Cisco - Industrial Security 3.1 - Design Guide (2025)
Cisco - Industrial Security 3.1 - Design Guide (2025)
1
Design Guide
June 2025
Table of Contents
Introduction............................................................................................................................. 8
Target Audience................................................................................................................................ 8
Security Challenges ........................................................................................................................... 9
Understanding the threats .............................................................................................................. 10
Industrial Security Journey .............................................................................................................. 11
Chapter 1. Gaining Visibility and Understanding your Security Posture ................................. 14
Why understanding security posture is necessary ........................................................................... 14
How to gain Visibility of the OT assets ............................................................................................ 15
An Alternative to SPAN ......................................................................................................................................... 16
Active Discovery ................................................................................................................................................... 17
Intrusion Detection / Prevention Systems ........................................................................................................... 19
Vulnerability Assessment and Managing Risk.................................................................................. 19
Vulnerability Assessment ..................................................................................................................................... 20
CVSS Scores .......................................................................................................................................................... 20
Cisco Cyber Vision ........................................................................................................................... 21
Components ......................................................................................................................................................... 21
Key Features ......................................................................................................................................................... 21
Cyber Vision Design Considerations ................................................................................................ 22
Cyber Vision Center .............................................................................................................................................. 22
Cyber Vision Sensor Options ................................................................................................................................ 24
Effective Sensor Deployment ............................................................................................................................... 25
Ring Topology Considerations .............................................................................................................................. 26
Brownfield Deployment Considerations .............................................................................................................. 27
Sensor Considerations .......................................................................................................................................... 27
Cyber Vision Active Discovery .............................................................................................................................. 29
Vulnerability Assessment in Cyber Vision............................................................................................................. 29
Cyber Vision Risk Score......................................................................................................................................... 30
Visualize Assets and Flows using Cyber Vision Groups......................................................................................... 31
Presets and Baselines ........................................................................................................................................... 33
Cyber Vision IDS.................................................................................................................................................... 35
Performance ......................................................................................................................................................... 35
2
Industrial Security 3.1 Design Guide
Licensing ............................................................................................................................................................... 35
Chapter 2. Preventative Controls in Plant Networks .............................................................. 36
Reference Architecture ................................................................................................................... 36
Industrial Zone...................................................................................................................................................... 37
Enterprise Zone .................................................................................................................................................... 38
Industrial DMZ ...................................................................................................................................................... 38
Use cases ........................................................................................................................................ 39
How to get started with Segmentation ........................................................................................... 48
IT/OT Boundary .................................................................................................................................................... 48
Industrial Data Center .......................................................................................................................................... 50
Preventing lateral movement on the plant floor ................................................................................................. 52
ISA/IEC 62443 Zones and Conduits model for OT Segmentation ...................................................... 52
Architecting a network with secure components ................................................................................................ 54
Segmentation Technologies ............................................................................................................ 55
VLAN ..................................................................................................................................................................... 55
VRF-lite ................................................................................................................................................................. 55
Access Control List ................................................................................................................................................ 56
Stateful Firewall .................................................................................................................................................... 56
Next-Generation Firewall ..................................................................................................................................... 56
TrustSec ................................................................................................................................................................ 57
Segmentation Design Guidance with Cisco Secure Firewall ............................................................. 57
Cisco Secure Firewall portfolio ............................................................................................................................. 58
Management options ........................................................................................................................................... 58
Deployment modes .............................................................................................................................................. 59
Key Capabilities .................................................................................................................................................... 60
Industrial Data Center Segmentation with Cisco Secure Firewall ..................................................... 69
East/West Segmentation with Cisco Secure Firewall ....................................................................... 71
Using a firewall to route between OT VLANs ....................................................................................................... 71
Transparent firewalls at the Cell/Area zone boundary ........................................................................................ 74
Network Access Control with Cisco Identity Services Engine ........................................................... 75
ISE Components / Personas.................................................................................................................................. 75
ISE Authentication Policies ................................................................................................................................... 76
ISE Authorization Policies ..................................................................................................................................... 77
ISE TrustSec Domain ............................................................................................................................................. 77
SGT Classification.................................................................................................................................................. 77
3
Industrial Security 3.1 Design Guide
4
Industrial Security 3.1 Design Guide
5
Industrial Security 3.1 Design Guide
IDMZ............................................................................................................................................. 209
Cyber Vision.................................................................................................................................. 209
ISE ................................................................................................................................................ 209
XDR .............................................................................................................................................. 210
Appendix B – Example TrustSec Configuration in Plant Networks ........................................ 211
Define and Create SGTs and Policies Using Cisco Catalyst Center................................................... 212
Define ISE as the AAA Server using Cisco Catalyst Center .............................................................. 213
Enable Device Tracking on Access Ports using Cisco Catalyst Center .............................................. 214
Configure Port-Based Authentication on the Access Switches ....................................................... 214
Example AAA Policy ............................................................................................................................................ 214
Example Interface Configuration using ‘foreach’ loops ..................................................................................... 216
Configure Static Entries and Fallback Policy to Allow Communication in the event of an ISE error . 218
Change the SGT assigned to switches from “Unknown” to “TrustSec Devices” in ISE ....................................... 218
Create static IP to SGT mappings on the TrustSec domain switches.................................................................. 218
Create a Fallback SGACL in the event ISE communication is lost ....................................................................... 218
Propagation on Distribution Switches and Core Switches .............................................................. 219
Propagation on Industrial Switches ............................................................................................... 219
Configure SXP in ISE ...................................................................................................................... 220
Add an SXP Domain Filter ................................................................................................................................... 220
Add IP-SGT Mappings to ISE .......................................................................................................... 221
Enable Trustsec Enforcement on a Switch ..................................................................................... 221
Disable enforcement on uplink ports ................................................................................................................. 221
Create Profiling Rules in ISE .......................................................................................................... 221
Create Authentication and Authorization Policies on ISE ............................................................... 223
Cyber Vision Sensor ...................................................................................................................... 223
Appendix C – Installing custom Snort rules in Cisco Catalyst SD-WAN .................................. 225
Upload and use file in Cisco Catalyst SD-WAN Manager .................................................................................... 227
Appendix D – Cisco Cyber Vision vs. Cisco Secure Network Analytics .................................... 228
Appendix E – Cisco SecureX .................................................................................................. 229
SecureX Ribbon............................................................................................................................. 229
SecureX Threat Response .............................................................................................................. 230
SecureX Orchestration .................................................................................................................. 231
Appendix F – Cisco Cyber Vision and Splunk Quick Deployment Guide ................................. 234
6
Industrial Security 3.1 Design Guide
Appendix G – Cisco ISE and Splunk Quick Deployment Guide ............................................... 246
Appendix H - References ...................................................................................................... 250
Appendix I - Acronyms and Initialisms ................................................................................. 251
7
Industrial Security 3.1 Design Guide
Introduction
The Cisco 2024 State of Industrial Networking Report, which had over 1000 respondents across
17 countries operating in more than 20 sectors, found cybersecurity to be the biggest reported
challenges in running and maintaining industrial networks.
There is a clear sense that artificial intelligence (AI) will boost business growth for those who
can successfully use it to run better industrial networks. Leaders will ensure their operational
technology can capture the required data to fuel their AI models. However, increased network
connectivity leads to a continually expanding attack surface. In 2023, the worlds critical
infrastructure suffered 13 cyber-attacks every second, and in 2024, cyber-attacks on critical
infrastructure surged by 30%.
Safeguarding industrial automation and control systems (IACS) from cyber threats is a critical
priority, but transforming these intentions into effective actions can be challenging. Given the
complexity of IACS and their networks, which often rely on outdated technologies and
inadequate security measures, it can be difficult to determine the best starting point.
For over 20 years, Cisco has been helping industrial organizations around the globe digitize their
operations by developing a market-leading networking and security portfolio that is purpose-
built for industrial use cases. Our deep understanding of operational technology requirements
plus a comprehensive networking and cybersecurity portfolio is a rare combination.
Target Audience
To successfully connect and secure the industrial environment, all stakeholders must work
together; operational technology (OT) teams understand the industrial environment - the devices,
the protocols, and the operational processes, and the information technology (IT) teams
understand the network, and the security team understands threats and vulnerabilities. The view
that OT and IT are distinctly separate entities is antiquated. Failing to acknowledge the
increasingly interconnected nature of OT and IT can have detrimental consequences for
industrial organizations. A lack of trust, understanding, and collaboration between OT and IT
departments can have a devastating impact on the security posture of an organization.
IT and OT personnel have different operating procedures and roles to play, and their worldview
can differ considerably. However, their goals with respect to securing the organization should be
identical, and the path forward involves finding a common ground. OT personnel are focused on
safety, reliability, and productivity. Their role is to protect people, lives, the environment, the
operation, and production. Conversely, cybersecurity personnel are focused on maintaining the
confidentiality of information and the integrity and availability of IT systems. However, the
goals of these entities do overlap. Both are committed to securing the organization, minimizing
risk, maximizing uptime, and ensuring that the organization can continue to safely generate
revenue.
The Cisco Industrial Threat Defense solution is intended to be used by IT, OT, and security
teams and their relevant partners and system integrators. Operations will appreciate the ease of
use and simple deployment, as well as the broad support of various IACS vendors and protocols.
IT network managers will appreciate the ability to apply skills, technology, and applications
8
Industrial Security 3.1 Design Guide
already deployed in the enterprise when looking to integrate production environments. Security
teams will have visibility into industrial assets and security events with context enriched by
control engineers.
Security Challenges
As part of the State of Industrial Networks Report, Cisco asked operational leaders what specific
cybersecurity challenges they have encountered in their industrial networks.
Figure 1 Cybersecurity challenges faced in industrial networks
The first challenge faced when securing the IACS network is vulnerabilities in legacy systems
and outdated software (41%). As industrial networks can be quite old, and patching is almost
non-existent, vulnerabilities exist. However, without visibility into what vulnerabilities our
networks are exposed to its very hard to contain them. Firewalls are deployed at the edge of our
critical infrastructure to “virtually patch” our devices. If the vulnerabilities are unknown, then
firewall rules cannot be optimized, or patching cannot be prioritized.
Additionally, operators often don’t have an accurate inventory of what is on the network (27%).
Without this, they have limited ability to build a secure communications architecture. A lack of
9
Industrial Security 3.1 Design Guide
visibility also means operators are often unaware of which devices are communicating to each
other or even of communications reaching industrial devices from the outside.
The lack of visibility ultimately leads to a lack of segmentation or control. This leads to the
second biggest concern for operational leaders; legacy networks that are not equipped to prevent
the spread of malware and ransomware attacks targeting OT systems (40%). OT networks have
been deployed over the years with few or no security policies in place. Networks were not
designed with security in mind, updates and patches are harder to deploy, and downtimes are less
acceptable. It is also telling that operational leaders are equally concerned with insider threats
(32%) and a lack of control over remote access from vendors and contractors (32%). Although
the threat of remote users is more commonly exploited, operational leaders recognize that once
any user gets a foothold in the network there is a lack of control on the damage they could
potentially cause.
Last, but certainly not the least, is the lack of SOC visibility into OT security policies (27%).
Compounding the cybersecurity challenges faced by industry, we face a workforce challenge
such as employee retention and a shortage of cybersecurity practitioners. Organizations cannot
afford to deploy solutions in silos, bringing new screens to every new capability deployed. Any
solution brought to the OT network must have linkages back to a security operations centre
(SOC) where events and logs can be analysed in the existing infrastructure already deployed by
IT personnel. Isolated screens and scattered event logs lead to missed incidents and additional
work to correlate data across the entire ICS attack chain.
10
Industrial Security 3.1 Design Guide
Initial Access is described by MITRE ATT&CK as an adversary attempting to get into your
IACS environment. This is traditionally accomplished by exploiting public facing applications,
or the exploitation of remote services. The Colonial Pipeline attack for example, while not an
entry into the OT network, was a result of a forgotten Virtual Private Network (VPN)
termination point with stolen credentials and no Multi-Factor Authentication (MFA). The 2022
Verizon DBIR stated that over 80% of attacks come from external sources, and with many
industrial sites using technologies such as VPN and Remote Desktop Protocol (RDP) for remote
access services or implementing Industrial IoT (IIoT) gateways for data collection, it is critical
that public facing applications are implementing with security as top of mind.
In the case where initial access security is poorly implemented, or an exploit has been found, the
first thing an adversary will do on the network is try to discover more information to identify and
assess targets in the IACS environment. Triton malware is an example of this where a python
script was executed in the network to discover Triconex safety controllers distributed by
Schneider Electric. Triconex safety controllers used a proprietary protocol on UDP port 1502,
and Triton used this knowledge to scan the network for the devices. If the device exists, the
malware can then read the firmware version and use this information in the next phase of the
attack. Network segmentation is a great way to combat this threat, as if an attacker does manage
to exploit a machine in the network, their reach should not be able to extend beyond the network
segment the exploited machine is on. Additionally, being able to detect the presence of network
scans enables security analysts to react before an adversary has the chance to use the discovered
information in an exploit attempt.
Lateral Movement refers to the adversary attempting to move through the IACS environment.
This could involve jumping to engineering workstations using RDP with weak or default
credentials, or in the case of e.g., the WannaCry vulnerability, using protocol exploits to hop
across machines in the network. Other than making sure default credentials are not used within
the IACS environment, network segmentation helps solve this problem too, by containing an
adversary to the zone in which the initial exploit occurs.
Finally, the adversary will try and communicate with, and control compromised systems,
controllers, and applications within the IACS environment. This is known as Command and
Control.
11
Industrial Security 3.1 Design Guide
foundation for the next, so that you can enhance your security posture at your own pace and
demonstrate value to all stakeholders when embarking on this journey.
Figure 3 Industrial Security journey for plant networks
The first step is to gain asset visibility and security posture with Cisco Cyber Vision. Cisco
Cyber Vision provides asset owners full visibility into their industrial networks and their OT
security posture so they have the information they need to reduce the attack surface, segment the
industrial network, and enforce cybersecurity policies. Cyber Vision helps answer questions such
as; what vendors exist on the network? Are there devices that I do not recognise? What
vulnerabilities can be exploited in the environment? What devices are communicating with
external networks? Do these devices with heightened exposure also have a path to the critical
services in the network?
Combining a unique edge architecture that embeds deep packet inspection (DPI) into your
industrial network, and integration with the Cisco leading security portfolio, Cisco Cyber Vision
can be easily deployed at scale to enable IT and OT teams to work together in building
innovative industrial operations while securing the global enterprise.
While visibility is important, taking preventative measures to secure your operations is required.
Cisco recommends taking a zero trust approach to securing the industrial network. Secure
Equipment Access (SEA) combines all the benefits of a Zero-Trust Network Access (ZTNA)
solution with a network architecture that makes it simple to deploy at scale in operational
environments. There is no dedicated hardware to install and manage. No complex firewall rules
to configure and maintain. The Cisco industrial switches or routers that connect your OT assets
now also enable remote access to them. And it features comprehensive security capabilities, with
advanced cybersecurity controls and easy-to-build policies based on identities and contexts.
When implementing a zero-trust model within an OT network, Cisco recommends building
zones of trust, aligning to the IEC 62443 framework for zones and conduits. The details of this
will be explored later in the guide, but in short, different use cases require different technology
stacks. For example, data centre (DC) modernisation in plant networks is resulting in more
compute, more connectivity, and more virtualisation of the plant floor. While legacy systems will
continue to operate as normal, new systems are being introduced in the plant data centre than
require additional connectivity to the cloud, resulting in more exposure to threats. The industrial
DC needs to be firewalled from the plant floor, and the Cisco Secure Firewall, using an
integration with Cisco Cyber Vision enables contextual policies to be created between OT
devices and DC workloads.
12
Industrial Security 3.1 Design Guide
For plant floor segmentation, a network access control solution is better suited for implementing
policy. Using Identity Services Engine (ISE), logical segmentation can be implementing in the
network infrastructure. The same boxes that provide connectivity and visibility into the network
can also provide the control needed for critical infrastructure protection. Together, Cisco ISE and
Cisco Cyber Vision offer an ideal solution for operations and IT teams to work together in
implementing policies that will limit communications between industrial assets without having to
modify network setups or impacting production. Malicious traffic and cyberattacks can now be
contained, and network resources are optimized to improve production efficiency.
To solve the challenge of scattered event logs across the ecosystem, Splunk provides cross-
domain detection, investigation and response. Splunk is a leading security information and
event management (SIEM) solution that provides the detection, analytics, case management,
incident response, and orchestration platforms all in one interface. Splunk ingests data from
Cyber Vision to provide visibility into OT, and correlates that with other data sources like
network access control, NGFW, among others, to provide a holistic view of the entire OT
Network from endpoints in the LAN, to egress/ingress points and all the way to the data centre
by across a multi-vendor environment.
This technology stack works well for industrial automation networks, however, when dealing
with distributed field assets, a modified approach must be taken.
Figure 4 Industrial security journey for distributed field networks
The fundamentals remain the same; visibility, control and cross-domain detection. The change
comes from the control points we have available in field networks. Across industries such as
roadways and utilities, organizations need advanced, agile, and secure Wide Area Network
(WAN) infrastructures to connect distributed OT assets to control centres and unlock the
potential of digitization. Whether it is about connecting roadways assets, first responder or public
transport vehicles, water, oil, or gas infrastructures, renewable energy resources, power
substations, EV charging stations, or any critical remote assets, you need rugged routers with
cutting-edge cybersecurity capabilities. Not only do Cisco Catalyst Industrial Routers offer
unconditional connectivity for all your remote assets but come with a comprehensive next-
generation firewall (NGFW) features and many more cybersecurity capabilities to block modern
threats.
13
Industrial Security 3.1 Design Guide
14
Industrial Security 3.1 Design Guide
15
Industrial Security 3.1 Design Guide
While this approach reduces the number of appliances required to provide full visibility, it still
increases the amount of traffic going through the industrial network. Traffic is multiplied
because you’re duplicating traffic to SPAN it to a remote switch. And the more traffic on the
network, the slower it becomes, resulting in jitter — often an unacceptable compromise in
industrial networks where processes need to run faster and machines must be timely
synchronized.
