Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the easy-accordion-free domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the zoho-flow domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php on line 6114

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893

Warning: Cannot modify header information - headers already sent by (output started at /home/mother99/jacksonholdingcompany.com/wp-includes/functions.php:6114) in /home/mother99/jacksonholdingcompany.com/wp-includes/rest-api/class-wp-rest-server.php on line 1893
{"id":1639,"date":"2023-11-10T01:08:29","date_gmt":"2023-11-10T01:08:29","guid":{"rendered":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/"},"modified":"2023-11-10T01:08:29","modified_gmt":"2023-11-10T01:08:29","slug":"cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm","status":"publish","type":"post","link":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/","title":{"rendered":"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm"},"content":{"rendered":"

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center\u2014the industrial control systems (ICS) the business depends on.<\/p>\n

But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once it makes it past the iDMZ conflicts with the zero-trust security principle to never trust, always verify. And as companies look to \u201cdigitize\u201d manufacturing and apply more cloud-based services also known as Industry 4.0, more devices need access to production systems.<\/p>\n

The answer is micro-segmentation\u2014but there\u2019s a barrier<\/h2>\n

You can limit the spread of malware that makes it past the iDMZ using a technique called micro-segmentation<\/a>. The idea is to tightly restrict which devices can communicate and what they can say, confining the damage from cyberattacks to the fewest number of devices. It\u2019s an example of zero-trust in action: instead of taking it on faith that devices only talk to each other for legitimate reasons, you lay down the rules. An HVAC system shouldn\u2019t be talking to a robot, for example. If it is, the HVAC system may have been commandeered by a bad actor who is now traipsing through the network to disrupt systems or exfiltrate information.<\/p>\n

So why isn\u2019t every industrial organization already using micro-segmentation? The barrier I hear most often from our customers is a lack of security visibility. To micro-segment your network you need to know every device connected to your network, which other devices and systems it needs to talk to, and which protocols are in use. <\/em>Lacking this visibility can lead to overly permissive policies, increasing the attack surface. Just as bad, you might inadvertently block necessary device-to-device traffic, disrupting production.<\/p>\n

Gain visibility into what\u2019s on the network and how they\u2019re talking<\/h2>\n

Good news: Cisco and our partner Rockwell Automation have integrated security visibility into our Converged Plantwide Ethernet (CPwE)<\/a> validated design. With Cisco Cyber Vision<\/a> you can quickly see what\u2019s on your network, which systems talk to each other, and what they\u2019re saying. One customer told me he learned from Cyber Vision that some of his devices had a hidden cellular backdoor!<\/p>\n

Security visibility has three big payoffs. One is awareness of threats like that backdoor, or suspicious communications patterns like the HVAC system talking to the robot. Another benefit is providing the information you need to create micro-segments. Finally, visibility can potentially lower your cyber insurance premiums. Some insurers give you a discount or will increase coverage limits if you can show you know what\u2019s connected to your network.<\/p>\n

Visibility sets the stage for micro-segmentation<\/h2>\n

Once you understand which devices have a legitimate need to communicate, explicitly allow those communications by creating micro-segments, defined by the ISA\/IEC 62443 standard<\/a>. Here\u2019s a good explanation of how micro-segments work<\/a>. Briefly, you create zones containing a group of devices with similar security requirements, a clear physical border, and the need to talk to each other. Conduits are the communication mechanisms (e.g. VLANs, routers, access lists, etc.) that allow or block communication between zones. In this way, a threat that gets into one zone can\u2019t easily move to another.<\/p>\n

Both Cisco and Rockwell Automation provide tools for segmenting the network. Use Cisco Identity Services Engine (ISE)<\/a> for devices that communicate via any industrial protocol, including HTTP, SSH, telnet, CIP, UDP, ICMP, etc. For your CIP devices, you can enforce even tighter controls over traffic flow using Rockwell Automation\u2019s CIP Security<\/a>, which secures production networks at the application level. We have several Cisco Validated Designs (CVDs) on a range of security topics, many jointly developed and tested with Rockwell. Examples of our collaboration with Rockwell include Converged Plantwide Ethernet, or CPwE<\/a>, and the recently added Security Visibility for CPwE<\/a> based on Cisco Cyber Vision.<\/p>\n

