cred-c.org | 1
Hazmat Signs for Industrial Software …if they existed, what would they look like?
Bryan Owen PE, OSIsoft LLC
Hazmat Signs for Industrial Software if they existed, what would - - PowerPoint PPT Presentation
Hazmat Signs for Industrial Software if they existed, what would they look like? Bryan Owen PE, OSIsoft LLC cred-c.org | 1 Most Industrial Software is Toxic cred-c.org | 2 Toxicity The degree to which a chemical substance can damage
cred-c.org | 1
Bryan Owen PE, OSIsoft LLC
cred-c.org | 2
cred-c.org | 3
The degree to which a chemical substance can damage an organism
cred-c.org | 4
cred-c.org | 5
cred-c.org | 6
cred-c.org | 7
cred-c.org | 8
cred-c.org | 9
HEALTH FLAMABILITY REACTIVITY SPECIAL HAZARDS
Will Not Burn Shock and Heat May Detonate Least Serious Most Serious
cred-c.org | 10
CONFIDENTIALITY INTEGRITY AVAILABILITY SPECIAL HAZARDS
Remote, Anonymous, Default Configuration, Root Access
Remote, Anonymous, Default Configuration, User Access
Remote, Authenticated, Default Configuration, Root Access
Remote, Authenticated, Custom Configuration, Write Access Remote, Authenticated, Read Access
cred-c.org | 11
VISIBILITY ACCESS TRUST SPECIAL HAZARDS
Remote management endpoints
Remote write access endpoints
Remote read access endpoints
Device broadcasts No targets visible remotely
cred-c.org | 12
VISIBILITY ACCESS TRUST SPECIAL HAZARDS
Unmanaged 3P components, 3P managed trust infrastructure
Unmanaged 3P components
3P managed trust infrastructure
Self-managed 3P components, trust infrastructure Trusted foundry with transparency
cred-c.org | 13
OBFUSCATION ISOLATION MONITORING SPECIAL HAZARDS
Blueprint for a science of cybersecurity The Next Wave Vol. 19 No. 2 | 2012 Fred B. Schneider
cred-c.org | 14
A badness-omemter can’t tell you that you’re secure. It can only tell you that you’re not.
Badness-ometers are good. Do you own one? by Gary McGraw https://www.synopsys.com/blogs/software-security/badness-ometers-are-good-do-you-own-one
cred-c.org | 15
cred-c.org | 16
Michael Thow – EPRI Steve Hagan – Fisher Valves Dan Griffin – JW Secure John Connelly – Exelon Inman – Lanier – Fisher Valves Justin Kosar – Assoc. Electric Cooperative Manu Sharma – Exelon Mike Hagen – Fisher Valves Andrew Dettmer – Assoc. Electric Cooperative Kenneth Levandoski – Exelon Andrew Clark – Sandia National Laboratory Steve Ricker – East Kentucky Power Cooperative Brad Yeates – Southern Company Matthew Coulter – Duke Energy Phillip Turner – Sandia National Laboratory Scott Junkin – Southern Company Susan Ritter – Duke Energy Tim Wheeler – Sandia National Laboratory Richard Atkinson – Arizona Public Service Mark Denton – Duke Energy Alice Muna – Sandia National Laboratory Sandra Bittner – Arizona Public Service Norman Geddes – Southern Eng. Services Christine Lai – Sandia National Laboratory
cred-c.org | 17
cred-c.org | 18
cred-c.org | 19
A key part of the Supply Chain
Cyber Security Technical Assessment Methodology: Vulnerability Identification and Mitigation 3002008023
Funded by the U.S. Department of Energy and the U.S. Department of Homeland Security