcti.com
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
OWL SOLUTIONS
Confidential Database Protection and Secure Access
Electronic Perimeter Defense for Critical Infrastructure
ICS Protection and ICS Data Transfer
OPC & Historian Replication
Remote Monitoring
Security Information and Event Management
Network Health and Alarm Management
Software Updates and Patch Management
Secure and Automated Software Updating
Industrial Control Sub Network & Insider Threat Protection
SCADA Network Protection
Secure Operating Systems
Security Planning and Architecture Services
Installation Support
Product Technical Services
Lifecycle and Configuration Management Services
Owl Security Operations Center - Monitoring Security Systems 24/7
www.owlcti.com
5
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
26
OWL COMPREHENSIVE PERIMETER DEFENSE
1
ELECTRONIC PERIMETER DEFENSE
Problem: Traditional network security tools fail to establish a clear
plant perimeter and are inadequate to protect against today’s
cybersecurity threats.
Owl Solution: Owl‘s Perimeter Defense Solutions (OPDS) provide
the plant a hardware-enforced one-way device to complement the
physical plant protection against cyber attack.
• Incorporating Owl’s DualDiode Technology® isolates the
plant, or subnets, mitigating network threats
• Transport layer protocol interfaces permit the necessary data
flow from the plant for corporate use
• Concurrently transfers multiple data types
• Deep packet inspection through protocol conversion
• Security policies are compliant with the Center for Internet
Security
2
HISTORIAN, ALARM, AND OTHER OPERATIONAL DATA
Problem: Corporate and engineering personnel require timely
operational data for the efficient management and analysis of plant
operations. These information requirements create attack vectors if
not transferred from the plant by secure means.
Owl Solution: Owl‘s software applications enable the efficient
transfer of plant operational data to corporate and engineering
networks. OPDS natively enables the transfer of plant data from a
wide variety of industrial control application and device vendors.
Certain specialized applications enable historian and other data to
be transferred from the plant.
• Owl PI Transfer Service extracts data from the OSIsoft Plant
Information System on the plant network and delivers it to
an OSIsoft PI System on the destination network. Similar
applications are available for ArchestrA
• Owl OPC Server Transfer Service (OSTS) is OPC Foundation
certified & enables the movement of a wide range of OPC
compliant data from the plant to engineering or corporate
networks
3
SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM)
Network Health & Alarm Management
Problem: Collection of near real-time information about security
alerts to a single point, making it easier to see trends, alerts, and
improve system availability.
Owl Solution: Owl‘s Comprehensive Perimeter Defense Solutions
with Owl Performance Management Service (OPMS) application
enables monitoring of the electronic perimeter.
• Monitoring and management of the electronic perimeter to
identify attacks or security issues
• Real-time monitoring of the Owl Perimeter Defense Solution
and selected critical network security devices
• Clear “dashboard” of information for ease of issue
identification
• Security alerts for Electronic Security Perimeter network
violations and physical substitution/bypass
• Red alerts on the Dashboard and alerts by email or text to
administrators and management
• History of log activity for analysis of anomalies
• Enables the transfer of network health data to third party
SEIM applications
4
SOFTWARE SECURITY UPDATES AND PATCH MANAGEMENT
Secure Transfer of Software Updates into Plant Network
Problem: Current solutions, such as “walk-nets,” create an attack
vector and delay software updates reducing system security and
functionality. Operation requirements call for the timely movement
of software updates and patches into the process control network.
Ad hoc transfer of other file types into the plant network supports
efficient operations.
Owl Solution: Secure Software Update Service is a software product
that provides a controlled file transfer interface that includes stateof-the-art audit trail access and reporting, and restricts passage to
one of three paths:
1. A predetermined set of “while list” files that are verified by
hash number
2. Scanning by one or more anti-malware scanning engines
3. Both anti-malware and white list verification
5
INDUSTRIAL CONTROL SUB NETWORK AND INSIDER THREAT PROTECTION
Supervisory Control and Data Acquisition (SCADA) Network Perimeter Defense
Problem: Providing perimeter defense to critical sub-networks and important master programmable logic controllers (PLC) is necessary for plant
network defense-in-depth.