An Alternative to SPAN
There is a better way to achieve full network visibility: embed DPI capability into existing
network hardware. An industrial-grade switch with native DPI capability eliminates the need to
duplicate network flows and deploy additional appliances. Obtaining visibility and security
functionality is simply a matter of activating a feature within the network switch, router, or
gateway. Cost, traffic, and operational overhead are all minimized.
16
Industrial Security 3.1 Design Guide
A DPI-enabled switch analyzes traffic locally to extract meaningful information. It only sends
lightweight metadata to a central server, which runs the analytics and anomaly detection. That
metadata represents about 3-5% of general traffic. The traffic is so lightweight, it can be
transferred over the industrial network without causing congestion or requiring extra bandwidth.
Embedding DPI in network equipment affords both IT and OT unique benefits. IT can leverage
the existing network infrastructure to secure industrial operations without having to source,
deploy, and manage additional hardware. Because these network elements see all industrial
traffic, embedded sensors can provide analytical insights into every component of the industrial
control systems. As a result, OT can obtain visibility into operations that it has never had before.
Active Discovery
The completeness of asset discovery is important for IACS networks to get a complete
understanding of all the devices on the network and their associated security risks. For passive
discovery to be effective, sensor placement is important and will be discussed later in the
document. However, it is difficult to determine how much of the network has adequately been
discovered as assets will only be seen as they cross the sensor. Gaining a complete picture takes
time and can only determine information that is transmitted by the asset.
Active discovery is an on-demand mechanism for gaining asset visibility. By sending extremely
precise and nondisruptive requests in the semantics of the specific IACS protocols, visibility
17
Industrial Security 3.1 Design Guide
gaps can be filled. However, there are some misconceptions regarding active discovery due to
the many ways in which it can be implemented.
Active discovery causes unexpected crashes.
The argument made by most vendors is that their solutions only use valid protocol commands
supported by the industrial assets. These commands are similar to what the IACS vendor
products use for asset management and are hence non-disruptive. In reality, the reason why old
IACS devices are susceptible to crashes during active scanning is because they have limited
processing power for network functions and get overwhelmed when repeated connection
attempts are made for communication. So, the reason for the crashes has less to do with valid or
invalid commands being used but rather a factor of how many connection attempts is being made
by the active discovery solution.
From a network hygiene standpoint, it is not uncommon to see industrial networks badly
designed with all devices being addressed from a flat /16 IP subnet. Most IACS detection
solution available in the market today are based on a centralized architecture where traffic
mirroring (SPAN) is used to feed an appliance (or a software VM) located at Level-3 of the
Purdue model that does the Passive Discovery.
When the bolt-on Active Discovery capability of these solutions initiate a scan from this central
location, they need to cycle through a range of IP addresses within the scan range. Now, one of
the first things that needs to happen to establish communication for Active Discovery is to
resolve ARP. These ARP requests are seen by all devices within the flat network, and the
processing of the barrage of ARP requests can overwhelm the networking stack on legacy IACS
devices causing them to crash. While this is not the only reason for legacy devices crashing, it is
quite often the primary cause.
In addition, in most multi-vendor IACS environments, centralized discovery solutions sitting at
Level-3 of the Purdue model are not aware of the specific protocol being used at the Level 0-2
edge. This requires the scanning process to cycle through a range of IACS protocols (CIP,
PROFINET, Modbus, and so on) until the device responds based on the protocol it supports. This
results in unnecessary communication attempts that can also overwhelm the processing power of
legacy devices causing disruption.
Centralized active discovery solutions cannot penetrate NAT boundaries.
Industrial networks are usually built up of units like cells, zones, bays, etc. that are comprised of
machines or control systems supplied by machine builders and system integrators. It is common
practice for these machines especially in discrete manufacturing to be built in a standardized
manner with IACS devices across machines configured in a cookie-cutter approach with
repeating IP addresses. Consequently, industrial networks are rife with network address
translation (NAT) being used to allow the operations and control systems located in the Level-3
to communicate with IACS devices sitting in the lower levels with duplicate IP addresses.
When it comes to address translation only a small fraction of IACS devices (like PLC, HMI,
RTU, and so on.) communicate with the site operations layer, and only those devices’ IP
addresses are translated at the NAT device. The implication of this is that centralized Active
Discovery solutions cannot communicate with the vast majority of IACS devices (like IO, drives,
safety controllers, relays, IED) sitting below the NAT boundary whose IP addresses are not
translated. In the auto manufacturing industry as an example, it is typical for less than 17% of
18
Industrial Security 3.1 Design Guide
devices in level 0-2 to be visible to a centralized Active Discovery solution. This results in an
83% gap in visibility!
It is recommended that networks use a hybrid approach of active and passive discovery to gain
an accurate insight into their OT network.
19
Industrial Security 3.1 Design Guide
Risk is a function of the likelihood of a given threat source exercising a particular potential
vulnerability, and the resulting impact of that adverse event on the organization.
Risk management is the process that balances the operational and economic costs of protective
measures and the achieved gains in mission capability by protecting assets and data that support
their organizations’ missions. For example, many people decide to have home security systems
and pay a monthly fee to a service provider to monitor the system for increased protection of
their property. Presumably, the homeowners have weighed the cost of system installation and
monitoring against the value of their household goods and their family safety priority. Risk
limitation limits a company risk exposure by taking some action. It is a strategy employing a bit
of risk acceptance along with a bit of risk avoidance. It is the most commonly used risk
mitigation strategy.
Vulnerability Assessment
The objective of a vulnerability assessment is to ensure that the network and the information
systems are tested for security vulnerabilities in a consistent and repeatable manner. Security
vulnerabilities will continue to be discovered in technology products and services. These
vulnerabilities, regardless of whether they are caused by an unintentional software bug or by
design (such as a default administrative password), can be used by malicious persons to
compromise the confidentiality, availability, or integrity of your infrastructure.
Hardware and software vendors typically provide software fixes when they announce the
vulnerabilities in their products. When there is no fix available, vendors typically provide a
workaround or mitigation. There is usually a time between the announcement of a security
vulnerability in a particular technology and the availability of an attack method (an exploit).
Within this time, system administrators should take action to protect their systems against an
attack because at this point, the public knows that a flaw exists, but attackers are still trying to
find a way to take advantage of that vulnerability. Unfortunately, the vulnerability-to-exploit
time has been steadily decreasing.
With the large quantity of new vulnerabilities from numerous vendors, it can be overwhelming to
track all the vulnerabilities. How can the security team analyze any single vulnerability and
determine its relevance to the specific technology architecture? The solution is to have a good
process to determine which ones are relevant to your organization.
CVSS Scores
The Common Vulnerability Scoring System (CVSS) provides a way to capture the principal
characteristics of a vulnerability and provides a better understanding of the risk that is posed by
each vulnerability. CVSS is a free and open industry standard for assessing the severity of
computer system security vulnerabilities. CVSS attempts to assign severity scores to
vulnerabilities, allowing responders to prioritize responses and resources according to threat.
Scores are calculated based on a formula utilizing several metrics that approximate ease of
exploit and its impact. Scores range from 0 to 10, with 10 being the most severe.
20
Industrial Security 3.1 Design Guide
CVSS provides a standard way to assess and score security vulnerabilities. CVSS analyzes the
scope of a vulnerability and identifies the privileges that an attacker needs to exploit it. CVSS
allows vendors to better analyze the impact of security vulnerabilities and more clearly define the
level of urgency that is required to respond to the vulnerability. While many analysts use only
the CVSS base score for determining severity, temporal and environmental scores also exist, and
factoring in the likelihood and the criticality to a given network environment.
Components
Cisco Cyber Vision Center can be deployed as a software or hardware appliance depending on
your network requirements. Consider the number of sensors, components, and flows to decide
the appropriate installation. At the time of writing this guide, a single Cyber Vision Center can
support 150 sensors, 50,000 components, and 8 million flows. For the most up to date numbers
see the Platform Support page.
For deployments that are too large for a single instance of Cyber Vision Center to handle, or for
organizations who wish to aggregate multiple sites into a single dashboard view, a Cyber Vision
Global Center instance can aggregate up to 20 local Cyber Vision Centers. Cyber Vision Global
Center is used for security monitoring across multiple sites, providing a consolidated view of
components, vulnerabilities, and events. Nevertheless, sensor operation and management
activities can be done only on instances of Cyber Vision Center associated with the sensor.
Cyber Vision sensors passively capture and decode network traffic using DPI of industrial
control protocols. Cyber Vision sensors are embedded in select Cisco networking equipment, so
you don’t have to deploy dedicated appliances or build an out-of-band SPAN collection network.
Since Cyber Vision sensors decode industrial network traffic at the edge, they only send
lightweight metadata to the Cyber Vision Center, only adding 2-5% load to your industrial
network.
Note: Cyber Vision also supports an out-of-band sensor network for environments that require it.
Cyber Vision sensors also have the capability to do active discovery. These active discovery
requests originate from the sensor, deep into the IACS network, so these messages are not
blocked by firewalls or NAT boundaries.
Key Features
Comprehensive Visibility: Cyber Vision leverages a unique combination of passive and active
discovery to identify all your assets, their characteristics, and their communications. The Cisco
Cyber Vision unique edge computing architecture embeds security monitoring components
21
Industrial Security 3.1 Design Guide
within our industrial network equipment. There is no need to source dedicated appliances and
think about how to install them. There is no need to build an out-of-band network to send
industrial network flows to a central security platform. Cyber Vision enables the industrial
network to collect the information required to provide comprehensive visibility, analytics, and
threat detection.
Security Posture: Cisco Cyber Vision combines protocol analysis, intrusion detection,
vulnerability detection, and behavioral analysis to help you understand your security posture. It
automatically calculates risk scores for each component, device and any specific parts of your
operations to highlight critical issues so you can prioritize what needs to be fixed. Each score
comes with guidance on how to reduce your exposure so you can be proactive and build an
improvement process to address risks.
Operational Insights: Cisco Cyber Vision automatically uncovers the smallest details of the
production infrastructure: vendor references, firmware and hardware versions, serial numbers,
rack slot configuration, etc. It identifies asset relationships, communication patterns, and more.
Information is shown in various types of maps, tables, and reports. Cisco Cyber Vision gives OT
engineers real-time insight into the actual status of industrial processes, such as unexpected
variable changes or controller modifications, so they can quickly troubleshoot production issues
and maintain uptime. Cyber experts can easily dive into all this data to investigate security
events. Chief information security officers have all the necessary information to document
incident reports and drive regulatory compliance.
Incident Investigation and Response: SecureX Threat Response is a security investigation and
incident response application. It simplifies threat hunting and incident response by accelerating
detection, investigation, and remediation of threats. The threat response application provides
your security investigations with context and enrichment by connecting your Cisco security
solutions (across endpoint, network, and cloud) and integrating with third-party tools, all in a
single console. Abnormal behavior seen in Cyber Vision can be sent to SecureX for further
analysis and context from the other security tools deployed on the network such as Cisco Secure
Endpoint, Secure Firewall, Umbrella and more. The SecureX ribbon on the Cyber Vision user
interface makes it even easier to create a case and launch investigations.
Snort IDS: Cyber Vision integrates the Snort IDS engine in select platforms leveraging Talos
subscription rules to detect known and emerging threats such as malware or malicious traffic.
For more information on Cisco Cyber Vision see the Cisco Cyber Vision Datasheet.
22
Industrial Security 3.1 Design Guide
Note: Cisco Cyber Vision Center can operate without any connectivity leaving the industrial
zone. The flows in the diagram that meet this condition are optional and their purpose will be
explained in this guide.
In Cisco Cyber Vision, the administrator network interface gives access to the graphical user
interface (GUI) and the collection network interface connects the Center to the sensors.
Ethernet interfaces are allocated in the following way:
• Administration network interface (eth0) gives access to the user interface (GUI or API),
to the CLI through SSH and is used for communication with other systems (syslog
collector or SIEM, pxGrid, and so on)
• Collection network interface (eth1) connects the Center to the sensors
The Center (physical or virtual appliance) has two preconfigured interfaces―eth0 and eth1―that
are respectively allocated to the admin and collection networks by default.
However, if the admin and collection network share the same local area network (LAN), the
Center must be configured to use a single interface. In this case the admin and collection
interface should share a single IP address on eth0, and eth1 should be reserved as a collection
interface for DPI on the Center.
23
Industrial Security 3.1 Design Guide
Cisco Cyber Vision Global Center requires only one interface for management and
communication with Cisco Cyber Vision Center instances. It uses TCP port 5671 for
synchronization and updates to the Center. This port should be proxied in the IDMZ or enabled
in the IDMZ firewall to ease communication.
Note: Cisco Cyber Vision Center does not require internet connectivity nor Global Center
connectivity to operate. In instances where Cyber Vision Center is not connected to the Internet,
upgrades need to be downloaded from Cisco.com and manually uploaded in the appliance.
24
Industrial Security 3.1 Design Guide
25
Industrial Security 3.1 Design Guide
26
Industrial Security 3.1 Design Guide
The recommendation is to always install a sensor at the top of a ring. At a minimum, all traffic
leaving and entering the zone should be captured, with additional sensors placed within the ring
depending on desired visibility levels.
Sensor Considerations
When deploying Cisco Cyber Vision Sensors in the network, the following should be taken into
consideration:
• Cisco Cyber Vision sensors are installed as an IOx application. IOx is included with
essentials and advanced license of Cisco switches.
• IOx applications need an SD card (Industrial Ethernet switches) or SSD Disk (Catalyst
9300) to be installed. These parts are optional on the switch ordering configuration.
27
Industrial Security 3.1 Design Guide
28
Industrial Security 3.1 Design Guide
private IP and a component for the translated IP on Cisco Cyber Vision Center, in other
words, duplicate devices in the inventory.
29
Industrial Security 3.1 Design Guide
Information displayed about vulnerabilities (1) includes the vulnerability type and reference,
possible consequences, and solutions or actions to take on the network. Most of the time though,
it is enough to upgrade the device firmware. Some links to the manufacturer website are also
available for more details on the vulnerability.
A score reports the severity of the vulnerability (2). This score is calculated upon criteria from
the Common Vulnerability Scoring System or CVSS. Criteria are for example the ease of attack,
its impacts, the importance of the component on the network, and whether actions can be taken
remotely or not. The score can go from 0 to 10, with 10 being the most critical score.
You also have the option to acknowledge a vulnerability (3) if you don't want to be notified
anymore about it. This is used for example when a PLC is detected as vulnerable, but a security
policy has been defined to protect against it. The vulnerability is therefore mitigated. An
acknowledgment can be canceled at any time. Vulnerabilities acknowledgment/cancelation is
accessible to the Admin, Product and Operator users only.
0 – 39 Green Low
40 - 69 Orange Medium
30
Industrial Security 3.1 Design Guide
The risk score is meant to help the user easily identify which vulnerable devices are the most
critical to mitigate within the overall network. It provides limited and simple information on the
cybersecurity of the monitored system. It is intended as a first step in security management to
take actions by showing the causes of high scores and providing solutions to reduce them. The
goal is to minimize and keep risk scores as low as possible. The solutions proposed can be to:
• Patch a device to reduce the surface of attack
• Remove vulnerabilities
• Update firmware
• Remove unsafe protocols whenever possible (FTP, TFTP, Telnet, etc.)
• Create an access control policy
• Limit communications with external IP addresses
In addition, it is necessary to define the importance of the devices in your system by grouping
devices and setting an industrial impact. Thereby, increasing or decreasing the risk score, which
will allow you to focus on most critical devices.
The Cyber Vision risk score is computed as follows:
Impact answers the question; What is the device “criticality”, that is, what is its impact on the
operation? Does it control a small, non-significant part of the network, or does it control a large
critical part of the network? To do so, the impact depends on the device tags assigned by Cyber
Vision. Is the device a simple IO device that controls a limited portion of the system, or is it a
SCADA that controls the entire factory? These will obviously not have the same impact if they
are compromised.
Note: A Cyber Vision user has the possibility to act on the device impact by moving it into a
group and setting the group industrial impact (from very low to very high). By default, Cyber
Vision may decide the impact a device has on your network is small, because it only
communicates with a handful of other devices. However, if you as an administrator decide that
these groups of assets are highly critical, the risk score will change based on this manually
entered information.
Likelihood answers the question: What is the likelihood of this device being compromised?
It depends on:
• Device Activities, or more precisely activity tags. Some protocols are less secure than
others. For example, telnet is less secure than SSH.
• The exposure of the device communicating with an external IP subnet.
• Device vulnerabilities, considering CVSS scoring.
31
Industrial Security 3.1 Design Guide
32
Industrial Security 3.1 Design Guide
• Create Sub-groups based on process groups that span multiple manufacturing areas. This
information helps define segmentation policies in the next chapter of the guide
• Assign an industrial impact variable to the group according to group criticality
• If the network is segmented use the subnet filter to identify components to be grouped
• If NAT is used, group devices using the inside IP address
33
Industrial Security 3.1 Design Guide
Note: it is not recommended to include the public IP address tag in any baseline creations. This
will result in too many alerts as devices that communicate outside the network are too dynamic
in nature.
Presets containing critical assets are a good candidate for creating baselines. Typically, critical
assets are controllers which determine the plant operation. Cisco Cyber Vision can monitor
programs and firmware version changes that might cause malfunction or even stop a production
line. For this use case a Preset can be created filtering by Group(s) identifying the processes to be
monitored and the Controller tag as depicted in figure 14. Any changes on the Component will
be highlighted as well as any new activities to a controller. Cisco Cyber Vision depicts a changed
Component with the following information:
1. How many changes on devices are seen
2. Detail of changes when selecting a component from the list. In this case a controller
mode was changed. It is possible to investigate the change using flows and acknowledge
or report differences.
3. Filter criteria for the Preset; in this example Group and controller tag is used.
4. OT user could investigate activity with flows. In this example flow properties show
details associated with a program download such as downloaded project, workstation,
and user.