A lesson from nature<\/h2>\n

Combining an iDMZ with micro-segmentation is like blending the protective abilities of a turtle and a lizard. Like the turtle\u2019s shell, the iDMZ helps keep predators out. And like lizards who can drop their tails if a predator gets hold, micro-segmentation limits damage from an attack.<\/p>\n

Bottom line: To get started with micro-segmentation\u2014and potentially lower your cyber insurance premiums\u2014use Cyber Vision<\/a> to see what devices are on your network and what they\u2019re saying.<\/p>\n

To learn more about how Cisco and Rockwell can help strengthen OT\/ICS security with visibility for CPwE, join us for a webinar on November 14. Register here<\/a>.<\/strong><\/h3>\n

Learn more<\/h2>\n

Network Security within a Converged Plantwide Ethernet Architecture Design and Implementation Guide<\/a>
\n
Deploying CIP Security within a Converged Plantwide Ethernet Architecture Design Guide<\/a>
\n
CPwE Identity and Mobility Services<\/a>
\n
CPwE Industrial Demilitarized Zone<\/a>
\n
Industrial Automation Security Design Guide 2.0<\/a><\/p>\n

\n\t\tShare\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Industrial cybersecurity needs granular security policies. This requires visibility into what assets are connected. Learn how Cisco and Rockwell are enabling OT visibility into CPwE with Cyber Vision.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>","protected":false},"excerpt":{"rendered":"

<\/p>\n

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable\u2026 Read more on Cisco Blogs<\/a><\/p>\n

\u200b<\/p>\n

The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center\u2014the industrial control systems (ICS) the business depends on.<\/p>\n

But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once it makes it past the iDMZ conflicts with the zero-trust security principle to never trust, always verify. And as companies look to \u201cdigitize\u201d manufacturing and apply more cloud-based services also known as Industry 4.0, more devices need access to production systems.<\/p>\n

The answer is micro-segmentation\u2014but there\u2019s a barrier<\/h2>\n

You can limit the spread of malware that makes it past the iDMZ using a technique called micro-segmentation<\/a>. The idea is to tightly restrict which devices can communicate and what they can say, confining the damage from cyberattacks to the fewest number of devices. It\u2019s an example of zero-trust in action: instead of taking it on faith that devices only talk to each other for legitimate reasons, you lay down the rules. An HVAC system shouldn\u2019t be talking to a robot, for example. If it is, the HVAC system may have been commandeered by a bad actor who is now traipsing through the network to disrupt systems or exfiltrate information.<\/p>\n

So why isn\u2019t every industrial organization already using micro-segmentation? The barrier I hear most often from our customers is a lack of security visibility. To micro-segment your network you need to know every device connected to your network, which other devices and systems it needs to talk to, and which protocols are in use. <\/em>Lacking this visibility can lead to overly permissive policies, increasing the attack surface. Just as bad, you might inadvertently block necessary device-to-device traffic, disrupting production.<\/p>\n

Gain visibility into what\u2019s on the network and how they\u2019re talking<\/h2>\n

Good news: Cisco and our partner Rockwell Automation have integrated security visibility into our Converged Plantwide Ethernet (CPwE)<\/a> validated design. With Cisco Cyber Vision<\/a> you can quickly see what\u2019s on your network, which systems talk to each other, and what they\u2019re saying. One customer told me he learned from Cyber Vision that some of his devices had a hidden cellular backdoor!<\/p>\n

Security visibility has three big payoffs. One is awareness of threats like that backdoor, or suspicious communications patterns like the HVAC system talking to the robot. Another benefit is providing the information you need to create micro-segments. Finally, visibility can potentially lower your cyber insurance premiums. Some insurers give you a discount or will increase coverage limits if you can show you know what\u2019s connected to your network.<\/p>\n