Owl Solution: Owl Perimeter Defense Solution in a DIN-rail form factor permits the advanced protection provided by Owl DualDiode Technology at the
sub-network or PLC industrial control system level.
www.owlcti.com
7
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
ADOPTING NEW NETWORK ARCHITECTURE SECURITY
1
TYPICAL VULNERABLE TWO-WAY NETWORK CONNECTION
IT Domain
Can be 1000’s of Clients
Operations Domain
Can be 1000’s of Devices
Network Monitoring
UDP Applications
Database
Historian
Remote Screen View
ICS Monitors
Business
Space
ICS Space
FIREWALL
File/Directory
Transfers
Aggregated
Sensor Data
Historian
Replication
FIREWALL
TCP/IP
Applications
Other
Networks
File Processing
Electronic
Collaboration
network line
• Two-way connections between the plant and business networks
• Network connection supports business efficiency
• Networks are vulnerable to cyber attack
2
NETWORK SEPARATION
IT Domain
Can be 1000’s of Clients
Operations Domain
Can be 1000’s of Devices
Network Monitoring
UDP Applications
Database
Historian
Air
Gap
ICS Space
File/Directory
Transfers
Remote Screen View
ICS Monitors
Aggregated
Sensor Data
TCP/IP
Applications
Business
Space
Other
Networks
File Processing
network line
• Disconnection impedes business efficiency
• Not an operationally acceptable solution
• Need to strike a balance between security and efficiency
www.owlcti.com
Historian
Replication
Electronic
Collaboration
28
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
TECHNOLOGY ST ALLOWS OT AND IT EFFICIENCY
3
PLANT NETWORK PROTECTED BUT DATA FLOWS
Operations Domain
Can be 1000’s of Devices
IT Domain
Can be 1000’s of Clients
Network Monitoring
UDP Applications
Database
Historian
ICS Monitors
Remote Screen View
Business
Space
ICS Space
File/Directory
Transfers
Aggregated
Sensor Data
Historian
Replication
DualDiode
Technology ®
TCP/IP
Applications
Other
Networks
File Processing
Electronic
Collaboration
One-Way Data Flow
• Security maintains “disconnected” plant network
• Information flows to support business efficiency
• Better security permits OT and IT to coexist
4
EFFICIENT SECURE ARCHITECTURE
Operations Domain
Can be 1000’s of Devices
IT Domain
Can be 1000’s of Clients
Network Monitoring
UDP Applications
Database
Historian
ICS Monitors
Remote Screen View
Business
Space
ICS Space
File/Directory
Transfers
Aggregated
Sensor Data
Historian
Replication
TCP/IP
Applications
DualDiode
Technology ®
Other
Networks
File Processing
Electronic
Collaboration
Dual Path DualDiode Data Flow
• Security maintains a “disconnected” network
• Information flows to support business and plant efficiency
• Best security permits OT and IT efficiency
www.owlcti.com
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
CUSTOMER CASE STUDIES
BRINGING THE HIGHEST STANDARDS OF GOVERNMENT CYBERSECURITY
TO YOUR CRITICAL INFRASTRUCTURE.
DoD SERVICES PROVIDER
• Single enterprise system more than doubled entire organization’s capacity
• Provided a 50:1 footprint reduction of classified assets for customers’ requirements
INTELLIGENCE SERVICES PROVIDER
• Selected Owl Computing as the preferred transfer solution provider from head-to-head competition
DoD
• Consolidated video and file transfer solution
• Providing systems that allow collection to be done in unclassified domains, reducing classified footprints
UTILITY CUSTOMERS
• Single solution protecting 22,000 critical assets
• Single solution consolidating 29 point-to-point links
• Remote monitoring reduces system maintenance costs
www.owlcti.com
9
10
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
USE CASE 1: Gas Co.