34
Industrial Security 3.1 Design Guide
Performance
The control system engineer deploying a hardware or network sensor must consider its
performance numbers. The critical performance metrics for Cyber Vision Version is documented
in the Cisco Cyber Vision Architecture Guide.
Note: To reduce the load on Cyber Vision Sensor, avoid monitoring both access and trunk ports
as it doubles the number of packets fed to the DPI engine and the bandwidth used if the mirrored
traffic is sent over RSPAN. When installing sensors on access switches, monitor the access ports
only. If you do not have sensors in the access switches, then SPAN on the aggregation switch
trunk ports will be required.
Licensing
Cisco Cyber Vision Center requires a license. Licenses must be available in a smart account to
register product instances. The following options are available:
• Direct cloud access to Cisco Smart Software Manager (SSM): Cyber Vision has a direct
connection to the SSM cloud.
• Cloud access via https proxy: Cyber Vision uses a web proxy such as the Umbrella Secure
Internet Gateway to send information to Cisco SSM.
• Cisco Smart Software Manager On-Prem: Usage information is sent to a local appliance.
Cisco SSM On-Prem would reside in the IDMZ, and information is periodically sent to the
SSM cloud.
• Offline: Licenses are reserved in SSM and applied manually.
The recommended approach, and the option validated in this design is Cisco Smart Software
Manager On-Prem.
Note: Cisco Cyber Vision Global Center does not require an additional license.
35
Industrial Security 3.1 Design Guide
A solid and flexible network architecture is a key success criterion for robust and certified
security. Poor network design creates a huge vulnerability and hinders the concepts of
segmentation, extensibility, as well as the integration of cyber security controls and physical
security measures.
36
Industrial Security 3.1 Design Guide
Security considerations used in this guide are focused around three key networking areas: The
Cell/Area Zone supporting the core IACS embedded in the production environment functional
zones, the Operations and Control Zone supporting plant-wide applications and services, and the
IDMZ providing key segmentation between production and enterprise systems.
More information on the Cisco Industrial Automation reference architecture can be found in the
Cisco Solution Brief for Industrial Automation Networks.
Industrial Zone
The Industrial zone is important because all the IACS applications, devices, and controllers
critical to monitoring and controlling the plant floor IACS operations are in this zone. To
preserve smooth plant operations and functioning of the IACS applications and IACS network in
alignment with standards such as IEC 62443, this zone requires clear logical segmentation and
protection from Levels 4 and 5.
The Safety Zone may be the most critical zone in an IACS environment. For example, in a
manufacturing environment, a robot can cause a fatal impact to personnel if proper safety
procedures are not followed. Not only are safety networks isolated from the rest of the IACS (as
shown in Figure 15, positioned below the Industrial Zone), but they typically also have color-
coded hardware and are subject to more stringent standards. Industrial automation allows safety
devices to coexist and interoperate with standard IACS devices on the same physical
infrastructure to reduce cost and improve operational efficiency, resulting in the need for
effective security controls to protect from malicious actors looking to cause harm.
The Cell/Area Zone, a functional area within a plant or factory, is the foundation of an industrial
automation architecture. Most plants will have 10s if not 100s/1000s of functional areas. This is
the network that connects sensors, actuators, drives, controllers, robots, machines, and any other
IACS devices that need to communicate in real-time (I/O communication). It represents Levels
0-2 of the Purdue model. Most importantly, Cell/Area Zone networks support the critical
automation and control functions that keep the plant operating and producing quality products.
Fundamentally, the Cell/Area Zone is a Layer 2 access network: a subnet, a broadcast domain, a
virtual local area network (VLAN) and/or a service set identifier (SSID). PLCs communicate
with their assigned sensors, actuators, and other IACS devices within a Cell/Area Zone. Some
industrial traffic is Layer 2 only as there is no IP header attached.
Level 3, the Site Operations and Control Zone, represents the highest level of the IACS
network and completes the segments of the Industrial Zone. Site operations is generally a
“carpeted” space meaning it has heating, ventilation and air conditioning (HVAC) with typical
19-inch rack-mounted equipment in hot/cold aisles utilizing commercial grade equipment. As the
name implies, this is where applications related to operating the site reside, where operating the
site means the applications and services that are directly driving production. These applications
are primarily based on standard computing equipment and operating systems (Unix-based or
Microsoft Windows). For this reason, these systems are more likely to communicate with
standard Ethernet and IP networking protocols. As these systems tend to be more aligned with
standard IT technologies, they may also be implemented and supported by personnel with IT
skill sets.
37
Industrial Security 3.1 Design Guide
Enterprise Zone
The enterprise zone is where the traditional IT systems exist. These functions and systems
include wired and wireless access to enterprise network services such as:
• Internet Access
• Email services
• SAP
• Oracle
Although important, these services are not viewed as critical to the IACS and thus industrial zone
operations. Direct access to the IACS is typically not required, but there are applications such as
remote access and data collection where traffic must cross the IT/OT boundary. Access to the
IACS network from an external zone must be managed and controlled though the industrial
demilitarized zone (IDMZ) to maintain the security, availability and stability of the IACS.
Industrial DMZ
Although not part of the Purdue mode, the industrial DMZ is deployed within plant
environments to separate the enterprise networks and the operational domain of the plant
environment. Downtime in the IACS network can be costly and have a severe impact on
revenue, so the operational zone cannot be impacted by any outside influences. Network access
is not permitted directly between the enterprise and the plant; however, data and services are
required to be shared between the zones, thus the industrial DMZ provides architecture for the
secure transport of data. Typical services deployed in the DMZ include remote access servers
and mirrored services. Further details on the design recommendations for the industrial DMZ can
be found later in this guide.
38
Industrial Security 3.1 Design Guide
Use cases
Common use cases and personas that must be secure in an industrial network include:
• Cell/Area Zone: The industrial zone is typically comprised of multiple cell/area zones. All
devices located within a given Cell/Area zone should be able to freely communicate with all
other assets in this zone. Communication that crosses zone boundaries should be denied
unless explicitly allowed as depicted in Figure 16.
Figure 16 Cell/Area Zone to Cell/Area Zone denied by default. No segmentation inside the zone
39
Industrial Security 3.1 Design Guide
• Administrative Users: Figure 17 shows an administrative user who requires access to all
zones in the network. They may be responsible for configuration of the network
infrastructure, or the application of control logic. Their access should not be limited, but their
data should be protected.
40
Industrial Security 3.1 Design Guide
• Infrastructure Services: Endpoints that do not have user presence, but still require access
to a large chunk of the plant. Services such as DHCP, NTP or LDAP may touch each device
on the network.
Figure 18 Infrastructure services that need access to all Cell/Area zones
41
Industrial Security 3.1 Design Guide
• Plantwide Applications: Applications within the industrial data center (IDC) that have
specific access requirements. Examples include analytics platforms that require read only
access to relevant machinery, or vendor tools used to monitor and maintain plant floor
equipment.
Figure 19 Applications that need access to specific services in the cell, but not the full cell
42
Industrial Security 3.1 Design Guide
43
Industrial Security 3.1 Design Guide
44
Industrial Security 3.1 Design Guide
• Convenience Port: As operators plug directly into the infrastructure, they will typically
bypass all the security checks that have been deployed in the architectural layers above it.
Ensuring only authorized users with authorized device posture checks can connect to the
network can aid in securing this use case.
Figure 22 Operators plug into a cell using a convenience port and should be able to reach out to extra
services
45
Industrial Security 3.1 Design Guide
• Safety Networks: Safety Instrumented Systems (SIS) are critical to the control network and
should either be air gapped from the rest of the network or logically segmented to ensure no
data can leak into this zone.
Figure 23 Safety Network could be air gapped, or logically segmented from the rest of the network
46
Industrial Security 3.1 Design Guide
• Remote Users: Remote access is commonly granted to personas such as employees, partners
and vendors for maintenance, process optimization and troubleshooting purposes. Remote
access should be restricted to select devices on the plant floor for a limited amount of time.
Figure 24 Remote Users need access to select devices, not a full zone
47
Industrial Security 3.1 Design Guide
IT/OT Boundary
The first step in the journey to securing your industrial network is to restrict logical access to the
OT network. A common deployment method is an Industrial Demilitarized Zone (IDMZ)
network with firewalls to prevent network traffic from passing directly between the corporate
and OT networks.
Figure 25 Enforce policy at the IT / OT boundary
The IDMZ offers a network on which to place data and services to be shared between the
Enterprise and Industrial Zones. The IDMZ doesn't allow direct communication between the
48
Industrial Security 3.1 Design Guide
Industrial and Enterprise Zones but meets the data and service sharing requirement. With the
deployment of an IDMZ and Industrial Zone firewall, attacks and issues that arise in one zone
cannot easily affect the other zone. In fact, by temporarily disabling the IDMZ and the firewalls,
an IACS or IT network administrator can help to protect a zone until the situation is resolved in
the other zone.
Cisco Secure Firewall brings distinctive threat-focused next-generation security services. The
firewall provides stateful packet inspection of all traffic between the enterprise and OT network
and enables intrusion prevention and deep packet inspection capabilities for inspecting
application data between the zones designed to identify and potentially stop a variety of attacks.
Cisco Secure Firewall is the first line of defense adversaries meet when attempting to breach the
network and is the enforcement point for least privilege access for legitimate services to cross the
border in a secure way.
Providing design guidance for the IDMZ is out of scope for this design guide but has been
extensively covered in another guide. For more information on the IDMZ, see Securely
Traversing IACS Data across the IDMZ Using Cisco Firepower Threat Defense.
49
Industrial Security 3.1 Design Guide
The IDC must have a segmentation point between it and the plant floor. Micro segmentation (see
Cisco data center security) of the data center is out of scope for this design guide, but in scope is
the firewall that should be placed at the IDC boundary. As modern systems are deployed in the
operational network, they will ultimately co-exist with legacy systems that need protected from
the newly exposed attack vectors.
50
Industrial Security 3.1 Design Guide
Ideally, there is a separate firewall deploying dedicated to the IDC boundary, even if that firewall
is virtual. However, in small plant environments, the same firewall used at the IT/OT boundary
could be shared with the IDC or any other “macro zones” in the operational network.
Figure 27 Single firewall pair for macro segmentation of plant network
51
Industrial Security 3.1 Design Guide
Security is an architecture, not a product. Defense in depth is a strategy, it is not deploying the
same policies everywhere. Internet policies should have been covered by the IT/OT boundary
firewall, threats from modern assets should be covered by the IDC firewall, and remote users
will be covered later in this guide. Preventing lateral movement in the plant floor is the last line
of defense. If threats were to make its way into a system, either through poorly implemented
controls, cellular back doors, or a simple USB stick, the blast radius will be reduced to only the
system(s) that has been affected. The following sections will offer two ways to do this; Cisco
Secure Firewall, or Cisco Identity Services Engine.
52
Industrial Security 3.1 Design Guide
53
Industrial Security 3.1 Design Guide
A zone is a collection of physically and functionally united assets that have similar security
requirements. These areas are defined form the physical and functional models of the industrial
system control architecture. Some characteristics of a security zone are:
• A zone should have a clear border
• A zone can have other subzones
• The border is used to define access with another zone or outside system
• Access is via electronic communication channels or the physical movement of people or
equipment
A conduit supports the communication between zones. A conduit supports and defines allowed
communication between two or more zones. Some attributes defined within a conduit are:
• The zones interconnected by the conduit
• Type of dataflows allowed
• Security policies and procedures
Partitioning the industrial network into zones and conduits reduces overall security risk by
limiting the scope of a successful cyber-attack.
54
Industrial Security 3.1 Design Guide
Segmentation Technologies
VLAN
A virtual local area network (VLAN) can be created on a Layer 2 switch to reduce the size of
broadcast domains. Devices within a VLAN act as if they are in their own independent network,
even if they share a common physical infrastructure with other VLANs. Any switch port can
belong to a VLAN, and unicast, broadcast, and multicast packets are forwarded and flooded only
to end stations belonging to the VLAN the packets were sourced from. Each VLAN is
considered a separate logical network, and packets destined for stations that do not belong to the
VLAN must be forwarded through a device that supports routing.
The default Ethernet VLAN is VLAN 1. It is a security best practice to configure all the ports on
all switches to be associated with VLANs other than VLAN 1. It is also a good practice to shut
down unused switch ports to prevent unauthorized access.
A good security practice is to separate management and user data traffic. The management
VLAN, which is VLAN 1 by default, should be changed to a separate, distinct VLAN. To
communicate remotely with a Cisco switch for management purposes, the switch must have an
IP address configured on the management VLAN. Users in other VLANs would not be able to
establish remote access sessions to the switch unless they were routed into the management
VLAN, providing an additional layer of security. Also, the switch should be configured to accept
only encrypted SSH sessions for remote management.
VRF-lite
While virtualization in the Layer 2 domain is done using VLANs, a mechanism is required that
allows the extension of the logical isolation over the routed portion of the network. Virtualization
of a Layer 3 device can be achieved using virtual routing and forwarding lite (VRF-Lite). The
use of virtual routing and forwarding (VRF) technology allows you to virtualize a network
device from a Layer 3 standpoint, creating different "virtual routers" in the same physical device.
A VRF instance consists of an IP routing table, a derived forwarding table, a set of interfaces that
use the forwarding table, and a set of rules and routing protocols that determine what goes into
the forwarding table.
Technically, there is no difference between a VRF and a VRF-lite. The difference lies in how
you use it. VRF is a technology, while VRF-lite is a particular way of using that technology.
Both VRF and VRF-lite are built on the same premise: they have separate routing tables (that is,
VRFs) created on your router and unique interfaces associated with them. If you remain here,
you have VRF-lite. If you couple VRFs with a technology such as MPLS to communicate with
other routers having similar VRFs while allowing to carry all traffic via a single interface and
being able to tell the packets apart, you have a full VRF.
To provide continuous virtualization across the Layer 2 and Layer 3 portions of the network, the
VRFs must also be mapped to the appropriate VLANs at the edge of the network. The mapping
of VLANs to VRFs is as simple as placing the corresponding VLAN interface at the distribution
switch into the appropriate VRF.
55
Industrial Security 3.1 Design Guide
Stateful Firewall
A firewall is a network security device that monitors the incoming and outgoing network traffic
and decides whether to allow or block the traffic based on a defined set of security rules. Where
a stateless packet filter, such as a standard Access Control List (ACL), operates purely on a
packet-by-packet basis, a stateful firewall allows or blocks traffic based on the connection state,
port, and protocol. Stateful firewalls inspect all activity from the opening of a connection until
the connection is closed.
Stateful packet filters are application-aware while additional deeper inspection of transit traffic is
being performed, which is required to manage dynamic applications. Dynamic applications
typically open an initial connection on a well-known port and then negotiate additional OSI
Layer 4 connections through the initial session. Stateful packet filters support these dynamic
applications by analyzing the contents of the initial session and parsing the application protocol
just enough to learn about the additional negotiated channels. A stateful packet filter typically
assumes that if the initial connection was permitted, any additional transport layer connections of
that application should also be permitted.
Next-Generation Firewall
Next-Generation Firewalls (NGFW) are stateful firewalls with additional features such as
application visibility and control, advanced malware protection, URL filtering, Secure Sockets
Layer (SSL)/Transport Layer Security (TLS) decryption, and IDS/IPS.
Choosing to use a NGFW or ACLs in the OT network will depend on the types of
communication that will flow through the network. Device to device communication for
example, may use protocols such as Ethernet/IP (TCP port 44818 & UDP port 2222) or Modbus
(TCP port 502) which can be filtered on a packet-by-packet basis due to its static network
behavior. This is the communication that keeps the plant running, and doing more advanced
network inspection between these devices, or implementing an IPS system, may introduce
system latency and/or run the risk of OT downtime due to false positives.
It is therefore recommended to introduce NGFW in the network for northbound communication,
such as between the IDC and the Cell/Area Zones for advanced threat protection between
devices that pose a higher security threat but would not cause production downtime if security
56
Industrial Security 3.1 Design Guide
was prioritized over connectivity. Having an additional layer of IPS between the IDC and the
production floor will ensure advanced threat protection exists not just in the IDMZ. An NGFW
could also be deployed for advanced application control such as allowing read-only access to an
asset on the plant floor from a vendor application hosted in your IDC.
TrustSec
Cisco TrustSec (CTS) defines policies using logical device groupings known as Security Group
Tag (SGTs). An SGT is a 16-bit identifier embedded into the MAC layer of IP traffic. The SGT
is a single label indicating the privileges of the group within the entire network. It is in turn
propagated between network hops allowing any intermediary devices (switches, routers) to
enforce policies based on the group identity tag. The features associated with SGTs on the
network devices can be divided into three categories: classification, propagation, and
enforcement.
Classification is the assignment of SGTs to an IP address. This assignment can be accomplished
either dynamically or statically. Generally, dynamic classification is done at the access layer, and
static classification is done at the egress switch. In OT networks, where devices tend not to have
802.1X capabilities, dynamic classification can be done using MAC Authentication Bypass
(MAB). Static classification is configured directly on the switch in which tagging occurs.
Options for static classification include the mapping of Subnet, IP address, VLAN, or port to an
SGT.
The transport of security group mappings can be accomplished through inline tagging or the
SGT Exchange Protocol (SXP). With inline tagging, the SGT is embedded in the Ethernet frame
header. However, not all network devices support inline tagging. SXP is used to transport SGT
mappings across devices that do not support inline tagging.
Enforcement is implementing a permit or deny policy based on the source and destination
SGTs. This implementation can be accomplished with security group access control lists
(SGACLs) on switching platforms and security group firewall (SGFW) on routing and firewall
platforms.
Note: Which method of classification, transport and enforcement to use will be discussed later in
the documentation. This section only introduces the technology.
57
Industrial Security 3.1 Design Guide
inspecting encrypted traffic at scale. As well, the human-readable rules of Snort 3 IPS help
simplify security. Dynamic application visibility and control is available through the Cisco
Secure Workload integration, for consistent protection for today’s modern applications across the
network and workload.