Visibility sets the stage for micro-segmentation<\/h2>\n

Once you understand which devices have a legitimate need to communicate, explicitly allow those communications by creating micro-segments, defined by the ISA\/IEC 62443 standard<\/a>. Here\u2019s a good explanation of how micro-segments work<\/a>. Briefly, you create zones containing a group of devices with similar security requirements, a clear physical border, and the need to talk to each other. Conduits are the communication mechanisms (e.g. VLANs, routers, access lists, etc.) that allow or block communication between zones. In this way, a threat that gets into one zone can\u2019t easily move to another.<\/p>\n

Both Cisco and Rockwell Automation provide tools for segmenting the network. Use Cisco Identity Services Engine (ISE)<\/a> for devices that communicate via any industrial protocol, including HTTP, SSH, telnet, CIP, UDP, ICMP, etc. For your CIP devices, you can enforce even tighter controls over traffic flow using Rockwell Automation\u2019s CIP Security<\/a>, which secures production networks at the application level. We have several Cisco Validated Designs (CVDs) on a range of security topics, many jointly developed and tested with Rockwell. Examples of our collaboration with Rockwell include Converged Plantwide Ethernet, or CPwE<\/a>, and the recently added Security Visibility for CPwE<\/a> based on Cisco Cyber Vision.<\/p>\n

A lesson from nature<\/h2>\n

Combining an iDMZ with micro-segmentation is like blending the protective abilities of a turtle and a lizard. Like the turtle\u2019s shell, the iDMZ helps keep predators out. And like lizards who can drop their tails if a predator gets hold, micro-segmentation limits damage from an attack.<\/p>\n

Bottom line: To get started with micro-segmentation\u2014and potentially lower your cyber insurance premiums\u2014use Cyber Vision<\/a> to see what devices are on your network and what they\u2019re saying.<\/p>\n

To learn more about how Cisco and Rockwell can help strengthen OT\/ICS security with visibility for CPwE, join us for a webinar on November 14. Register here<\/a>.<\/strong><\/h3>\n

Learn more<\/h2>\n

Network Security within a Converged Plantwide Ethernet Architecture Design and Implementation Guide<\/a>
\n
Deploying CIP Security within a Converged Plantwide Ethernet Architecture Design Guide<\/a>
\n
CPwE Identity and Mobility Services<\/a>
\n
CPwE Industrial Demilitarized Zone<\/a>
\n
Industrial Automation Security Design Guide 2.0<\/a><\/p>\n

\n\t\tShare<\/p>\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n
Share:<\/div>\n
\n
\n
<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t\t<\/a>\n\t<\/div>\n<\/div>\n
\n
\n\t <\/a>\n\t<\/div>\n<\/div>\n<\/div>\n

\u00a0\u00a0Industrial cybersecurity needs granular security policies. This requires visibility into what assets are connected. Learn how Cisco and Rockwell are enabling OT visibility into CPwE with Cyber Vision.\u00a0\u00a0Read More<\/a>\u00a0Cisco Blogs\u00a0<\/p>\n