Client oversees and manages all operations associated with seven liquefied natural gas production facilities,
major shipping contracts, and global commercial partnerships.
PROBLEM:
In August 2012, Gas Co. corporate IT, admin, and web services were compromised by a virus attack, causing its plant process network to be
disconnect from its business network.
EFFECT:
Gas Co. needed to connect to maintain continuous operations.
SOLUTION:
Gas Co. successfully deployed the Owl Electronic Perimeter Defense Solution (EPDS) to bridge the air gap between the plant process network
and business network. The Owl EPDS protects plant process control computers and systems while transferring data to business networks for
managers, planners, and schedulers to access the data needed for decision making.
Gas Co. Installation
Business Network
Plant Network
PAS
Alarms
PAS
Alarms
PI
System
Server
PI
System
Server
PI
System
Server
Send Server
Owl PI Connector
Receive Server
Owl PI Connector
PI
System
Server
Owl Performance
Management Service
(OPMS)
Monitoring Send
and Receive Logs
on Receive Side
BENEFITS
1
Network security hardware
enforced by Owl DualDiode
Technology®
2
Seamless installation
with ease of operation
visit www.owlcti.com
3
Remote role-based user
authentication monitoring
and management
11
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
USE CASE 2: Tennessee Valley Authority (TVA)
TVA is the nation’s fifth-largest public power supplier, serving over 150 municipalities
and over 50 industries and government installations.
PROBLEM:
In May 2008, a GAO Audit reported that TVA needed to address weaknesses in control systems and network security. Weak separation existing
between networks serving corporate and those serving more sensitive equipment were vulnerable to attack.
EFFECT & THREATS:
A total air gap response would prevent critical plant data from reaching corporate applications, restricting operational efficiencies and business
continuity.
To maintain an interconnected network, TVA faced the following threat challenges:
• More complex zero-day attacks
• Rise in growth rate of OS and application vulnerabilities
• Delayed patching of systems and software
• Potential for internal and external attacks
SOLUTION:
Deploying data diode one-way technology by Owl Computing Technologies, TVA successfully mitigated threats from internal and external attacks
while maintaining interconnected networks.
Typical Fossil Data Diode Implementation
(Similar for each of 10 plants)
Plant Network
Business Network
Data
Collectors
Apache Web Server
PAS
Alarms
Owl Performance
Management Service
PI System
Server
Corp WAN
Plant Control
System
PI System
Server
Firewall
Dataware Historian
(Sender)
Dataware
Clients
Firewall
Data Diode
Send Server
Data Diode
Receive Server
Dataware Historian
(Receiver)
BENEFITS
1
Secure data diode one-way
technology
2
Increased network
separation and control of
data flow
www.owlcti.com
3
Elimination of existing
vulnerability to internal and
external attacks
12
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
BENEFITS OF OWL COMPREHENSIVE PERIMETER DEFENSE SOLUTIONS
WITH PATENTED DUALDIODE TECHNOLOGY®
1
Provides absolute defense against unauthorized access or commands originating from an outside network
2
Guarantee of secure transfer of necessary operational information to and from control system network
3
Concurrently transfer multiple data types using multiple protocols
4
No connection to outside network via routable protocol (no MAC or IP address)
5
Deep packet inspection through protocol conversion
6
Global compliance and certification of products
7
Restricted access to specified protocols and port addresses
8
Center for Internet Security compliant security policies
9
Role Based Access Control (RBAC) menus for administration
10
Peace of mind: password vulnerabilities non-existent
Owl DualDiode Technology® stands out for its high quality of service, performance, and intensity.