The choice of firewall will ultimately be determined by the throughput requirements for a given
use case. A dedicated firewall for securing data in and out of the cell/area zone will have much
smaller throughput requirement than the data center appliance. Use cases will be discussed later
in the document, but for more information on each firewall specifications, such as performance
metrics, see Cisco Secure Firewall.
Management options
With the Secure Firewall portfolio, you gain a stronger security posture, equipped with future-
ready, flexible management. Cisco offers a variety of management options tailored to meet your
business needs:
• Cisco Secure Firewall Device Manager (FDM): Manages a single firewall locally; this
is an on-device management solution to Firewall Threat Defense (FTD).
• Cisco Secure Firewall Management Center (FMC): Manages a large-scale firewall
deployment. It is available in all form factors, such as on-premises, private cloud, public
cloud, and Software as a Service (SaaS).
• Cisco Security Cloud Control (SCC): A cloud-based manager that streamlines security
policies and device management across multiple Cisco products, such as Cisco Secure
Firewall, Meraki® MX, and Cisco IOS® devices.
Cisco also offers Cisco Security Analytics and Logging for scalable log management. It
enhances threat detection and meets compliance mandates across the organization with longer
retention and behavioural analysis capabilities.
While many of the Cisco Secure Firewall capabilities can be achieved with local management,
all design guidance in this document assumes the use of Cisco FMC to manage the devices.
58
Industrial Security 3.1 Design Guide
Security guideline would suggest that the Cisco FMC is installed within the operational network,
however, in reality security operators wish to consolidate the firewall management for both OT
and IT networks. The connectivity needs for Cisco FMC can be found in the Administration
Guide.
Deployment modes
Routed Firewall Mode
In routed mode, the firewall is considered to be a router hop in the network. Each interface that
you want to route between is on a different subnet.
Figure 31 Cisco Secure Firewall in routed mode
Bridge Groups
Layer 2 connectivity is achieved by using a "bridge group" where you group together the inside
and outside interfaces for a network, and the firewall uses bridging techniques to pass traffic
between the interfaces. Each bridge group includes a Bridge Virtual Interface (BVI) to which
you assign an IP address on the network. You can have multiple bridge groups for multiple
networks.
Bridge groups are supported in both transparent and routed firewall modes.
• In transparent mode, bridge groups are the mechanism in which layer 2 connectivity is
achieved. Since the firewall is in transparent mode, there is no mechanism for bridge
groups to communicate with each other.
• In routed mode, you can have one or more isolated bridge groups like in transparent
mode, but also have normal routed interfaces for a mixed deployment.
59
Industrial Security 3.1 Design Guide
More information about firewall deployment modes can be found in the Cisco Secure Firewall
Management Center Device Configuration Guide: Transparent or Routed Firewall Mode.
Inline Sets
Inline sets is an IPS-only mode that bypass many firewall checks and only support the IPS
security policy. This may be beneficial if you are already deploying another technology for
access control policies, such as Cisco Identity Services Engine, and you want to supplement the
deployment with IPS without the overhead of firewall functions.
Additionally, inline sets can be deployed with passive interfaces, where a copy of the traffic is
sent to Snort for intrusion detection only. Inline sets would not be a recommended best practice
for OT networks, as it is more appropriate to use a dedicated OT visibility tool such as Cyber
Vision to passively inspect the network.
Key Capabilities
Application Recognition for OT
In its most basic form, a firewall provides access control policies that inspect and/or control
network traffic across a boundary. Cisco Secure Firewalls can control traffic based on:
• Simple, easily determined transport and network layer characteristics - source and
destination, port, protocol, and so on
• The latest contextual information on the traffic, including characteristics such as
reputation, risk, business relevance, application uses, or URL visited
• Realm, user, user group, or ISE attribute
• Security Group Tag (SGT)
• Characteristics of encrypted traffic; you can also decrypt this traffic for further analysis
• Whether unencrypted or decrypted traffic contains a prohibited file, detected malware, or
intrusion attempt
• Time and day (on supported devices)
One common way to control the flow of traffic through a modern firewall is the use of
application aware policies. The Cisco Secure Firewall currently identifies nearly 6,000 specific
applications. Using Access Control rules, application traffic can be trusted, blocked or allowed
but passed on for deep packet analysis and threat inspection.
Applications can be identified whether or not they are operating on standard network ports. In
some cases, the presence of specific applications operating over non-standard ports may indicate
a policy violation or an attempt to evade firewall controls. The Secure Firewall can identify these
non-standard connections and generate alerts or block traffic as needed.
More information on application control features in Cisco Secure Firewall can be found in their
online documentation. This design guide highlights the ability to detection SCADA protocols
throughout the plant network. Whether it Modbus messages, or Ethernet/IP between Rockwell
devices, the Cisco Secure Firewall not only understands that the application is present in the
communication, but knows the specific function codes being used by the system. For example,
60
Industrial Security 3.1 Design Guide
understanding if a newly deployed IIoT device is reading data from a PLC (i.e. Modbus Read) or
if they are attempting to manipulate data in the control loop (i.e. Modbus Write). The Cisco
Secure Firewall can do per packet inspection, and per packet control to ensure only the relevant
permissions are enabled between devices, which is especially important as modern systems look
to retrieve critical information for data analytics and operators need peace of mind that read only
access is enforced over the network.
61
Industrial Security 3.1 Design Guide
a branch of AI – has finally provided a mechanism to extend IDS/IPS detection to these zero-day
variants.
IDS/IPS signatures are usually crafted by humans. After creation, they undergo an extensive
testing cycle to build confidence in their efficacy. Depending on the signature provider,
signatures may also be deployed in limited live settings before broader deployment. Again, the
limited deployments aim to increase confidence in the signatures.
Signatures are generally written to tightly fit known exploitation of a known vulnerability. This
is done deliberately to lower the probability of matching legitimate traffic, thereby keeping false
positives low. The flip side of the endeavour to maintain a low false positive rate is that
signatures may miss zero-day variants.
Thus, the human signature writer must manually tune the generalizability of a signature. If the
signature is too tight, it will not catch even modest variations of a known attack, let alone zero-
day variants. If the signature is too general, it will result in false positives. Finding the right
balance is a tedious process that requires frequent trial and error. Frequently, false positives are
enough of a concern that only tightly matching signatures are deployed.
SnortML provides an automated mechanism to find the right balance between generalizability
and false positives. As mentioned above, SnortML uses machine learning – in particular, a deep
neural network – to detect exploits.
Machine learning techniques are an alternate way to “learn” the signature of a class of related
exploits. Here, a deep neural network is trained on malicious and benign traffic corpora. The
neural network infers generalized versions of the exploit patterns in the malicious corpora and
learns to distinguish between malicious and benign traffic. For example, the malicious traffic
may be an SQL injection exploit, whereas the benign traffic may be legitimate SQL queries.
Note that a neural network has many parameters that are tuned during the training process.
Effectively, during training, generalized inferred patterns of attacks are embedded in the
parameters of the neural network. These generalized patterns enable the neural network to detect
zero-day variants. Continuing the SQL example above, a neural network can learn the pattern of
related SQL injection exploits and detect a new exploit even if it has never seen it before.
SnortML has two components. The first is the machine learning engine, which loads machine
learning classifiers (trained over malicious and benign traffic as discussed above) and makes
them available for detection. The second is an inspector, which subscribes to data provided by
the underlying Snort architecture, passes the data to classifiers, and then acts on the classifiers’
output. The SnortML classifiers run in parallel to traditional signature-matching engines within
Snort, as shown in Figure 33.
62
Industrial Security 3.1 Design Guide
SCADA Inspectors
While the Cisco Secure Firewall provides thousands of preconfigured Snort rules for use in
access control rules, Snort also has the capability to load custom signatures. The Snort 3 rule
writing guide provides documentation on this rule writing process, detailing each option
available to users to create their own detections.
To make rule creation easier, especially rule options that require payload detection, Snort offer
“inspectors”. Inspectors decode applications and provide custom rule options for that application.
For example, Modbus is a protocol used in SCADA networks, and its traffic is typically seen on
TCP port 502. The Modbus service inspector decodes the Modbus protocol and provides three
rule options that rule writers can use to evaluate Modbus traffic.
Those three options are modbus_data, modbus_func, and modbus_unit.
Figure 34 Modbus TCP packet structure
63
Industrial Security 3.1 Design Guide
64
Industrial Security 3.1 Design Guide
CSDAC maps IP addresses of cloud resources to Dynamic Objects, which are then used in
Access Control Policy rules. Changes in the cloud detected by CSDAC are cascaded in real-time
to the FMC, and in turn, to the managed firewalls without any administrator action. The figure
below illustrates step-by-step, how CSDAC dynamically updates firewall policy.
Figure 36 CSDAC dynamic object update
65
Industrial Security 3.1 Design Guide
1. The firewall protects a Workload and is configured with an Access Control Policy
containing the dynamic object Workload_A representing cloud resources.
2. CSDAC monitors changes to the workload constantly and detects when a new instance is
spun up.
3. CSDAC detects the workload change and evaluates the user-created attribute filters.
4. Then CSDAC triggers a REST request to update the Workload_A dynamic attribute with
the 10.0.0.5 IP address of the new server.
5. The Firewall Management Center adds the new IP address to the dynamic object.
6. Immediately after the Workload_A object change, the FMC pushes an update to all the
managed firewalls using that object in deployed Access Control Policies. The dynamic
object update happens automatically and does not require a policy deployment.
7. The firewall updates the new IP address in the Snort identity memory and its policy to
allow the new server access.
The CSDAC connector is a software interface that interacts with a public or private cloud
provider to retrieve up-to-date network information, categories, and tags. CSDAC translates
information provided by the connectors to Dynamic Objects used in firewall access control
policies on the FMC. Architecturally the connectors are software plug-in modules installed in
CSDAC, which allows the straightforward addition of new connectors in future releases. Up to
this point, all examples of demonstrated how the firewall can be kept up to date with changes in
cloud or data center workloads, however, when deploying policy in OT environments, it is
important to have context for both ends of the connection. This is where the Cyber Vision
connector can be used.
Cyber Vision Connector
Cyber Vision and Firewall Management Center allow OT segmentation groups defined by the
OT team in Cyber Vision to be used for firewall enforcement. This level of automation helps
reduce manual workloads, streamlines your security management process by enabling IT/OT
collaboration, and helps ensure that your firewall policies remain in lockstep with your OT
industrial processes.
• Cisco Cyber Vision inventories industrial assets and maps their communication activities.
• Operations managers leverage the Cyber Vision maps to group assets into industrial
zones.
• Cisco FMC pulls asset group information from Cyber Vision using CSDAC.
• Each Cyber Vision group becomes a dynamic object in FMC, to which the IP addresses
of the assets in the group are mapped in real time.
• IT and OT managers work together to define access policies to be applied to each
dynamic object.
• Policies defined in FMC are enforced by Cisco Secure Firewalls.
66
Industrial Security 3.1 Design Guide
• Any modification to Cyber Vision groups is reflected in FMC dynamic objects in real
time and is automatically enforced by Cisco Secure Firewalls, without the need to
redeploy policies.
Figure 37 Cyber Vision integration to Cisco FMC via CSDAC
Using CSDAC, OT asset groups created in Cyber Vision are automatically made available to the
Firewall Management Center as dynamic objects. IP addresses of OT assets are continuously
imported and mapped to dynamic objects, helping ensure that objects are always aligned with the
industrial processes defined by the OT team.
The dynamic nature of this integration eliminates the need for manual policy deployment each
time there is a change to the Cyber Vision map. Adding an asset to a group in Cyber Vision or
moving it to another group will automatically modify the corresponding object in FMC. The
access policy configured for this object will apply to this asset in a matter of just a few seconds.
67
Industrial Security 3.1 Design Guide
environments. EVE works by fingerprinting the Client Hello packet in the TLS handshake. By
identifying specific application fingerprints in TLS session establishment, the system can
identify the client process and take appropriate action (allow/block).
Currently, EVE can identify over 5,000 client processes. Secure Firewall, maps a number of
these processes to Client Applications for use as criteria in Access Control rules. This gives the
system the ability to identify and control these applications without enabling TLS decryption.
This capability also extends beyond just identifying Firefox or a TOR browser. By using
fingerprints of known malicious processes, EVE technology can also be used to identify and stop
malware. The malware identification feature is currently under development, and Cisco is
constantly expanding the number of known fingerprints. As this capability matures, future
releases will use EVE to identify and block encrypted malicious traffic without outbound
decryption.
EVE brings another benefit, enhanced operating system identification. The system uses EVE to
improve data accuracy in the FMC host database built from passive host discovery. By
leveraging EVE fingerprint technology, the system uses encrypted host communications to
identify host operating systems better. This leads to better application and vulnerability data,
thereby improving the accuracy of features such as Snort Recommendations.
How does EVE work?
EVE inspects the Client Hello portion of the TLS handshake to identify client processes. The
Client Hello is the initial data packet sent to the server following the three-way handshake. As it
turns out, the Client Hello gives a good indication of the client process on the host. This
fingerprint, combined with other data such as destination IP address, provides the basis for EVE
application identification.
Figure 38 EVE communications
Through machine learning technology, Cisco processes over one billion TLS fingerprints and
over 10,000 malware samples daily to create and update EVE fingerprints. These updates are
then delivered to customers via vulnerability database (VDB) packages.
68
Industrial Security 3.1 Design Guide
69
Industrial Security 3.1 Design Guide
When using a Cisco Secure Firewall for protecting IDC flows in OT environments consider the
following:
• Start with visibility to map out the existing network topology and understand traffic flows
and potential bottlenecks. Firewalls cannot be deployed using trial and error policies
within an operational environment. Without understanding the flows that will cross an
enforcement point, it will lead to unexpected downtime.
• Choose an appropriate model keeping in mind the load on the network. Sizing of the
firewall is critical to avoid an increase in latency and jitter which is detrimental to OT
traffic. Ensure the firewall can handle the peak loads of the network traffic.
• Deploy access control policies in monitor mode before pushing them to production.
When using the Monitor action in an access control policy, policy matches will be
logged, but the system will continue to match traffic against additional rules to determine
whether to permit or deny it. This allows administrators to test their policies in
production without the risk of erroneous rules causing downtime.
• For increased flexibility and ease of use, use objects in access control policies which are
reusable configurations that associate a name with a value. For example, when
referencing a list of IP addresses in an access control policy (e.g. list of engineering
70
Industrial Security 3.1 Design Guide
workstations on the plant floor), manage the list with an access rule. That way, anytime
the engineering workstations are referenced in policy, they can be called by name. If IP
addresses where to be added or removed, by changing the object, all policies will remain
up to date.
• Use application control policies to provide read-only access to assets on the shop floor.
Introducing ML applications into OT networks will typically require some level of
visibility into control operations. To accomplish this MQTT brokers will be introduced to
the network, but those brokers often have OT protocol connectors to collect data before
publishing to a message bus. Use application control policies in the network to make sure
these brokers, or anything else in the IDC that requires access to data over insecure OT
protocols, is restricted to read-only rules.
• Consider using a virtual firewall to protect virtualized infrastructure in plant networks.
Organizations are looking to reduce their physical footprint, and the firewall is another
element of the network that can be digitized while offering the same level of protection
we are accustomed to with physical appliances.
• Implement fail-safe mechanisms to maintain operations if the firewall fails. Clustering
allows multiple Cisco Secure Firewalls to function as a single logical firewall. As of FTD
7.2, clustering is also supported on Cisco Secure Firewall Threat Defense virtual (FTDv).
71
Industrial Security 3.1 Design Guide
As mentioned earlier in the document, VLANs are a great way to separate devices into their own
network. The “problem” with VLAN segmentation, is that each segment is not hidden from the
others. Devices can simply communicate from one VLAN to the next through a routing point,
which in many operational networks is an L3 switch. Many deployment often rely on the L3
boundary to implement policies in the network, and while a switch based enforcement option
will be discussed later in the document (see Network Access Control with Identity Services
Engine), security architects should consider a firewall at this layer of the network.
By using a Cisco Secure Firewall as the point of routing in an OT network, the blast radius will
be reduced to an individual VLAN. This approach works well in greenfield environments, where
network architects have the luxury of implementing a network design from scratch, and the
VLAN structure can be well thought out. It is also useful for transitioning a plant with an
existing VLAN structure to a more secure state.
Using a firewall to terminate the VLANs does not have to be an all or nothing approach. For
many organizations, the operational network may share IT and OT resources and already using a
switch network to route between subnets. In this case, some of those VLANs could be migrated
to a firewall, where the gateway of the VLAN is removed from the distribution switch and
instead given to the firewall.
72
Industrial Security 3.1 Design Guide
In this design, non-OT (or traffic deemed less critical) would continue to use the switching
infrastructure to route between VLANs, and selective traffic would be subject to firewall
enforcement between networks.
73
Industrial Security 3.1 Design Guide
Using bridge groups, firewall ports can be grouped together to pass traffic between the
interfaces. Each directly-connected network must be on the same subnet. This deployment mode
should be considered for brownfield deployments, where the network is relatively flat, and
cannot be changed to accommodate VLAN separation. The distribution and core switches will
continue to be responsible for passing packets throughout the network, allowing firewall rules
can be added without any changes to the network.
Note: There will need to be some period of downtime, as cables will be unplugged to position a
firewall in between. To reduce unnecessary outages in production, it is recommended to
provision the firewall(s) in a lab environment before moving into the plant network.
When inserting a firewall transparently in an OT network, the firewall will interfere with traffic
communicating in the same network domain. OT protocols expect deterministic network latency
and jitter (for example, Profinet). When inserting a firewall device into an existing brownfield
environment, or even when planning a new deployment, it is of paramount importance to test the
74
Industrial Security 3.1 Design Guide
end-to-end latency in a staging or proof of concept (POC) area to ensure the firewall can handle
data with minimal latency to avoid disrupting real-time operations.
75
Industrial Security 3.1 Design Guide
Note: Not all flows depicted in this diagram were used in the creation of the design guide. An
example is demonstrated in the flow between the ISE PSN and the Cisco switching
infrastructure, with greyed out values indicating not in use. All ports are shown to provide clarity
when ISE is being used for more than what is portrayed in this guide.