<\/p>\n","protected":false},"author":0,"featured_media":1640,"comment_status":"","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-1639","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cisco-learning"],"yoast_head":"\nCisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm - JHC<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm\" \/>\n<meta property=\"og:description\" content=\"The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable\u2026 Read more on Cisco Blogs \u200b The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center\u2014the industrial control systems (ICS) the business depends on. But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once it makes it past the iDMZ conflicts with the zero-trust security principle to never trust, always verify. And as companies look to \u201cdigitize\u201d manufacturing and apply more cloud-based services also known as Industry 4.0, more devices need access to production systems. The answer is micro-segmentation\u2014but there\u2019s a barrier You can limit the spread of malware that makes it past the iDMZ using a technique called micro-segmentation. The idea is to tightly restrict which devices can communicate and what they can say, confining the damage from cyberattacks to the fewest number of devices. It\u2019s an example of zero-trust in action: instead of taking it on faith that devices only talk to each other for legitimate reasons, you lay down the rules. An HVAC system shouldn\u2019t be talking to a robot, for example. If it is, the HVAC system may have been commandeered by a bad actor who is now traipsing through the network to disrupt systems or exfiltrate information. So why isn\u2019t every industrial organization already using micro-segmentation? The barrier I hear most often from our customers is a lack of security visibility. To micro-segment your network you need to know every device connected to your network, which other devices and systems it needs to talk to, and which protocols are in use. Lacking this visibility can lead to overly permissive policies, increasing the attack surface. Just as bad, you might inadvertently block necessary device-to-device traffic, disrupting production. Gain visibility into what\u2019s on the network and how they\u2019re talking Good news: Cisco and our partner Rockwell Automation have integrated security visibility into our Converged Plantwide Ethernet (CPwE) validated design. With Cisco Cyber Vision you can quickly see what\u2019s on your network, which systems talk to each other, and what they\u2019re saying. One customer told me he learned from Cyber Vision that some of his devices had a hidden cellular backdoor! Security visibility has three big payoffs. One is awareness of threats like that backdoor, or suspicious communications patterns like the HVAC system talking to the robot. Another benefit is providing the information you need to create micro-segments. Finally, visibility can potentially lower your cyber insurance premiums. Some insurers give you a discount or will increase coverage limits if you can show you know what\u2019s connected to your network. Visibility sets the stage for micro-segmentation Once you understand which devices have a legitimate need to communicate, explicitly allow those communications by creating micro-segments, defined by the ISA\/IEC 62443 standard. Here\u2019s a good explanation of how micro-segments work. Briefly, you create zones containing a group of devices with similar security requirements, a clear physical border, and the need to talk to each other. Conduits are the communication mechanisms (e.g. VLANs, routers, access lists, etc.) that allow or block communication between zones. In this way, a threat that gets into one zone can\u2019t easily move to another. Both Cisco and Rockwell Automation provide tools for segmenting the network. Use Cisco Identity Services Engine (ISE) for devices that communicate via any industrial protocol, including HTTP, SSH, telnet, CIP, UDP, ICMP, etc. For your CIP devices, you can enforce even tighter controls over traffic flow using Rockwell Automation\u2019s CIP Security, which secures production networks at the application level. We have several Cisco Validated Designs (CVDs) on a range of security topics, many jointly developed and tested with Rockwell. Examples of our collaboration with Rockwell include Converged Plantwide Ethernet, or CPwE, and the recently added Security Visibility for CPwE based on Cisco Cyber Vision. A lesson from nature Combining an iDMZ with micro-segmentation is like blending the protective abilities of a turtle and a lizard. Like the turtle\u2019s shell, the iDMZ helps keep predators out. And like lizards who can drop their tails if a predator gets hold, micro-segmentation limits damage from an attack. Bottom line: To get started with micro-segmentation\u2014and potentially lower your cyber insurance premiums\u2014use Cyber Vision to see what devices are on your network and what they\u2019re saying. To learn more about how Cisco and Rockwell can help strengthen OT\/ICS security with visibility for CPwE, join us for a webinar on November 14. Register here. Learn more Network Security within a Converged Plantwide Ethernet Architecture Design and Implementation Guide Deploying CIP Security within a Converged Plantwide Ethernet Architecture Design Guide CPwE Identity and Mobility Services CPwE Industrial Demilitarized Zone Industrial Automation Security Design Guide 2.0 Share Share: \u00a0\u00a0Industrial cybersecurity needs granular security policies. This requires visibility into what assets are connected. Learn how Cisco and Rockwell are enabling OT visibility into CPwE with Cyber Vision.