PROCESS CONTROL APPLICATIONS
Leading Industrial
Applications/Historians
Leading IT Monitoring
Applications
OSIsoft PI, PI AF, GE
iHistorian, GE iFIX, Scientech
R*Time, Instep eDNA, GE
OSM, Siemens: WinCC,
SINAUT/Spectrum, Emerson
Ovation, SQLServer, Oracle,
Wonderware Historian,
AspenTech, Matrikon Alert
Manager
Log Transfer, SNMP, SYSLOG,
CA Unicenter, CA SIM, HP
OpenView, IBM Tivoli, HP
ArcSight SIEM , McAfee ESM
SIEM
®
File/Folder Mirroring
Leading Industrial Protocols
Folder, tree mirroring, remote
folders, (CIFS) FTP/FTFP/
SFTP/TFPS/RCP
Remote Access
Remote Screen ViewTM,
Secure Manual Uplink
OPC: DA, HDA, A&E, UA ICCP,
Modbus
www.owlcti.com
Other connectors
UDP, TCP/IP
NTP, Multicast Ethernet
Video/Audio stream transfer,
Mail server/mail box
replication, IBM MQ series,
Microsoft MSMQ
Antivirus updater, patch
(WSUS) updater, Remote print
service
13
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
PERIMETER DEFENSE PRODUCT LINE
ENTERPRISE
Owl Enterprise Perimeter Defense Solution
Owl’s Enterprise Perimeter Defense Solution
(EPDS) provides the defense wall around the
plant systems. A crucial element of defense-in
depth security, EPDS’ DualDiode Technology®
delivers a non-IP, non-routable protocol break
across electronic security perimeters. This
one-way data transfer solution is integrated
into commodity Send- and Receive-only servers
with Owl’s proprietary DualDiode Technology®
communication cards, connected via fiber
optic link. For EPDS, Owl offers link speeds of
155Mbps, 1.25/2.5Gbps, and 10Gbps. Owl data
transfer application software is installed in each
server in support of the operator’s application
transfer requirements.
Plant Network
Business Network
OPC
Alarms & Events
OPC Server
OSIsoft® PI
System Server
OSIsoft® PI
Server
File Server
Data Diode
Send Server
File Directory
Data Diode
Receive Server
Syslog/SIM
Aggregator
Syslog Server
EPDS Installation
Owl Performance
Management Service
(OPMS)
Monitoring Send
and Receive Logs
on Receive Side
MID-RANGE
Owl Perimeter Defense Solution Multi-Purpose (OPDS-MP)
Compact. Affordable Electronic Perimeter Defense. Easy To Deploy. Easy To Use.
• A one-way data transfer solution supporting multiple data types &
formats concurrently across a compact 1U rackmountable chassis
• Transfer rates are 26, 52, 104, 155, 310, 630Mbps, and 1Gbps
• OPDS (and other Owl embedded data diode solutions) provide
absolute security at the network boundary
• Secure one-way transfer support for a broad range of database historians
• Active SCADA, OPC & Modbus interfaces
• Single multi-function 1U 19-inch chassis
OPDS-MP
BASIC
Owl Perimeter Defense Solutions (OPDS-100)
An OPDS family of application-specific data transfer appliances at an entry level, low cost, price point. These single-chassis,
products deliver the same hardware-enforced one-way confidentiality of the proven OPDS-MP platform.
Each appliance contains:
• Single data transfer application
• Independent Send-only and Receive-only servers
• Network isolation by Owl DualDiode Technology®
• Owl Security Enhanced Linux Operating System
OPDS-100
• Support for data transfer speed up to 10Mbps
Owl Perimeter Defense Solution DIN rail (OPDS-100D)
High Security. Low Cost. Single Purpose.
The 100 Series is a family of application-specific one-way data transfer appliances.These singlechassis, rackmountable products deliver the same hardware-enforced one-way confidentiality of the
proven OPDS-MP platform. The OPDS-100D version is a DIN rail mountable form factor.