76
Industrial Security 3.1 Design Guide
Packets entering the domain are tagged with an SGT containing the assigned security group
number of the source device. This packet classification is maintained along the data path within
the Cisco TrustSec domain for the purpose of applying security and other policy criteria. The
final Cisco TrustSec device in the TrustSec domain, enforces an access control policy based on
the security group of source device and the security group of the destination endpoint.
SGT Classification
SGT classification, or tagging, can either be dynamic, i.e., obtained from Cisco ISE when
network access attempts are made, or static.
Dynamic tagging can be deployed with 802.1X authentication, MAB, or web authentication. In
these access methods, Cisco ISE can push an SGT to the network access device to be inserted
into the client traffic. The SGT is applied as a permission in the ISE authorization policy rules.
Static tagging can be configured directly on the networking devices, or statically configured in
ISE to be downloaded by the network device. Examples of static tagging include a mapping on
an IP host or subnet to an SGT, or the mapping of a VLAN to an SGT.
77
Industrial Security 3.1 Design Guide
Generally, dynamic classification is done at the access switch and static classification is
performed at ingress to the TrustSec domain. The SGT tag that gets inserted into the traffic is
known as the source SGT, as it is the group that the source of the traffic belongs to. The
destination SGT is the group that is assigned to the intended destination of the traffic. The packet
does not contain the security group number of the destination device, but the enforcement point
must be aware of this classification.
SGT Transport
TrustSec has two methods to propagate an SGT, inline and SXP. Cisco TrustSec capable devices
have built-in hardware capabilities that can send and receive packets with SGT embedded in the
MAC (L2) layer. Inline tagging allows Ethernet interfaces on the device to be enabled for SGT
imposition so that the device can insert SGT in the packet to be carried to its next hop Ethernet
neighbor. The inline propagation is scalable, provides near line-rate performance and avoids
control plane overhead. It is recommended that all devices within a TrustSec domain have inline
tagging between them when supported.
SXP is used to propagate the SGTs across network devices and network segments that do not
have support for inline tagging. SXP is a protocol used to transport an endpoint SGT along with
the IP address from one SGT-aware network device to another. The data that SXP transports is
called as IP-SGT mapping. At a minimum, SXP will be enabled between ISE and all devices in a
TrustSec domain. However, there are also instances where access switches outside of the domain
will establish SXP connections to the first switch within the domain such as sharing the IP-SGT
information it stores locally.
78
Industrial Security 3.1 Design Guide
A network device performing the enforcement needs to determine the destination SGT as well as
the source for applying the SGACL. The destination SGT can be determined in one of the
following ways:
• From ISE using SXP
• SXP from other SGT aware switches (daisy chain SXP communication from access
switch to distribution)
• Look up SGT based on destination IP address / subnet
• Look up SGT based on destination physical egress port
SGT Enforcement
Using SGACLS, you can control access policies based on source and destination SGTs. Policy
enforcement within the Cisco TrustSec domain is represented by a permissions matrix, with
source security group numbers on one axis and destination security group numbers on the other
axis. Each cell in the body of the matrix can contain an ordered list of SGACLs. Each SGACL
specifies the permissions that should be applied to packets originating from the source security
group and destined for the destination security group.
It is important to note that the source and destinations are specified in the policy matrix and not
in the SGACL. Take, for example, the SGACL entry (ACE) ‘deny tcp dst eq 21’. This entry
specifies access from the source to the destination using TCP port 21 is denied. There is no
specification of the source or destination group tags in the SGACL. It is the application of the
SGACL in the permissions matrix that specifies the source and destination security groups. It is
also important to understand that the same SGACL can be applied to multiple source and
destination security group pairs within the permissions matrix.
79
Industrial Security 3.1 Design Guide
Using role-based permissions greatly reduces the size of ACLs and simplifies their maintenance.
With Cisco TrustSec, the number of ACEs configured is determined by the number of
permissions specified, resulting in a much smaller number of ACEs than when using traditional
IP ACLs. Also, only a single copy of an SGACL needs to reside in the TCAM of a device,
regardless of how many times the SGACL is used. The use of SGACLs in Cisco TrustSec
typically results in a more efficient use of TCAM resources compared with traditional ACLs.
Figure 48 TrustSec Enforcement at egress
By applying access control between pairs of security groups, Cisco TrustSec achieves role-based,
topology-independent access control within the network. Changes in network topology do not
normally require a change in the SGACL-based security policy. Some care must be taken to
ensure the proper classification of new network resources, but the access policy based on
business relevant security groups does not change. If the changes do require the creation of a
new security group, then the permissions matrix will increase in size by one row and one
column. Policy for the new cells is defined centrally in Cisco ISE and dynamically deployed to
all SGACL enforcement points.
When using SXP as propagation method from ISE to network devices it is recommended to use
SXP domains and domain filters to avoid sending all learned IP-SGT entries to all SXP listeners.
This approach will minimize the number of SGT entries on enforcement points and that will
ultimately impact the number of SGACLs that the device needs to download from ISE to protect
assets in attached cell/area zones.
SGT Example
Figure 49 shows an example of traffic entering and exiting a TrustSec domain.
• A PLC with IP address 10.0.1.4 is attempting to communicate outside of the Cell/Area
Zone and reach the MES server in the IDC.
• When the traffic hits the ingress of the TrustSec domain (the distribution switch), a static
tag is applied using the subnet mapping stored locally on the switch. An SGT 10 is
applied to the traffic.
80
Industrial Security 3.1 Design Guide
• The link between distribution and core is within the TrustSec domain and inline tagging
is enabled. There is no need for an SXP connection between distribution and core
because the SGT will remain in the MAC header when it reaches the ingress of the core.
• The core switch is the last point of the TrustSec domain, so the core switch will enforce
traffic on its egress port. To apply policy, the core switch must know the SGT of the
destination. The IP-SGT relationship is received from ISE via SXP.
• Knowing both the source (SGT 10) and destination (SGT 30) the core switch looks for
the corresponding entry in the policy matrix and finds there is a permit any SGACL
between the two groups. Traffic will proceed to the IDC.
Figure 49 TrustSec Classification, Transport & Enforcement Example
81
Industrial Security 3.1 Design Guide
The layer 3 boundary and gateway for devices is in the distribution switch as shown in figure 50.
It is recommended that security is first created at this layer of the network, to allow and deny
communications for inter-cell/area zone communication such as controller-to-controller
communication across zones or controller-to-site operations zone.
82
Industrial Security 3.1 Design Guide
Note: If using a firewall between the Core switch and the IDC, enforcement on the core switch
can be disabled, and the SGT can be used when creating firewall rules. If there is no firewall
between the core switch and the IDC, TrustSec enforcement at the core switch egress is
recommended.
83
Industrial Security 3.1 Design Guide
• In this design model, the default action is Deny IP and hence the required traffic should
be explicitly permitted with the use of SGACLs. This is generally used when the
customer has a fair understanding of the kind of traffic flows within their network. This
model requires a detailed study of the control plane traffic as well as it has the potential
to block ALL traffic, the moment it is enabled. Traffic within the cell will not cross a
TrustSec domain, so will be enabled by default in this model.
• Do not be redundant with policy permissions in the TrustSec matrix. Do not create rules
that would ultimately match the default behavior of the matrix. Leave the matrix blank
and allow traffic to match the default policy.
• Use SXP Domain filters to be specific about what entries are needed in each network
device. A network device needs only the entries of devices that enter or exit the TrustSec
domain through it.
• Create console access to all enforcement points on the network in case something goes
wrong and network connectivity to the devices are lost.
• When using a deny by default policy the following configurations are recommended for
survivability of the site if ISE becomes unavailable:
o Do not use an unknown SGT tag for switches. Using a dedicated SGT for
switches gives more visibility and helps to create SGACL specific for switch-
initiated traffic
o Add static IP-SGT mappings for critical services on core switches and
enforcement points. The idea is for Local IP-SGT mapping to be available on the
switches even if all ISE goes down
o Configure Fallback SGACL on enforcement points in case ISE nodes go down.
When ISE services are down, the SXP connection is lost and hence SGACLs and
IP SGT mapping will no longer be downloaded dynamically
Choosing how to tag and where to enforce will depend on how deep in the network you wish to
segment, and the network topology deployed in the Industrial Zone.
In a tree topology (or any topology where the layer 3 (L3) boundary is outside of the cell/area
zone), the distribution switch is used as the L3 gateway between cell/area zones. Each cell/area
zone could be a single subnet, or multiple subnets depending on the number of defined VLANs.
84
Industrial Security 3.1 Design Guide
The recommendation for this model is to both classify and enforce at the distribution switch.
When creating AA policies on access switches, do not include SGT assignment as part of the
policy. Devices will have unrestricted communication within their cell as no PEP exists within
the zone. On the distribution switch, define a static subnet to SGT relationship (see Appendix B
for switch configuration). When traffic is destined for a service outside the cell, all traffic
coming from a select subnet will be tagged on ingress depending on the mapping. Figure 52
provides an example, where one cell/area zone is tagged with SGT 10, and the other is tagged as
SGT 20.
85
Industrial Security 3.1 Design Guide
After cells have been defined, the next step is to define policy for communication that must leave
the zone. The least privilege approach to security will result in the Cell/Area zones being in a
deny by default state (such as, SGT 10 deny SGT 20) and only select services crossing the zone
boundaries. A common use case is interlocking PLCs, where a PLC in one part of the production
facility shares data with another for industrial automation purposes. In this case, PLCs that
require interzone communication should be classified with a different SGT to that of the zone it
physically resides in so an alternate policy can be enforced across the distribution switch.
There are two methods of assigning a unique SGT to the PLC. The first is a static host to SGT
configuration on ISE, where the host to SGT will take precedence over the subnet to SGT
relationship and shared via SXP. The second, is by using AA policies in ISE.
The profiling service in ISE identifies the devices that connect to the network. The endpoints are
profiled based on the endpoint profiling policies configured in ISE which can subsequently be
used in authorization policies and SGT assignment. However, ISE does not natively contain
profiling services for IACS devices. To gain visibility of IACS assets, this design uses Cisco
Cyber Vision, which provides the context of industrial operations and systems. Cisco Cyber
Vision shares endpoints and attributes with ISE using pxGrid.
86
Industrial Security 3.1 Design Guide
In Cyber Vision, when devices and components are placed inside groups, that group tag is shared
to ISE via pxGrid. Groups in Cyber Vision can be nested, such that you have a parent group and
a child group. It is recommended that a parent group is used to define the production process or
areas, such that the visibility groups match the segmentation groups and make logical sense
when visualizing network activity. Within the parent group, assign additional group tags to
provide context for profiling in ISE, such as an “interlock PLC” group to indicate the device
needs to communicate with other control devices in another parent group (cell/area zone for
example).
87
Industrial Security 3.1 Design Guide
After the group tag has been shared with ISE, a change of authorization (CoA) is sent to the
access switch that the PLC is connected to. This results in the PLC reauthenticating with ISE,
ultimately matching the new AA policy defined for interlocking PLCs.
Note: The CoA does not result in traffic interruption. Traffic will continue to flow as normal
until the authentication process is finished and a new SGT can be assigned.
88
Industrial Security 3.1 Design Guide
89
Industrial Security 3.1 Design Guide
Once zones have been defined, and traffic has been classified, the policy enforcement matrix can
be defined. Figure 56 shows an example policy enforcement matrix.
First, notice how the matrix is a combination of green and white squares. Up to this point we
have been using green and red shades to differentiate an allow rule vs. a deny rule. However, not
all squares in the matrix need a value. To save on TCAM space in the switches, only define a
rule if it deviates from the default. Since this design uses a default deny rule, any SGT
combination that is required to be denied will get no specific policy assigned to it. The decision
will fall back to a default rule, which provides the same outcome but with less memory
consumption.
90
Industrial Security 3.1 Design Guide
Note: It is recommended to move to a deny by default state only when you are sure that all
policies have been accounted for. Policy should be loosely defined to begin with, and the
network should be in an allow by default state while gaining visibility with Cyber Vision. Once
all communication patterns are understood, enforcement can be fine-tuned. Additionally, when
using the Cisco Catalyst 9300, SGACLs can be deployed in monitor mode, so events are created,
but no traffic is blocked. For more information see Configuring SGACL Monitor Mode.
It is important to re-iterate the policy enforcement point used in this example is the distribution
switch. Let us take Figure 57 as an example, where 10.0.A.0/24 is assigned the Zone1 tag (4001)
from our policy matrix. In our matrix, Zone 1 to Zone 1 communication is denied (default
policy). Since the enforcement point is the distribution switch stack, this rule would only take
effect if traffic were to leave the zone, and then re-enter the zone. This rule will not stop traffic
from flowing within the cell. However, if we changed our enforcement point to the next hop
down (Catalyst IE3400), any traffic crossing this boundary would be denied and explicit rules
would be required.
Figure 57 Policy Enforcement at Distribution Egress to Cell/Area Zone
When creating the policy matrix, only think about flows that cross TrustSec domains. If a zone
does not enter the TrustSec domain, nor does it intend to, it is okay to deny traffic of the same
SGT. Use the learnings from the previous step in the journey with Cisco Cyber Vision to
91
Industrial Security 3.1 Design Guide
understand traffic that flows across L3 boundaries and use that information to inform policy
creation.
Note: While discussed as use cases at the start of this guide, safety networks are air-gapped in
the validation lab so were not included in the policy matrix.
92
Industrial Security 3.1 Design Guide
Another consideration in larger networks is the number of SXP connections. The maximum
number of ISE SXP peers per PSN is 200. When doing dynamic classification, the IP-SGT
binding must be shared from the access switch to the TrustSec domain. One method of doing this
is for the access switch to create an SXP session with ISE, and then devices in the TrustSec
domain can learn the bindings from ISE. However, in large networks the number of SXP
connections may become too much for the ISE nodes to handle.
The recommendation is to daisy chain SXP connections between the access layer and the first
layer of the TrustSec domain (in this architecture, the distribution switch). This takes the load off
ISE, while still providing the IP-SGT binding. This requires extra switch configuration; though,
this could be automated by Cisco Catalyst Center.
93
Industrial Security 3.1 Design Guide
Figure 59 SXP Daisy Chain starting from Access Switch up to Distribution Switch
94
Industrial Security 3.1 Design Guide
To ensure traffic is not blocked by policy, make sure that each such ring has its own unique SGT
and does not share a tag with any other zone in the network as per the design recommendation
for large networks.
NAT Considerations
When doing NAT in the cell/area zone, the IP address of the device when connected will be
different to that of the IP the distribution switch will see for tagging. This poses a problem for
both static SGT assignment and SGT classification through AA policies. When a device
authenticates via ISE, the source IP address is known, and the SGT is assigned to that IP address.
However, that IP address will never be seen by the distribution switch and the SGT will never be
assigned.
95
Industrial Security 3.1 Design Guide
The recommendation in this case is to enable SGT classification on the IE3400 and enable inline
tagging between the NAT boundary and the distribution switch. The SGT is not stripped from
the traffic during NAT, and since a tag will already exist when entering the distribution switch, it
will not be overwritten by the subnet classification.
In addition to classifying on the IE3400, enforcement is also required. For enforcement, the
switch needs to know both the source and destination SGT. When NAT occurs, the distribution
switch does not hold the relationship of the true IP address and therefore cannot determine the
correct destination SGT when traffic is destined for devices behind the NAT boundary. When
enabling enforcement on the NAT boundary, the switch will be able to correctly map the
destination SGT and enforce policy as intended.
Note: When using Cyber Vision to assign groups to devices behind the NAT boundary, it is
important that you choose the correct device. Depending on sensor placement, Cyber Vision may
show two instances of a component when NAT occurs. One will be the instance before the NAT,
the second will be after. ISE will only understand the IP address used when authenticating to the
network so that is the device in Cyber Vision that should have a group assigned to it for SGT
assignment.
96
Industrial Security 3.1 Design Guide
domain using SXP Domain filters. As a result, any dynamically assigned SGTs can be
communicated to the enforcement point that protects assets on that subnet, rather than every
switch requiring to store all entries.
Figure 62 SXP Domain Filtering in the TrustSec Domain
97
Industrial Security 3.1 Design Guide
Consider the following when implementing static port assignment on the access switches:
• Static SGT configuration of the physical switch port is only supported on IE3400 and
IE9300
• Access switches become part of the TrustSec domain
• SXP is required to propagate the static SGT to the enforcement point
• Switch Integrated Security Features (SISF) needs to be enabled on the access port for the
switch to incorporate the static SGT on the IP to SGT bindings
• Do not assign SGTs to any of the physical switch ports that may lead to privileged access
of network resources as a local operator could inadvertently open an attack vector by
connecting devices to a domain with more freedom simply because it caused the
application to work
98
Industrial Security 3.1 Design Guide
802.1X provides a way to link a username with an IP address, MAC address, switch, and port. It
also enables you to leverage an authenticated identity to dynamically deliver policy. In ISE, users
authenticating via 802.1X can match a Dot1X Authentication rule and be assigned an SGT based
on the user group the credentials belong to. A key recommendation is to have all users
authenticate to ISE via 802.1X to receive their SGT tag for network entitlements.
It is common for Microsoft Active Directory (AD) to be used as the identity provider (IdP) in
industrial networks. When using AD for user authentication, user groups will have already been
defined. There may be groups created for administrators, technicians, contractors, etc., all with
their own access rights when they connect to the network. Cisco ISE leverages AD for multiple
methods of authentication, including 802.1X. When connecting ISE to an AD domain, the user
groups configured in AD are imported and can be used when creating authentication and
authorization policies.
The design recommendation is to use Microsoft AD for user group definitions and maintenance,
and then use those AD defined groups within Dot1X authentication policies to assign a group
tag. Figure 64 shows an example of this, where the Employee group in AD is assigned the
Employees group tag. This tag can be subsequently used in the TrustSec policy matrix to
determine which network zones the employees have access to.
