Advancements in Supervisory Control and Data Acquisition (SCADA), Distribute Control System (DCS), Process Control System (PCS), Energy Management System (EMS), Safety Instrumented System (SS) has led to an increase in automation within critical infrastructure and industrial facilities. With the increase in connectivity of these systems, the industry has become vulnerable to new forms of cyber-attacks resulting in a high risk for the industry.
Remote embedded systems found at the network connected end points of these ICS systems are designed with general purpose micro-controllers running RTOS software. Although these end points all employ software based crypto mechanisms they are vulnerable to many simple physical and logical attacks from a wide range of adversaries. Missing is a strong root of trust, sometimes called a “Trust Anchor” to cryptographically provision, and enforce an owner security policy on these end points.
This interactive presentation will explain the capabilities, physical and logical attack countermeasures, and uses cases of integrating a small footprint Hardware Security Module (HSM) alongside the existing general purpose microcontrollers found today in ICS endpoints. Security evaluated, Common Criteria EAL5+ HSMs which are currently deployed in the 100s of millions in other industries can be utilized within ICS infrastructures as a Hardware Root of Trust (HroT) at the endpoint and leverage existing proven interoperable protocols and security frameworks. Presentation will also explain implementation methodology with tools associated with the solution in embedded systems in different Application areas such as Industrial Control Systems (SCADA, PCS, DCS) Energy Generation & Distribution Systems, Healthcare Equipment and Networks, Consumer Electronics, Home Security & Automation, and Network Appliances.