• Network isolation by Owl DualDiode Technology®
• Support for data transfer speed up to 10Mbps
www.owlcti.com
OPDS-100D
CRITICAL INFRASTRUCTURE PROCESS CONTROL NETWORKS AND INDUSTRIAL CONTROL SYSTEMS
14
CURRENT INDUSTRY STANDARDS & REGULATIONS
Owl Computing Technologies develops technology to the highest standards of security. Consequently, Owl products and solutions meet or exceed the
established guidelines and specifications set forth by the following organizations:
NERC CIP CYBER SECURITY – NORTH AMERICAN ELECTRIC RELIABILITY CORPORATION
The North American Electric Reliability Corporation (NERC) standards set forth the planning and operating requirements for a North American Bulk-Power
System. NERC compliance became mandatory in the US in 2007, and includes nine Critical Infrastructure Protection (CIP) standards that address cybersecurity
and operations. With Federal Energy Regulatory Commission oversight, NERC enforces compliance standards to ensure power grid security and operability.
FIPS – FEDERAL INFORMATION PROCESSING STANDARDS
Federal Information Processing Standards (FIPS) publications provide a guide for security requirements involving federal information and information systems.
NIST – NATIONAL INSTITUTE OF STANDARDS AND TECHNOLOGY
National Institute of Standards and Technology (NIST) Special Publications cover areas of general interest to the cybersecurity community, with particular
publications including: a Guide for Developing Security Plans for Federal Information Systems, Recommended Security Controls for Federal Information
Systems, and a Guide to Industrial Control Systems (ICS) Security. NIST documents are the standard for many federal cybersecurity programs.
NRC – US NUCLEAR REGULATORY COMMISSION
In regulations like 10 CFR 73.54 “Protection of Digital Computer and Communication Systems and Networks“ and guides to its implementation, the NRC
directs nuclear operators to implement cybersecurity to eliminate or mitigate vulnerabilities in the digital system that could be exploited either from outside
or inside of the digital system protected area.
Owl Computing Technologies closely monitors updates and news from the following organizations and policies to stay abreast of the latest regulations and
rules as they pertain to cybersecurity product development and deployment:
NIAP – NATIONAL INFORMATION ASSURANCE PARTNERSHIP
The National Information Assurance Partnership (NIAP) evaluates information technology (IT) products under the coordination of NIST and the NSA. The NIAP
program helps consumers choose off-the-shelf IT products to meet their security needs, and helps manufacturers gain standing in the marketplace.
PCII – PROTECTED CRITICAL INFRASTRUCTURE INFORMATION PROGRAM
The Protected Critical Infrastructure Information (PCII) Program is a voluntary information sharing and protection program between system operators and
the government. Homeland security partners and the government use PCII for critical infrastructure security analysis, identifying system vulnerabilities, and
enhancing response preparedness.
PRESIDENTIAL DECISION DIRECTIVE 63 – POLICY ON CRITICAL INFRASTRUCTURE PROTECTION (PDD-63)
PDD-63 is the framework for critical infrastructure protection (CIP), outlining steps for coordinated efforts between the government and the private sector in
protecting essential physical and cyber systems. It further established CIP as a national goal.
PRESIDENTIAL POLICY DIRECTIVE – CRITICAL INFRASTRUCTURE SECURITY AND RESILIENCE (PPD-21)
PPD-21 is a federal directive that addresses the government’s role with regard to critical infrastructure functions and responsibilities, while identifying energy
systems as particularly critical due to their reach across multiple infrastructure sectors.
PPD-21 also delineates the federal government’s role in engaging international partners to strengthen interrelated critical infrastructure.
The aims of PPD-21 are to organize infrastructure cross-functionality at the government level, allow information exchange, and aid integration and analysis
functions used in planning and operations.
TECHNICAL REFERENCE LIST
“Secure Software Update Service (SSUS™) White Paper”: http://www.owlcti.com/whitepapers/13-9_6-B-WP.pdf
“All Diodes Are Not Equal White Paper”: http://www.owlcti.com/whitepapers/13-9_6-A-WP.pdf
www.owlcti.com
SERVICE & SUPPORT CENTER
63 COPPS HILL ROAD
RIDGEFIELD, CT 06877 USA
HEADQUARTERS
38A GROVE STREET , SUITE 101
RIDGEFIELD, CT 0687 USA
v7
Download