Figure 64 ISE AA Policy with Active Directory User Group
99
Industrial Security 3.1 Design Guide
Reference Architecture
This design guide is written to be vertical agnostic, providing design guidance for securing
critical infrastructure of all kinds across the WAN. To accomplish this, a generic architecture
diagram will be used to capture the architectural concepts found in industries such as utilities
(see figure below) and transportation. Details of these architectures can be found at
cisco.com/go/iotcvd.
100
Industrial Security 3.1 Design Guide
In this design, the reference architecture for the field network will be split into four zones, with
“Zone 1” depicting the most critical part of the network. For example, Zone 1 could be the
electronic security perimeter in a transmission substation, or the traffic controller in an
intersection. The other three zones will be of lesser importance, and may represent things such as
physical security, users or telemetry networks.
101
Industrial Security 3.1 Design Guide
The field networks are connected over a WAN in a hub and spoke architecture to a control
center. Each site may also have different security requirements. The primary site is depicted with
four zones, but smaller spoke sites may exist in a real world deployment offering less functional
zones. The transport details of this are not in scope for this design guide (i.e. cellular, MPLS,
etc.). As will be mentioned later in the document, the design guide will primarily focus on SD-
WAN design guidance, which is transport agnostic.
Lastly, the IT/OT boundary is located at the hub site. If this architecture was to be referenced
using the Purdue model, the field sites would be level 0-2 and the control center would be level 3
and 3.5, which represent the DMZ between IT and OT networks.
102
Industrial Security 3.1 Design Guide
103
Industrial Security 3.1 Design Guide
Use Cases
Common use cases and personas that must be secure in an industrial network include:
• Deny by default on traffic leaving the field network. As critical infrastructure gets
connected to an IP network, only trusted and verified traffic should be enabled to cross
the WAN.
Figure 68 Deny by default firewall at the field edge
104
Industrial Security 3.1 Design Guide
• Applications hosted in a centralised data center accessing field assets. The industrial
data center for field assets typical resides in a central hub location and accesses field
assets across a WAN network. Operators need a secure way to control these flows so only
trusted servers have access to the critical assets.
Figure 69 Hub location has access to assets in the field
105
Industrial Security 3.1 Design Guide
• Read only access across the WAN for SCADA systems. Not all servers need control
over assets in the field. Some SCADA or IoT systems need read only access to the
controllers to gain telemetry information and by reducing their privilege to read only
access it reduces risk of an attack due to the server being compromised.
Figure 70 SCADA system with read only access to assets in the field network
106
Industrial Security 3.1 Design Guide
• Segmentation of assets at the site. Cabinets in the field are often space constrained and
run many different services, from traffic controllers, to cameras, to badge readers. If one
domain was to be compromised in an attack we must ensure the others remain
operational.
Figure 71 Segmentation in the field site continued across the WAN
107
Industrial Security 3.1 Design Guide
• Remote Access. Enabling remote access at the field could save hours, maybe even days
of a travel time for maintenance operators depending on the vertical. Offshore windfarms
is a good example of this. Downtime is costly, and the quicker a resolution can be
implemented the better. Securing remote access has a dedicated chapter in this design
guide.
Figure 72 Remote access to field assets
108
Industrial Security 3.1 Design Guide
just as important as the security appliances deployed in the network. Quality of Service (QoS)
ensures that critical traffic always has priority when the network is in a degraded state, lossless
redundancy protocols ensure that critical traffic meets latency metrics when network paths go
down, management plane security ensures only trusted users get access to the network
infrastructure and cannot be taken down by malicious actors, and plug and play ensures that new
network devices are onboarded with a secure configuration out of the box. While all these
features are typically considered part of networking, it is the combination of networking and
security that results in a cyber resilient architecture.
Figure 73 Best of OT networking and OT security with Cisco Industrial Router
Portfolio
Cisco® Catalyst Industrial Routers offer unconditional connectivity for all your remote assets.
They can withstand extreme temperatures, humidity, and dust. They offer a variety of WAN
connectivity options, including 5G/ LTE cellular, MPLS, Ethernet, and fiber, through pluggable
interface modules that can be easily replaced when needs or technologies evolve. In addition,
Cisco Catalyst SD-WAN simplifies deploying and managing a large and complex WAN
infrastructure from a central location.
109
Industrial Security 3.1 Design Guide
Catalyst industrial routers also come with comprehensive Next-Generation Firewall (NGFW)
features and many more cybersecurity capabilities to block modern threats:
● Standard firewall capabilities like stateful inspection,
● Application awareness and control to block application-layer attacks,
● Integrated intrusion prevention (IDS/IPS),
● Continuously up-to-date threat intelligence,
● Malware protection and sandboxing, URL filtering,
● Integration with a Secure Services Edge (SSE).
Building a modern industrial WAN infrastructure requires advanced routing capabilities such as
only Cisco can offer. Having state-of-the-art cybersecurity features built into your industrial
routers not only is vital to keep the organization safe, but it is also key to simplify and scale
deployment and management tasks. Converging industrial networking and cybersecurity helps
ensure unified security policies are enforced across sites, eliminating gaps in defenses due to cost
and complexity of integrating many point products together.
Management Options
The primary management option used in this design guide is Cisco Catalyst SD-WAN Manager.
Cisco IOS-XE, can be deployed in two operational modes: Autonomous and Controller modes.
For the purpose of this design guide, Autonomous mode refers to the Cisco Industrial Router
being managed standalone (that is, not using Cisco Catalyst SD-WAN Manager). Some
administrators may decide to manage the router using the CLI or the web interface, or through
Ansible playbook.
Controller mode is when the Cisco Industrial Router is part of the Cisco Catalyst SD-WAN
solution. This is the recommended deployment mode and while this design guide will provide a
110
Industrial Security 3.1 Design Guide
feature comparison between the two modes, the primary design guidance assumes the use of
SD-WAN.
Cisco Catalyst SD-WAN Manager can also be deployed to manage Cisco Catalyst routers in
Autonomous mode. This is referred to as software defined routing (SD-Routing), where Cisco
Catalyst SD-WAN Manager provides configuration management without the controller
infrastructure for WAN orchestration.
Application Firewall
Cisco Industrial Routers offer a stateful firewall with application recognition that organizes the
network into zones and enables policy creation for traffic flowing between those zones. Traffic
can be evaluated based on:
• Physical and virtual interfaces
• Subnet / IP address
• VLAN
• UDP / TCP port
• Objects
• User ID via ISE
• FQDN
• SGT
• Application
Using network-based application recognition version 2 (NBAR2), Cisco Industrial Routers can
examine the data portion of packets, enabling it to identify applications regardless of the port
numbers they use. Nevertheless, OT protocols typically use a static port mapping when
communicating on the network. For example:
• Modbus: 502
• DNP3: 20000
• Ethernet/IP: 44818
• OPC UA: 4840
• MMS: 102
In instanced where NBAR2 may not recognise the protocol by name, security administrators can
choose to open/close ports to achieve the same level of control. Alternatively, custom application
can be created. IP address and port-based custom protocol enables NBAR2 to recognise traffic
based on IP addresses and port numbers and to associate an application ID to that traffic. This is
achieved using the ip nbar custom transport command. For example:
ip nbar custom OPCUA transport tcp port 4840
This command would create a custom protocol detector called OPCUA that will look for TCP
packets that have a destination or source port of 4840.
111
Industrial Security 3.1 Design Guide
Note: NBAR2 is not only used for creating firewall rules but also can be used for application
aware routing and QoS in an SD-WAN deployment.
Network Segmentation
Beyond traditional packet filtering techniques, critical infrastructure can be further protected
from noncritical assets that share the same physical infrastructure by segmenting traffic flows
into separated virtual networks. Virtual Routing and Forwarding (VRF) allows a Cisco industrial
router to run more than one routing table simultaneously. The routing tables are completely
independent and fully segmented by default. For traffic originating in one domain to reach
another domain, it must be explicitly routed through a firewall, reducing the possibility that an
administrative error will lead to a wide-open network. The figure below shows an example of a
traffic cabinet where this requirement is important. If one domain was to be compromised, the
others should not be affected.
112
Industrial Security 3.1 Design Guide
In the context of Cisco Catalyst SD-WAN, the term VPN and VRF are used interchangeably.
This is because Cisco Catalyst SD-WAN routers, such as the Cisco Industrial Routers, use VRFs
for segmentation and network isolation and the Service VPN profile is used to configure them.
There are three different types of VPNs in Cisco Catalyst SD-WAN:
• Transport VPN (VPN 0) carries control traffic via the configured WAN transport
interfaces. Initially. VPN 0 contains all device interfaces except for the management
interface, and all interfaces are disabled. VPN 0 is synonymous with the global routing
table.
• Management VPN (VPN 512) carries out-of-band network management traffic among
the Cisco IOS XE Catalyst SD-WAN devices in the overlay network. The interface used
for management traffic resides in VPN 512.
• Service VPNs (VPN 1-511, 513-65530) are used to carry device traffic across the
overlay.
By default, no traffic will cross service VPNs, but if there is reason to do so, all traffic will be
subjected to firewall rules.
Note: If using the Cisco Industrial Router in autonomous mode, it is still recommended to deploy
a segmentation architecture. VRF-lite can still be used, but it may be more manageable to use a
combination of VLANs and TrustSec.
113
Industrial Security 3.1 Design Guide
Port Security
The port security feature in IOS-XE enables administrators to restrict input to an interface by
limiting and identifying MAC addresses of the endpoints allowed to access a port. When using
port security, the port does not forward packets with source addresses outside the group of
defined addresses. If you limit the number of secure MAC addresses to one and assign a single
secure MAC address, the endpoint attached to that port is the only device that will have access to
that port. For more information see Port Security.
TrustSec
As detailed in a previous chapter, TrustSec defines policies using logical device groupings
known as SGTs. The SGT is a single label indicating the privileges of the source within the
entire network. SGTs are an important technology when deploying security across an expansive
architecture. As will be discussed further in the defense-in-depth section, most use cases will
traverse multiple policy enforcement points when traversing the network, and as a security
architect, we need to co-ordinate both policy creation and log collection to understand the traffic
114
Industrial Security 3.1 Design Guide
flows throughout our networks. SGTs provide a common identity that all enforcement points can
use. Rather than relying on IP addresses, which may change depending on what part of the
network you’re on, and how many times you did NAT, an SGT provides business context to that
device. I need to create policies for my employee managed device (for example, SGT 10) at a
roadside cabinet, at the branch, at the data center. I need to create a policy for a traffic signal
controller (for example, SGT 20) at the cabinet, across the WAN, in the control center, and
across the data center. Regardless of the IP address, policy can be consistent across the
architecture, and it becomes much easier to correlate log information across the entire network.
Figure 76 Importance of TrustSec
TrustSec has three main functions; classification, propagation, enforcement. The level of support
for each function with the Cisco Industrial Router platform can be found below.
TrustSec Classification
Subnet to SGT mapping binds an SGT to all host addresses of a specified subnet. Once this
mapping is implemented, Cisco TrustSec imposes the SGT on any incoming packet that has a
source IP address which belongs to the specified subnet. To create a subnet to SGT map (or an IP
to SGT map), use the following configuration:
cts role-based sgt-map <ip-address> sgt <number>
Interface to SGT mapping binds all traffic on a Layer 3 ingress interface to an SGT. Once this
mapping is implemented, Cisco TrustSec can use the SGT to segregate traffic from various
logical Layer 3 ingress interfaces; routed Ethernet interfaces, 802.1Q sub interfaces, tunnels. To
create an interface to SGT map, use the following configuration:
interface <type slot/port>
cts role-based sgt-map sgt <number>
Subnet to SGT, or Interface to SGT are examples of static mappings that don’t consider device
context. Dynamic mapping can be implemented during authentication to ISE. When doing an
802.1X or MAB authentication request on a Cisco Industrial Router, Cisco ISE can apply an
SGT dynamically based on device profiling. Design guidance will be discussed in a later section.
TrustSec Propagation
Inline tagging, when the SGT is embedded in the Ethernet frame header, is supported on the
layer 3 interfaces of all Cisco Industrial Routers.
Figure 77 Inline tagging across IPSec tunnels
115
Industrial Security 3.1 Design Guide
Inline tagging provides the capability to tag packets locally at one site, and carry that across the
WAN to be enforced at another. By extending inline tagging on the layer 3 ports, TrustSec can
be distributed across both routers and switches to extend segmentation capabilities beyond the
reach of the router. However, inline tagging is not supported on layer 2 interfaces, for example,
the LAN ports of an IR1101.
116
Industrial Security 3.1 Design Guide
To overcome this, all Cisco Industrial Routers support SXP (both speaker and listener), which is
the protocol used to exchanged IP to SGT bindings across network links that do not support
inline tagging.
Figure 79 Using SXP to propagate IP to SGT bindings
After SXP has populated the table, SGT propagation across the WAN can be done as per
previous section. This will also enable SGTs that have come from the WAN to be transferred
across to enforcement points in the LAN.
TrustSec Enforcement
An SGT can be used in source or destination data prefixes in a firewall policy across all Cisco
Industrial Routers. Using the SGT instead of other attributes allows administrators to better
117
Industrial Security 3.1 Design Guide
understand policies and logs in an end-to-end security system, as while attributes such IP address
and VLAN may change throughout the life of a packet, the SGT should remain the same.
Device Support
The table below represents each feature per platform in the Cisco Industrial Routers.
Table 3 TrustSec support in Industrial Router portfolio
118
Industrial Security 3.1 Design Guide
A Smurf attack is an example of a distributed denial of service (DDoS) that also uses ICMP, but
in a different way. The attacker sends ICMP Echo Request packets with a spoofed source IP
address, set to the IP address of the target victim. The ICMP packets are sent to the broadcast
network, but since the source IP has been spoofed, the target now receives a large volume of
ICMP Echo Replies from multiple devices, is overwhelmed by the flood of traffic, leading to
network congestion.
To protect against DoS attacks it is recommended to protect both the data plane and the control
plane packets.
Quality of Service
Quality of Service (QoS) refers to a set of technologies and techniques used to manage and
prioritise network traffic to ensure the performance of critical applications, minimize latency,
reduce packet loss, and provide a predictable and reliable network experience. QoS is
particularly important in environments where bandwidth is limited and where critical
infrastructure applications have sensitivities to latency and dropped packets.
Traditional QoS does have its limitations because it can’t predict the changing bandwidth on the
link. Adaptive QoS, the shapers at the edge can adapt to the available WAN bandwidth,
including across long term evolution (LTE).
For more information on adaptive QoS in Cisco SD-WAN see Adaptive QoS.
119
Industrial Security 3.1 Design Guide
NGFW Add-On
To expand upon the stateful firewall capabilities within the zone based firewall, the Cisco
IR1835 and IR8340, due to the expanded memory, can host an NGFW add-on within the IOx
infrastructure for advanced threat protection embedded in the router. The NGFW addon, often
referred to as Unified Threat Defense (UTD), brings the following capabilities:
• Snort IDS/IPS detects and blocks malicious activities by analyzing network traffic
patterns and identifying known threats
• Advanced Malware Protection (AMP) offers file analysis and sandboxing to detect, block
and remediate malware across the network
• URL filtering to control access to websites based on categories, reputation, and custom
policies to prevent exposure to malicious sites
Note: File detection and sandboxing relies on cloud connectivity.
Snort IDS/IPS
Snort is the network intrusion detection and prevention system used by Cisco across many
products within its security portfolio. Snort has been covered extensively in this guide in a
previous section when detailing design guidance on the Cisco Secure Firewall. All of the same
features exist on the Industrial Routers including the SCADA pre-processors for creating OT
protocol rule violations. An example Snort configuration for Cisco Industrial Routers is in
Apperdix C.
Figure 80 SCADA preprocessors in Snort 3
Note: SnortML is unique to the Cisco Secure Firewall and is not yet available on the Cisco
Industrial Router.
120
Industrial Security 3.1 Design Guide
URL Filtering
Use cases such as predictive maintenance or IoT applications often require connections to cloud
resources, increasing the attack surface. To enable such innovation, URL filtering in the Cisco
industrial routers allows control access to trusted cloud resources by configuring domain-based
or URL-based policies. Although we recommend that access to cloud and internet resources be
disabled by default, and that you explicitly allow only trusted domains, security administrators
have peace of mind that the network is protected by reputation-based filtering. Each URL has a
web reputation score associated with it to help ensure that users or applications are not
communicating with high-risk parts of the internet.
Files with an unknown disposition can be sent to the Cisco Secure Malware Analytics cloud for
further analysis within a sandbox. During detonation, the sandbox captures artifacts and observes
the behavior of the file, then gives the file an overall score of abnormal behaviors. Based on the
observations and score, Secure Malware Analytics will define the file as clean or malicious so
your Cisco industrial router will let it pass or block it.
121
Industrial Security 3.1 Design Guide
Supported Platforms
All Cisco Catalyst industrial routers have security built in. Cisco IOS® XE, the software that
powers all Cisco networking infrastructure, provides stateful packet inspection, application
visibility and control, VPN, segmentation, DoS mitigation, and FQDN matching.
The remaining features come from the NGFW add-on that can be deployed in devices with 8 GB
of memory. The NGFW add-on for industrial routers provides Snort IDS/IPS, reputation-based
URL filtering, and malware protection.
Table 4 Security capabilities per routing platform
122
Industrial Security 3.1 Design Guide
Security administrators create a set of policies between zone pairs on the Cisco Industrial Router,
and traffic matching options like objects, subnets, applications and protocols are available to
create allow, deny or inspect rules. When using the inspect action, any traffic that matches this
policy will be sent the NGFW addon for advanced threat inspection. If using Catalyst SD-WAN
Manager, all of the features of the NGFW addon will be available. However, if deploying the
Cisco Industrial Router without it, there are limitations:
• Snort IDS/IPS can still be used, but there is no support for loading a custom rules file.
• Advanced Malware Protection is not supported
• Web filtering is fully supported
TLS Decryption
The majority of Internet traffic is encrypted, which may lead to malware remaining hidden and a
lack of control over security. The TLS proxy in a Cisco IR8340 (decryption not supported on
other devices) acts as a man-in-the-middle to decrypt encrypted TLS traffic traveling across
WAN and to inspect the contents for malicious activity. The data is re-encrypted post inspection
before being sent to its final destination.