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\" \/>\n<meta property=\"og:site_name\" content=\"JHC\" \/>\n<meta property=\"article:published_time\" content=\"2023-11-10T01:08:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1\" \/>\n\t<meta property=\"og:image:height\" content=\"1\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm\",\"datePublished\":\"2023-11-10T01:08:29+00:00\",\"dateModified\":\"2023-11-10T01:08:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\"},\"wordCount\":904,\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif\",\"articleSection\":[\"Cisco: Learning\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\",\"name\":\"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm - JHC\",\"isPartOf\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif\",\"datePublished\":\"2023-11-10T01:08:29+00:00\",\"dateModified\":\"2023-11-10T01:08:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif\",\"width\":1,\"height\":1},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jacksonholdingcompany.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#website\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"name\":\"JHC\",\"description\":\"Your Business Is Our Business\",\"publisher\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#organization\",\"name\":\"JHC\",\"url\":\"https:\/\/jacksonholdingcompany.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"contentUrl\":\"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png\",\"width\":452,\"height\":149,\"caption\":\"JHC\"},\"image\":{\"@id\":\"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm - JHC","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/","og_locale":"en_US","og_type":"article","og_title":"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm","og_description":"The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable\u2026 Read more on Cisco Blogs \u200b The turtle, protected by its hard shell, is a good metaphor for the security model used in most industrial networks. The industrial DMZ (iDMZ) is the shell that protects the soft, vulnerable center\u2014the industrial control systems (ICS) the business depends on. But while the iDMZ blocks most threats, some will inevitably slip through. When they do, they can move sideways from device to device, potentially causing downtime and information leakage. Giving traffic free rein once it makes it past the iDMZ conflicts with the zero-trust security principle to never trust, always verify. And as companies look to \u201cdigitize\u201d manufacturing and apply more cloud-based services also known as Industry 4.0, more devices need access to production systems. The answer is micro-segmentation\u2014but there\u2019s a barrier You can limit the spread of malware that makes it past the iDMZ using a technique called micro-segmentation. The idea is to tightly restrict which devices can communicate and what they can say, confining the damage from cyberattacks to the fewest number of devices. It\u2019s an example of zero-trust in action: instead of taking it on faith that devices only talk to each other for legitimate reasons, you lay down the rules. An HVAC system shouldn\u2019t be talking to a robot, for example. If it is, the HVAC system may have been commandeered by a bad actor who is now traipsing through the network to disrupt systems or exfiltrate information. So why isn\u2019t every industrial organization already using micro-segmentation? The barrier I hear most often from our customers is a lack of security visibility. To micro-segment your network you need to know every device connected to your network, which other devices and systems it needs to talk to, and which protocols are in use. Lacking this visibility can lead to overly permissive policies, increasing the attack surface. Just as bad, you might inadvertently block necessary device-to-device traffic, disrupting production. Gain visibility into what\u2019s on the network and how they\u2019re talking Good news: Cisco and our partner Rockwell Automation have integrated security visibility into our Converged Plantwide Ethernet (CPwE) validated design. With Cisco Cyber Vision you can quickly see what\u2019s on your network, which systems talk to each other, and what they\u2019re saying. One customer told me he learned from Cyber Vision that some of his devices had a hidden cellular backdoor! Security visibility has three big payoffs. One is awareness of threats like that backdoor, or suspicious communications patterns like the HVAC system talking to the robot. Another benefit is providing the information you need to create micro-segments. Finally, visibility can potentially lower your cyber insurance premiums. Some insurers give you a discount or will increase coverage limits if you can show you know what\u2019s connected to your network. Visibility sets the stage for micro-segmentation Once you understand which devices have a legitimate need to communicate, explicitly allow those communications by creating micro-segments, defined by the ISA\/IEC 62443 standard. Here\u2019s a good explanation of how micro-segments work. Briefly, you create zones containing a group of devices with similar security requirements, a clear physical border, and the need to talk to each other. Conduits are