Cisco Blogs
Share

Protecting Critical Infrastructure Networks with Zero Trust Segmentation


November 7, 2018 - 2 Comments

Critical infrastructure providers are increasingly implementing IoT systems to support, augment, or update their already networked  operational technology.  Further, critical infrastructure is often managed and deployed over connected systems supported or used by mobile professionals.  At the same time, cyber threats to critical infrastructure remain of significant concern.  Adversaries are constantly evolving their capabilities to attack and potentially disrupt critical infrastructure.  As such, the need to build dynamic and resilient networks to support critical infrastructure is of the upmost importance.

One of the most effective ways to prevent or limit the damage of a cyber-attack on critical infrastructure is through security segmentation.  However, traditional approaches to network segmentation that rely on static firewalls placed at choke points throughout a network have proven ineffective.

  1. They introduce too much complexity as rule sets need to be individually managed.
  2. They do not easily allow for the dynamic nature of today’s IoT enabled critical infrastructure networks. Segmentation needs to allow for a dynamic network where different IoT, mobile, and computing devices are constantly being placed on the network, being taken off, or moved around.
  3. Traditional segmentation doesn’t take into account the identity or trustworthiness of network endpoints or the individuals who may be using those devices. Finally, traditional network segmentation doesn’t do anything to help enforce additional security policies or enable visibility, and thus becomes a tactical exercise that is often discarded due to the complexity of implementation.

The answer to these shortcomings lies within Forrester’s Zero Trust Model.  The basis of the Zero Trust Model is to imagine how to implement security if all devices and networks were directly on the Internet.  As such, critical infrastructure providers are unable to assume trust based on location, such as on a corporate Internet or within a physically secure facility or distributed location. The Zero Trust Model is especially relevant in that it provides an actionable technical framework for the protection of critical infrastructure.  In order to securely communicate, devices that want to communicate on the network must be authenticated as does any individual using those devices and then a level of trust assigned.  Communication must be constrained and protected via network isolation, or segmentation, and/or encryption.  Policies that limit access to data and devices to only the minimum needed must be enforced.   Visibility to actions of devices and individuals on the network must be achieved and security events be detected and appropriately actioned.  Finally, all this must be orchestrated via a robust and automated platform.

Zero Trust Network Segmentation from Cisco

Cisco’s SD-Access solution provides a holistic technology architecture that enables critical infrastructure providers to implement Zero Trust segmentation across their networks.  A combination of Identity Services Engine (ISE) and the Duo authentication platform enables authentication of both users and devices as well as the ability to profile devices for policy enforcement.  ISE also provides fabric based segmentation and dynamic threat control while Stealthwatch enables security visibility through Cisco NetFlow monitoring and analysis.  All of this is managed and orchestrated via Cisco DNA Center, our control center for Intent Based Networking.   Cisco can also extend comprehensive visibility, segmentation, and control into the data center via Cisco  Tetration, ACI, and Firepower technologies enabling a complete approach to security segmentation for critical infrastructure providers.

However, Zero Trust segmentation for critical infrastructure requires more than just implementing point solutions, it truly is a transformational shift in how network and security is managed.  As such, most organizations require assistance in building a strategy, architecture, and plan as well as expert assistance in implementation to build a Zero Trust network. Cisco’s Security Segmentation Service provides a starting point to define the end state architecture and Zero Trust segmentation plan.

Our Segmentation Service starts by helping organizations determine their security and networking intent by examining what they need to protect, including core critical infrastructure and operational processes, how their organization functions, their critical applications and dependencies, and their applicable security and compliance requirements.

This is then used to build a Zero Trust Security Segmentation architecture.  We start by defining a set of enclaves. Enclaves are a group of systems or devices that have a business affinity, are assigned the same level of trustworthiness, and have the same security policies applied.  A set of controls are then defined for each enclave.  Controls are technology solutions used to implement the Zero Trust Model.  They include technologies that work together to provide for identity, policy enforcement, isolation, visibility and availability.  It is through these controls that the Zero Trust segmentation model is realized.  In parallel, we collect and analyze network traffic through StealthWatch in order to model real network traffic, both validating enclave definition as well as determining the necessary trusts between each enclave.  Finally, we recommend an actionable roadmap for implementation that takes into account the necessary technology and operational maturity of the organization. This roadmap provides the necessary plan to implement Zero Trust segmentation.  Implementation can be performed by the customer, Cisco, a partner, or an appropriate mix.

The Bottom Line

Critical infrastructure providers must protect their network in the face of an ever evolving threat landscape.  With newer IoT and legacy operational technology increasingly being network attached, a Zero Trust approach to security segmentation provides a viable solution to enable secure and resilience operations.  Through our comprehensive architecture and automation technologies as well as advisory planning and technology implementation services, Cisco is well positioned to help Critical Infrastructure Providers plan and implement a zero trust segmentation strategy.



Leave a comment

We'd love to hear from you! Your comment(s) will appear instantly on the live site. Spam, promotional and derogatory comments will be removed and HTML formatting will not appear.

2 Comments

  1. Very well explained -thank you!

  2. Critical Infrastructure is a broad category of many systems all used within their own flavor of the sector they belong. Is this platform (or what seems to be multiple platforms) more utilizable in specific critical infrastructure sectors, specifically, is it applicable to the systems and regulations of the electric grid? And if so: 1. Does it take into consideration OT devices from SEL, Rockwell, GE, Schneider Electric...? As well as OT protocols (both IP-based and not)? 2. Does it meet the requirements identified under NERC CIP? 3. Can your network monitoring (I believe referenced as the Cisco DNA Center) be integrated into other HMI software? 4. Lastly, do you have any case studies or scenarios for the application of it? Let's say an electric substation network is connected to the web with a CGR 2000-series router and a plethora of IT and OT devices exist both inside this network but also must communicate outside (both within corporate offices and to other OT devices located remotely). How would the Zero Trust Model, SD-access, Cisco DNA Center... be implemented for such a situation?