123
Industrial Security 3.1 Design Guide
leverage Cisco Secure Access or any third-party Security Service Edge (SSE) via IPsec tunnels
to centralize policy enforcement across sites or toward the cloud.
Figure 83 SASE for distributed field networks
With Cisco Secure Access, network administrators enable segmentation and prioritization to the
most critical traffic on the network, while security administrators maintain granular control of
data that comes into and out of each remote site with a single set of policies, so that only known,
trusted traffic flows throughout the infrastructure.
124
Industrial Security 3.1 Design Guide
Understanding defense-in-depth
NIST special publication 800-82, Guide to OT Security, describes a defense-in-depth strategy as
a multifaceted strategy to establish variable barriers across multiple layers and dimensions of an
organization. It is considered a best practice across numerous standards and regulatory
frameworks, as the basic concept is to prevent single points of failure in cybersecurity defences
and to assume no single origin of threats.
What defense-in-depth is not, is implementing the same set of security controls across multiple
parts of the network. For example, a firewall is an important tool used in cybersecurity
architectures to control traffic across boundary points of the network. However, defense-in-depth
does not mean multiple layers of firewalling. If an attacker can bypass one firewall, then maybe
they can also bypass the next.
125
Industrial Security 3.1 Design Guide
Organizations should implement appropriate technology for the use cases in which they need to
protect. When implementing cyber security at the field edge, administrators should ask
themselves;
• Is this traffic going direct to the Internet, or should those policies instead be deployed at
the Internet breakout?
• Is TLS decryption required at every hop in the network, or should computationally
expensive actions be reserved at strategic points in the network?
126
Industrial Security 3.1 Design Guide
• Is IPS required across all boundaries, subjecting the traffic to the same set of signatures
that have already been bypassed?
This design guide will not have the scope to cover all possible use cases that industry will face,
but rather act as a guiding set of principles to build a cyber security architecture for protecting
critical infrastructure. When designing a defense in depth architecture, consider the following:
• Not all security controls need to be enabled at every hop in the network. The router
deployed at the edge of the field network may seem like the most important box in the
cyber security strategy, but there are often multiple enforcement points between field
assets and their intended destinations. Use core security practices like AAA, port
security, segmentation and basic firewalling at the edge to ensure only trusted devices
cross the boundary using trusted ports, and supplement that with advanced inspection at
the hub location. It is much easier to manage, rules are likely kept up to date and as
technology advances it is easier to swap out central firewalls with the latest and greatest
security technology than to roll out hardware to thousands of micro-sites.
• Try not to duplicate the same policies across multiple hops. This is easier said than done,
as firewalls will often have conflicting rules, but reducing the number of overlapping
rules will help maintain policies in the long term. Additionally, computationally
expensive actions like TLS decryption only need to be done once. It is important this is
done at the Internet boundary, so make that a mandatory capability in your architecture.
However, most OT devices don’t communicate with the Internet, so before deploying
TLS decryption at the edge, ask yourself if it can be done higher up the chain where a
more powerful box can be used. Rugged devices are smaller and lack fans, so making
TLS decryption a priority at the edge is an expensive design decision.
• Connect logs to a security information and event management (SIEM) product. A SIEM
is a solution that collects, analyzes, and responds to security data from various data
sources. It is important that logs are correlated across all the policy enforcement points
that critical infrastructure is subject to. More information can be found in Cross-Domain
Detection, Investigation and Response.
127
Industrial Security 3.1 Design Guide
restricted on the sites they can visit. Essentially, the default rule of the firewall is to allow all
traffic to leave the enterprise, but with exceptions and threat intelligence providing protections.
The industrial edge is not where these innovations are required. Building on the principles of
defense-in-depth, it is advised to apply the appropriate policy at different levels of the network.
The most important design decision to make at the industrial edge is to follow the principles of
least privilege. Least privilege means that users and assets that cross the network boundary will
only be able to do so if it is necessary. This concept is a key philosophy in NERC CIP-005-7,
where all inbound and outbound access permissions across the critical substation boundary must
be documented with a reason for granting access and all other access is denied by default.
When implementing firewall policies at the industrial edge, consider the following:
• Identity which devices have permission to cross the boundary, deny the rest. Advanced
security capabilities are not required to make these decisions, a simple deny rule will stop
any traffic coming from devices who have not been explicitly given permission to cross.
• For devices that can cross the firewall, limit the ports and applications that can be used.
Video cameras need to stream to a server? Open the appropriate ports, block the rest so
the web browser cannot be access. Users need to SSH to a server? Make sure only trusted
devices can initiate the connection. A SCADA system needs to read data from a
controller using Modbus? Make sure only that trusted server can communicate over
Modbus, and use application policies to make it read only. By only opening the specific
ports that are needed between known devices will make it very difficult for an attacker to
compromise the network as they are limited to what they can do with legitimate traffic
flows.
128
Industrial Security 3.1 Design Guide
• If intrusion detection is needed east/west (i.e. between devices at the site), then consider
deploying Snort on either the IR1835 or the IR8340, configuring IDS/IPS policies in
addition to the firewall rules deployed at the site.
• Use custom Snort signatures to block specific commands on OT protocols. For example,
allowing DNP3 in the firewall rules, but denying all function codes other than the read
commands in the IPS rules.
• Alternatively (or additionally), deploy a network visibility tool such as Cisco Cyber
Vision to do out of band inspection. Cisco Cyber Vision also has the capability to run
Snort as a detection engine and will give you much more visibility into the industrial
network than a traditional IDS/IPS system will. If IPS is not a requirement for east/west
traffic, it is recommended to deploy Cyber Vision instead of Snort on the industrial
router.
Cloud Connectivity
With the rise in artificial intelligence and the goal to digitise a lot of our operations, cloud
connectivity is becoming more accepted in industrial networks. Saying that, the demarcation
point between field assets and the internet should not be the industrial router. Following the
theme from previous guidance, the organization should have a defined Internet boundary, a
central choke point where policy is defined and kept up to date. Generally, the IT/OT boundary
is at the control center, and for Internet connectivity, the control center will leverage the IT
network. When connecting field assets to cloud resources, consider the following:
• While Cisco Industrial Routers have the capability to do URL filtering and scan
malicious files, they should not be the devices used for Internet connectivity. It is
recommended that Internet traffic is backhauled to a central location and all traffic is
subject to policies that are maintained by the security team.
• If direct Internet access (DIA) is required, consider a security service edge (SSE) such as
Cisco Secure Access to protect users and devices when accessing cloud resources. This
model may already be used by the enterprise, so rather than backhauling traffic to a hub
only to be subject to policies from the SSE, an IPsec tunnel can be created from the Cisco
Industrial Router.
• For minor use cases, such as providing a guest network, and an SSE does not exist, using
the inbuilt web filtering is advised. In this case, segmentation is highly recommended.
129
Industrial Security 3.1 Design Guide
130
Industrial Security 3.1 Design Guide
For a single use case, traffic originating from the field and reaching the data center has crossed
six policy decision points in the network. As a security administrator this can be difficult to keep
track of. To alleviate some of the complexity, use a common identity. By using SGTs, all policy
decision points can use the same identifier when applying policy to traffic. This helps correlate
logs and troubleshoot policies end to end.
In addition to the design guidance already discussed in ISE / SGT Design Considerations,
consider the following at the field network:
131
Industrial Security 3.1 Design Guide
• Build a dedicated management network between the network infrastructure and ISE. In
an SD-WAN deployment, this would be a dedicated service VPN. See ISE Components /
Personas for the communication details between network infrastructure and ISE.
• Use static classification as a starting point for segmentation. Not all endpoints connected
to the network need to be dynamically profiled to receive policy. If there is a subnet
dedicated to a traffic controllers, statically assign the traffic controller SGT to that subnet.
• Combine TrustSec with port security. Building on the static classification workflow, if
there is a concern of rogue devices connecting to the network, such as a malicious device
joining the traffic controller subnet, use port security to limit the connections to only
known devices. There are two approaches here. The first is to only allow trusted MAC
addresses to join the network. In this approach, a MAC address must be registered to ISE
before being authorized on the network. The second approach is to limit the port to a
single MAC address. This is a more dynamic approach, where the first MAC address to
connect to the port is now the only MAC address that can use that port until a network
administrator intervenes.
• While the previous step reduces the risk, the next design choice may be to dynamically
profile the endpoint to verify its trustworthiness. There is an advanced scenario where an
attacker could mimic the MAC address of a trusted device. To overcome this, use
endpoint profiling in ISE. When using MAB or 802.1x to authenticate to the network,
ISE can assign an SGT based on the endpoint profile. This does not need to be a one-time
operation. Every time ISE learns something new about the device, a decision can be made
to re-authenticate the asset. This is known as change of authorization (CoA). Use Cyber
Vision to constantly monitor the network and feed device properties to ISE. If a device
property results in an endpoint profile that does not belong to the edge network, ISE can
automatically remove it from the network. See ISE / SGT Design Considerations for
more information on the integration between Cyber Vision and ISE.
• Use SGTs in the firewall rules. There may be a misconception that all TrustSec policies
are generated from ISE. While ISE does push policy to the network infrastructure, it does
so through the switches. ISE creates SGACLs, which are stateless packet filters for
segmentation in switch networks. Stateful packet inspection, and the use of NGFW
control options are out of scope of ISE. The policy engine for the routers is the firewall,
and just like how an SGT can be used in the Cisco Secure Firewall, or other third party
firewalls, the SGT can, and should, be used as an identifier for policy creation.
132
Industrial Security 3.1 Design Guide
Figure 86: A single Cisco Industrial Router can only host one application
Problem statement: I need a firewall to protect my critical assets, and I need IDS/IPS
capabilities.
In this scenario the NGFW add-on for either the IR1835 or the IR8340 can be used. If only one
application is required, the solution can be quite simple. Nevertheless, follow the design
description in this guide to understand if IDS/IPS is necessary at the edge. It is important to note
that IOS-XE contains the firewall for Cisco Industrial Routers, the NGFW addon is just an
advanced threat detection module.
133
Industrial Security 3.1 Design Guide
Problem statement: I need a firewall to protect my critical assets, I need IDS/IPS capabilities,
but I also want Cyber Vision for visibility.
In this scenario, because multiple applications are required, it can be handled in two ways. The
first method is to use the principles of defense-in-depth and divide responsibility across the
architecture. Ask yourself the question; is IPS required for east/west traffic (for example, the
traffic located at the site). If the answer is no, and IPS is only a requirement for traffic entering
and leaving the field network, then architect a solution with a firewall at the hub location. When
deploying the field network in a hub and spoke model, all traffic must traverse the hub location
when crossing its boundary. Deploy your IPS solution at the hub using a powerful enterprise
firewall and deploy Cyber Vision on the Cisco Industrial Router.
Figure 89: Cisco Industrial Router with Cyber Vision at the spoke site, IPS deployed in the hub firewall
134
Industrial Security 3.1 Design Guide
If IPS is a requirement at the edge, then an appropriate router must be deployed. In this scenario,
use the IR1835 or the IR8340 to host Snort, and then deploy Cyber Vision on a neighbouring
switch. If there is no room at the location for additional hardware, then a choice must be made
between the applications.
Figure 90: Cisco Industrial Router with the NGFW addon, Cisco Cyber Vision deployed on a neighboring
switch
Problem statement: I need a firewall to protect my critical assets, I need IDS/IPS capabilities, I
also want Cyber Vision for visibility, and I want Cisco SEA for remote access.
In the ideal scenario, all capabilities can be deployed across various points in the architecture.
The IPS solution can be deployed at the hub location protecting all north/south traffic from the
field networks, Cyber Vision can be deployed on the access switches used by OT endpoints, and
SEA can be deployed at the router for remote access.
135
Industrial Security 3.1 Design Guide
Figure 91: Cisco Industrial Router with SEA, Cyber Vision on a neighbouring switch, and IPS deployed at the
hub firewall
However, similar to the last scenario, this may not always be available. All Cisco SEA needs to
operate is a connection northbound to the cloud, and a routed connection to the OT assets. To
accomplish this, Cisco SEA can be deployed at the hub location, alleviating the burden to host
the SEA agent on the Industrial Router. This design decision then brings you back to the decision
tree for deploying both Cyber Vision and Snort which was discussed in the previous scenario.
136
Industrial Security 3.1 Design Guide
Figure 92: Cisco SEA deployed at the hub site with IP reachability to the spoke
For more information on deploying Cisco SEA at the hub location, see Hosting SEA Agent(s) at
a hub site.
137
Industrial Security 3.1 Design Guide
138
Industrial Security 3.1 Design Guide
VPNs do offer security benefits, but if not configured correctly, can give an adversary
unrestricted access to the OT (Operational Technology) network. With what is known about the
risk of stolen credentials, using an MFA (Multi Factor Authentication) solution should be a given
for any remote access solution. However, the additional risk with VPN solutions is the potential
for even a legitimate user to unknowingly bring malicious software into the environment. Using
a VPN, the network is extended to the remote user, which brings their machine as a remote client
to the network. If a device is not scanned before access is given, malicious software could
unintentionally be introduced to the OT network.
Additionally, with a VPN solution, additional access control needs to be placed on the user to
limit their actions to a pre-determined scope of work. In the case of a vendor who is performing
maintenance in a production environment, the vendor needs access to a single machine, during
the duration of a maintenance window, and should not have the ability to laterally move to any
other machine, neither intentionally nor unintentionally.
While all the necessary security checks and controls are possible with a traditional VPN based
solution, the operational overhead often leads to lacklustre policies and wide-open access
policies after remote access has been granted. Additionally, VPN access is commonly maintained
by a separate entity in the organization, which causes delays for vendor connectivity and slows
139
Industrial Security 3.1 Design Guide
down the line of business. As a result, even in the IT world, there has been a shift towards
looking for VPN alternatives.
In OT networks, the server which grants access to the plant remotely is often known as a jump
server (or a jump box / jump host). The jump server solves the challenge an OT network can face
with malicious software being introduced to the network by a remote device. After a VPN
connection is established, policy is placed on the firewall to only allow users to access a set of
jump servers that have been assigned to them. All activities performed on the OT network must
originate from the jump server, which is a trusted device fully controlled by the networking
team.
While jump servers solve one challenge, they do not help solve the challenge of controlling what
a user can do once they have access to the jump server. Best practices would leave jump servers
in a quarantined state, where they are denied any access to the OT network until called upon. As
necessary, security administrators will open specific policies to control what a user can and
140
Industrial Security 3.1 Design Guide
cannot do from that server. Once again, the operational burden can be overwhelming, and, in
reality, jump servers expose themselves to the same frailties as the VPN solution.
In 2020 hackers harvested and sold as many as 250,000 RDP server credentials in an
underground marketplace, xDedic. These credentials gave buyers access to all the data on the
servers and the ability to launch future attacks using the servers. Attacks against RDP grew by
768% in 2020, according to ESET.
Unrelated to security, jump servers are assets that will need to be managed, consuming power,
and requiring ongoing maintenance. Additionally, if licensed software is needed to perform a
task such as the PLC programming software, licensing must be purchased, that software must be
maintained, and the cost and complexity increases for the consumer.
141
Industrial Security 3.1 Design Guide
Adoption of zero trust can help address common security challenges in the workforce, such as
phishing, malware, credential theft, remote access, and device security (BYOD). This is done by
securing the three primary factors that make up the workforce: users, their devices, and the
applications they access.
Verify Users
Ensuring the trust of your users whenever they attempt to access applications remotely is the first
step toward secure remote access. The following capabilities aid in mitigating the threat of Initial
Access exploits:
142
Industrial Security 3.1 Design Guide
Device Posture
If users are logging into your company applications with outdated devices, there is a chance they
could also be unwittingly spreading malware and using keyloggers to record your keystrokes.
Meaning any data you type, including your username or password, can be recorded, and sent to
an attacker command and control servers. As a result, your company data could be at risk if just
one out-of-date device logs in, potentially spreading malware throughout your environment. Or
worse, spreading ransomware that will keep your files hostage until a ransom is paid to decrypt
them.
To protect the OT network from introducing malware to the environment, the remote access
solution must have the following capabilities:
• Device Posture Assessment - The device posture assessment analyses the device,
assesses its security posture, and reports it to the policy decision management system.
Organizations need to enable secure and direct access to business applications for a
diverse set of users (remote workers, vendors, and contractors) and their devices that
typically reside outside of the control of corporate EMM (enterprise mobility
management) and MDM (mobile device management) solutions. Enforcing consistent
security policies across managed devices, bring your own devices (BYOD), corporate
owned, personally enabled, and third-party (contractor or partner) devices poses a
significant challenge. IT security teams often lack insight and an enforcement mechanism
when making an access decision on endpoints, particularly among unmanaged devices.
This is when device trust is important to establish.
• Anti-Malware - Advanced malware goal, in general, is to penetrate a system and avoid
detection. Once loaded onto a computer system, advanced malware can self-replicate and
insert itself into other programs or files, infecting them in the process. Anti-malware
protection should be implemented in both the network (to prevent initial infection and
detect attempts of spread) and in the endpoint (to prevent endpoint infection and remove
unwanted threats). For the purposes of this design guide, this capability represents
endpoint anti-malware.
143
Industrial Security 3.1 Design Guide
Auditing
Many compliance standards will require that an audit trail be maintained for all activity that
occurs from remote networks:
• Authentication Logs – Authentication logs show you where and how users authenticate,
with usernames, location, time, device posture and access logs.
• Administration Logs – Administration logs show you the sessions that were created,
who created the sessions and what access control measures were put in place for the end
users.