the communication mechanisms (e.g. VLANs, routers, access lists, etc.) that allow or block communication between zones. In this way, a threat that gets into one zone can\u2019t easily move to another. Both Cisco and Rockwell Automation provide tools for segmenting the network. Use Cisco Identity Services Engine (ISE) for devices that communicate via any industrial protocol, including HTTP, SSH, telnet, CIP, UDP, ICMP, etc. For your CIP devices, you can enforce even tighter controls over traffic flow using Rockwell Automation\u2019s CIP Security, which secures production networks at the application level. We have several Cisco Validated Designs (CVDs) on a range of security topics, many jointly developed and tested with Rockwell. Examples of our collaboration with Rockwell include Converged Plantwide Ethernet, or CPwE, and the recently added Security Visibility for CPwE based on Cisco Cyber Vision. A lesson from nature Combining an iDMZ with micro-segmentation is like blending the protective abilities of a turtle and a lizard. Like the turtle\u2019s shell, the iDMZ helps keep predators out. And like lizards who can drop their tails if a predator gets hold, micro-segmentation limits damage from an attack. Bottom line: To get started with micro-segmentation\u2014and potentially lower your cyber insurance premiums\u2014use Cyber Vision to see what devices are on your network and what they\u2019re saying. To learn more about how Cisco and Rockwell can help strengthen OT\/ICS security with visibility for CPwE, join us for a webinar on November 14. Register here. Learn more Network Security within a Converged Plantwide Ethernet Architecture Design and Implementation Guide Deploying CIP Security within a Converged Plantwide Ethernet Architecture Design Guide CPwE Identity and Mobility Services CPwE Industrial Demilitarized Zone Industrial Automation Security Design Guide 2.0 Share Share: \u00a0\u00a0Industrial cybersecurity needs granular security policies. This requires visibility into what assets are connected. Learn how Cisco and Rockwell are enabling OT visibility into CPwE with Cyber Vision.\u00a0\u00a0Read More\u00a0Cisco Blogs\u00a0","og_url":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/","og_site_name":"JHC","article_published_time":"2023-11-10T01:08:29+00:00","og_image":[{"width":1,"height":1,"url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif","type":"image\/gif"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#article","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/"},"author":{"name":"","@id":""},"headline":"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm","datePublished":"2023-11-10T01:08:29+00:00","dateModified":"2023-11-10T01:08:29+00:00","mainEntityOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/"},"wordCount":904,"publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif","articleSection":["Cisco: Learning"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/","url":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/","name":"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm - JHC","isPartOf":{"@id":"https:\/\/jacksonholdingcompany.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage"},"thumbnailUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif","datePublished":"2023-11-10T01:08:29+00:00","dateModified":"2023-11-10T01:08:29+00:00","breadcrumb":{"@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#primaryimage","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/11\/16439174-5DVMiO.gif","width":1,"height":1},{"@type":"BreadcrumbList","@id":"https:\/\/jacksonholdingcompany.com\/cisco-and-rockwell-strengthen-ot-ics-security-with-visibility-for-converged-plantwide-ethernet-cpwe-paul-didier-on-november-9-2023-at-848-pm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jacksonholdingcompany.com\/"},{"@type":"ListItem","position":2,"name":"Cisco and Rockwell strengthen OT\/ICS security with visibility for converged plantwide ethernet (CPwE) Paul Didier on November 9, 2023 at 8:48 pm"}]},{"@type":"WebSite","@id":"https:\/\/jacksonholdingcompany.com\/#website","url":"https:\/\/jacksonholdingcompany.com\/","name":"JHC","description":"Your Business Is Our Business","publisher":{"@id":"https:\/\/jacksonholdingcompany.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jacksonholdingcompany.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jacksonholdingcompany.com\/#organization","name":"JHC","url":"https:\/\/jacksonholdingcompany.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/","url":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","contentUrl":"https:\/\/jacksonholdingcompany.com\/wp-content\/uploads\/2023\/07\/cropped-cropped-jHC-white-500-\u00d7-200-px-1-1.png","width":452,"height":149,"caption":"JHC"},"image":{"@id":"https:\/\/jacksonholdingcompany.com\/#\/schema\/logo\/image\/"}}]}},"_links":{"self":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1639","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/comments?post=1639"}],"version-history":[{"count":0,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/posts\/1639\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media\/1640"}],"wp:attachment":[{"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/media?parent=1639"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/categories?post=1639"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jacksonholdingcompany.com\/wp-json\/wp\/v2\/tags?post=1639"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}