• Session Monitoring – Enable an administrative user to supervise a remote session and
view in real-time what is happening during the session. For example, when an external
technician delivers remote support for an asset, an internal OT operators may want to
overlook the actions taken during the remote access session
• Session Termination – The ability for an administrator to terminate an active session
that either should never have become active in the first place, or while monitoring a
session, the remote user attempts to deviate from their permitted actions
• Session Recording – The ability for remote sessions to be recorded and stored for use in
an audit trail. If a breach were to occur, having the ability to watch back what remote
users did to a system aids incident investigation
144
Industrial Security 3.1 Design Guide
• Flow Analytics. Network Detection and Response (NDR) solutions leverage pre-existing
infrastructure to offer enterprise-wide, contextual visibility of network traffic. Flow
information can be used to conduct forensic analysis to aid in lateral threat movement
investigations, ensure ongoing zero trust verification is provided, and modern tools can
even detect threats in encrypted traffic
145
Industrial Security 3.1 Design Guide
advanced ability to define specific channels for communications between a user and the remote
system and block everything outside that.
By first bringing all remote users to a trusted cloud resource it enables security administrators to
have a single point of control for those users. Identity and be verified, device posture can be
146
Industrial Security 3.1 Design Guide
checked, geolocation can be looked up, and any other policy controls that we will discuss later in
the document. On the OT, operators simply need to allow connectivity between the SEA agent
that exists behind the firewall, rather than open multiple connections from different users,
potentially all over the world.
Figure 98 Consistent policy across all locations
147
Industrial Security 3.1 Design Guide
In this architecture, there is no interference between the SEA Agent sitting on the Industrial
router and the SEA cloud and no additional architectural considerations are required.
148
Industrial Security 3.1 Design Guide
If the SEA agent cannot be deployed at the target site, it can be run at a hub location with IP
accessibility to its target devices. In a typical hub-spoke model, applications and services running
in the hub will have IP accessibility to the devices in the spokes. The following design
considerations will be needed when deploying in this model:
• If there are firewall rules between the hub and spoke locations, which is the most likely
outcome, firewall rules will need to be created to enable connectivity from the SEA agent
to the remote targets. It is important to note that SEA has all the policies needed to
provide least privilege access to remote targets. It is not recommended that security
administrators duplicate these granular policies on the firewall between hub and spoke
sites. Instead, security administrators should have a single firewall policy, either allow or
149
Industrial Security 3.1 Design Guide
deny, with security administrators only opening the firewall connection during known
and scheduled time windows. SEA will already restrict which devices and over what
protocols users can access the network, the additional firewall rule just gives an
additional layer of protection, but we do not want to over complicate our design.
• The SEA agent has a maximum of 10 concurrent remote access sessions (depending on
the device chosen to host it). This is normally not a concern when running at the edge,
but when running at a hub location, it may be a limiting factor. If more than 10
concurrent sessions are required, it is recommended to deploy more agents to handle the
scale.
• Deploy a dedicated SEA agent for each site. While not a strict requirement,
troubleshooting and management of connections will be much easier as the scale of the
operations grows.
150
Industrial Security 3.1 Design Guide
By deploying the SEA Agent within the same subnet as the target devices, the SEA Agent
becomes part of the same layer 2 domain and does not require any additional routes or security
policies to be placed on the network to reach the target devices. A secure connection is created
from the SEA Agent in the process network (for example, a Cell/Area Zone) and sent through IT
controlled infrastructure to the SEA cloud. The SEA Agent then proxies remote connections into
the process network, and additional policy can be put in place on the network device to contain
all remote access sessions to the layer 2 domain the SEA Agent resides.
It is important to note, in this design, the OT network itself does not need connectivity to the
cloud. The SEA agent supports up to 10 virtual interfaces, which can all reside in different
VLANs.
Figure 102 SEA agent with multiple virtual interfaces
With this approach, the SEA agent can have one interface with a route to the cloud; either a
dedicated subnet just for SEA agents or deployed within an existing cloud facing subnet within
the OT network. Additional interfaces are then created for its southbound access, where OT
VLANs remain unrouteable from cloud connected subnets.
151
Industrial Security 3.1 Design Guide
SEA in IDMZ
Regardless of the security controls, some architects may have discomfort deploying SEA agents
with an interface in an OT VLAN. In this case, SEA can be deployed fully in the IDMZ.
Figure 103 SEA agent in the IDMZ
The IDMZ is designed to be the boundary between the IT and the OT network. Services that
reside within the IDMZ have interfaces into both parts of the network, which is fitting for the
SEA Agent. The advantage of putting the SEA Agent in the IDMZ is it tightly aligns with
existing mechanisms that may already exist in the network; nothing in the OT domain should
have a direct connection through the IDMZ. It is worth noting, the SEA Agent is a security
appliance, and since it does follow the principles of zero trust, the presence of the agent within
the OT network would not pose an additional security risk to the organization.
Nevertheless, if the SEA Agent is to be placed in the IDMZ, all the same design considerations
will apply as already discussed in the chapter Hosting SEA agent(s) at a hub site, where firewall
rules and scale considerations must be considered.
Note: The SEA agent does not need to physically reside in the IDMZ. If the SEA agent is in its
own subnet, the gateway for that subnet can be the IDMZ firewall, logically placing it as an
IDMZ application. This deployment may be considered if the architecture has a device that can
technically host the SEA agent, but architects still want to route all its traffic, including
southbound, through the IDMZ firewall.
152
Industrial Security 3.1 Design Guide
153
Industrial Security 3.1 Design Guide
154
Industrial Security 3.1 Design Guide
When deploying SEA agents an explicit proxy can be configured instead of requiring direct
access to the cloud. There is no recommendation on which proxy to use, the only requirement is
that the proxy supports the HTTP CONNECT method. The HTTP CONNECT method requests
that a proxy establish an end-to-end encrypted session between the SEA agent and the SEA
cloud service, meaning the data will be unreadable to the proxy. The only purpose of this proxy
is to manage a single firewall rule between the trusted web proxy and the SEA cloud.
Using a web proxy is not a requirement. If one already exists, it is recommended to use this
feature. If a proxy does not yet exist, administrators could create a dedicated subnet for SEA
agents, provide reachability to the SEA cloud from that subnet, and create a firewall rule that
ensures IP addresses in that subnet can reach out to SEA, and SEA only. That way, if another
device was to establish itself on the SEA subnet, its only outbound reachability would be to the
SEA cloud, where additional security measures would be in place to prevent malicious activity.
155
Industrial Security 3.1 Design Guide
Engineering workstations are placed throughout the ICS network to bring remote vendors down
to the cell/area zones to perform remote maintenance of their machines. One of the problems that
arises from this is the possibility of an always on connection, or the administrative overhead of
managing both VPN credentials and RDP access. By placing the SEA agent in the network, the
product can be used to control vendor access to engineering workstations and gain all the user
authentication, access control, and auditing benefits the SEA solution provides. Additional
security measures will still be required between the workstations and the rest of the network, but
the key challenge of making sure only trusted users have access to the infrastructure at
determined times can be solved using SEA.
156
Industrial Security 3.1 Design Guide
Note: 1. You only need to choose one between EU and US in your firewall rules depending on
which cluster is relevant to your deployment.
2. If you require IP address filters instead of domain name filters see Firewall Rules for an
up-to-date list of IP addresses for each of the URLs specified in the table above.
External IdP
While organizations can protect their SEA deployments with MFA, they do not own a CCI
administration portal and cannot define additional authentication policies on users accessing the
SEA dashboard. For more control, it is recommended to bring your own SSO solution. SSO
integration into SEA is done via Security Assertion Markup Language (SAML) 2.0. For this
integration, SEA is the service provider, and your organization identity server is the IdP. While
any IdP with SAML 2.0 support will work, the remainder of the design guide will demonstrate
value using Cisco Duo.
157
Industrial Security 3.1 Design Guide
158
Industrial Security 3.1 Design Guide
159
Industrial Security 3.1 Design Guide
security. And sometimes it is outside of your IT team’s control to install an agent on the personal
devices of third-party provider that may need access to your applications.
Whether or not you have an MDM solution, Duo can allow you to block devices from accessing
your applications based on:
• OS, browser, and plug-in versions and how long they have been out of date
• Status of enabled security features (configured or disabled)
• Full disk encryption
• Mobile device biometrics (face ID/touch ID)
• Screen lock
• Tampered (jailbroken, rooted, or failed Google SafetyNet)
160
Industrial Security 3.1 Design Guide
protection against that 1%. Secure Endpoint prevents breaches, blocks malware at the point of
entry, and continuously monitors and analyses file and process activity to rapidly detect, contain,
and remediate threats that can evade front-line defenses.
Stopping threats at the earliest point in time ensures minimal damage to endpoints and less
downtime after a breach. Secure Endpoint employs a robust set of preventative technologies to
stop malware, in real-time, protecting endpoints against today’s most common attacks as well as
emerging cyberthreats.
• File Reputation: known malware is quickly and easily quarantined at the point of entry
without any processor-intensive scanning.
• Antivirus: endpoints benefit from custom signature-based detection, allowing
administrators to deliver robust control capabilities and enforce blocklists.
• Polymorphic malware detection: Malware actors will often write different variations of
the same malware to avoid common detection techniques. Secure Endpoint can detect
these variants, or polymorphic malware through loose fingerprinting. Loose
fingerprinting will look for similarities between the suspicious file content and the
content of known malware families, and convict if there is a substantial match.
• Machine Learning analysis: Machine learning capabilities in Secure Endpoint are fed
by the comprehensive data set of Cisco Talos to ensure a better, more accurate model.
Together, the machine learning in Secure Endpoint can help detect never-before-seen
malware at the point of entry.
• Exploit Prevention: Memory attacks can penetrate endpoints, and malware evades
security defenses by exploiting vulnerabilities in applications and operating system
processes.
• Script protection: provides enhanced visibility in Device Trajectory into scripts
executing on your endpoints and helps protect against script-based attacks commonly
used by malware. Script control provides additional protection by allowing the Exploit
Prevention engine to prevent certain DLLs from being loaded by some commonly
exploited desktop applications and their child processes.
• Behavioral protection: enhanced behavioral analysis continually monitors all user and
endpoint activity to protect against malicious behavior in real-time by matching a stream
of activity records against a set of attack activity patterns which are dynamically updated
as threats evolve.
• Device Control: lets you control the usage of USB mass storage devices and prevent
attacks from these devices.
161
Industrial Security 3.1 Design Guide
SEA Roles
SEA has the following built-in roles:
• SEA System Admin can add SEA Agents to network devices, configure connected
clients, and define the access methods to reach those clients
• SEA Access Admin has permissions to both access remote sessions and manage user
permissions to those sessions
• SEA Access Manager can approve access requests and launch remote sessions
• SEA Users are the end users of the remote access deployment. These users have no
configuration privileges, but simply consume the product within the boundaries set by the
admins.
Do not fall into the trap of making all internal users admin users of the system.
Administrator roles should be reserved for a limited set of users who are responsible for
provisioning the system. The more SEA System Admin accounts that exist, the more users
who can be targeted in a social engineering attack. If in doubt, give new users the SEA User
role until they need permission to perform administrative functions.
162
Industrial Security 3.1 Design Guide
Protocol definitions should be defined on a per access basis. SEA Plus should only be used for
applications that require it, such as RSLogix connecting to a PLC, and the protocol definition list
should be restrictive to only what is needed for that particular application.
163
Industrial Security 3.1 Design Guide
Mean time to recovery (MTTR) then refers to the average measure of how long it takes security
teams to stop or fix the problem after it has been identified and confirmed. The big questions for
MTTR are what has been compromised and how is it fixed? This question poses several
challenges, as the environment is typically so large that it’s difficult to see all the damage that
was done.
• The initial access vector may have successfully been found, but where else did the attack go
after initial entry?
• If a database was breached, it can be difficult to see exactly which tables were accessed
• The attack may be multipronged with the attacker breaching several points of entry
Each problem may require a different solution. Do the operational teams need to push a quick
software update or fix a vulnerability? Does the network team need to block an IP address or a
164
Industrial Security 3.1 Design Guide
port to prevent further attacks? Deciding on the right response is just as important as finding the
breach in the first place.
Security information and event management (SIEM) is a well-tested take on log-and-event
management solutions. At its core, SIEM is about gathering as much log information as possible
from all over an organization. Many SIEM solutions can take log data from IIoT security tools,
firewall event logs, and everything in between. This kind of solution starts to break down the silo
walls, integrating with multiple solutions and centralizing important security information. What
SIEM doesn’t do is give security engineers a boost in threat response time and efficacy. Seeing
the security landscape of your organization is great for many things but responding to threats is
just as important.
Security orchestration, automation and response (SOAR) takes a lot of what makes SIEM great
and adds extra layers to account for some of the limitations. Like SIEM, SOAR solutions take
data from different parts of the security infrastructure and put it in one place. SOAR solutions
offer options to automate various auditing, log, and scanning tasks. Automation can’t take care
of everything, however, and sometimes requires human intervention. The “response” part of
SOAR is about organizing and managing the response to a security threat. This feature set
utilizes orchestration and automation information to help security staff make decisions and
respond to threats. SOAR automation doesn’t automate responses to security breaches. It
automates simple analysis tasks to reduce security personnel workloads.
Introducing Splunk
For the tenth consecutive time, Splunk was named a leader in the 2024 Gartner Magic Quadrant
for SIEM. Splunk is a software platform primarily used for searching, monitoring, and analysing
machine-generated data in real time. Thousands of organizations worldwide rely on Splunk
Enterprise Security as their SIEM to rapidly detect and respond to critical events so they can stay
ahead of emerging threats and maintain cyber resilience. With the ability to perform a wide range
of security analytics and operations use cases, organizations can remain flexible and agile in the
face of evolving threats and business needs. Splunk however, is not just one product. For
example:
• Splunk Enterprise is the core data platform for collecting, indexing and analysing machine
data. It can be installed on-prem or in a private cloud instance.
• Splunk Cloud Platform delivers the benefits of Splunk Enterprise as a cloud-based service.
• Splunk SOAR is used for automating security operations through playbooks and
integrations. There is support for 300+ third part tools and supports 2800+ automated actions.
It is available as a standalone version but can also be offered in a cloud version.
• Splunk Observability Cloud is a purpose-built suite of tightly integrated solutions that
provide complete visibility across your data and systems for accurate, fast and in-context
troubleshooting.
Splunk also provides products such as Splunk Enterprise Security, Splunk Asset & Risk
Intelligence and Splunk Attack Analyzer which sit on top of platforms like Splunk Enterprise.
The current iteration of this design guide only focuses on Splunk Enterprise, and some of the
apps that reside live within the ecosystem. For further details on other products in the Splunk
portfolio, see the Splunk webpage.
165
Industrial Security 3.1 Design Guide
166
Industrial Security 3.1 Design Guide
Indexing Tier
Indexes and the Indexer
When data is added, Splunk software parses the data into individual events, extracts the
timestamp, applies line-breaking rules and stores the events in an index. By default, data is stored
in the “Main” index, but new indexes can be created for different data inputs. An indexer is the
Splunk instance that indexes data. The indexer transforms the raw data into events and stores the
events into an index. The indexer also searches the indexed data in response to search requests.
The search peers are indexers that fulfil search requests from the search head.
For more information on indexers, see Managing Indexers and Clusters of Indexers.
Search Tier
Search Head
Search is the primary way users interact with data in Splunk. Searches can be executed to
retrieve events from an index, use statistical commands to calculate metrics and generate reports,
search for specific conditions with a rolling time window, identity patterns in data, predict future
trends, and so on. Searches can also be saved as reports and used to power dashboards.
167
Industrial Security 3.1 Design Guide
The search head is a Splunk instance that directs search requests to a set of search peers
(indexers) and merges the results back to the user. If the instance does only search, and not
indexing, it is referred to as a dedicated search head.
Management Tier
Deployment Server
The deployment server is the tool for distributing configurations, apps, and content updates to
groups of Splunk Enterprise instances. It is used to distribute updates to most types of Splunk
Enterprise components – forwarders, non-clustered indexers, and search heads.
Deployment server is not a required component. For more information on the deployment sever
see About deployment server and forwarder management.
License Manager
A license manager is required by other Splunk components to enable licensed features and track
daily data ingest volume. The license manager role has minimal capacity and availability
requirements and can be collocated with other management functions.
On the topic of licensing, customers can purchase a commercial end-user license for Splunk
Enterprise based on either data volume or infrastructure. They provide access to the full set of
Splunk Enterprise features within a defined limit of indexed data per day (volume-based license),
or vCPU count (infrastructure license).
Splunk does have a free license tier, which gives very limited access to Splunk Enterprise
features. The free license does not expire, and is for a standalone, single instance use only
installation. The free license allows indexing of 500MB of data per day, and if this is exceeded a
violation warning will be presented to the user. Search functionality will be disabled if there are
several license violation warnings.
For more information in licensing, see How Splunk Enterprise licensing works.
Monitoring Console
The monitoring console provides dashboards around usage and health monitoring of a Splunk
environment. It contains several prepackaged platform alerts that can be customized to provide
notifications for operational issues.
For more information on the monitoring console, see About the Monitoring Console.
Cluster Manager
The cluster manager is the required coordinator for all activity in a clustered deployment. For
example, an indexer cluster is a group of indexers configured to replicate each other’s data,
so that the system keeps multiple copies of all data. This process is known as index
168
Industrial Security 3.1 Design Guide
replication. By maintaining multiple, identical copies of data, indexer clusters prevent data
loss while promoting data availability for searching.
Splunk Enterprise clusters feature automatic failover from one indexer to the next. This
means that, if one or more indexers fail, incoming data continues to get indexed and
indexed data continues to be searchable.
For more information see The basics of indexer cluster architecture.
169
Industrial Security 3.1 Design Guide
Figure 109 Splunk search result, highlighting events as rows and the fields as columns
Fields
Fields appear in event data as searchable name-value pairing such as user_name=alice or
ip_address=10.0.0.1. Fields are the buildings blocks of Splunk searches, reports, and data
models. When a search is run against event data, Splunk software looks for fields in that data.
Look at the following example search.
Status=404
The search finds events with status fields that have a value of 404. When you run this search,
Splunk Enterprise does not look for events with any other status value. It also does not look for
events containing other fields that share 404 as a value. As a result, this search returns a set of
results that are more focused than you get if you used 404 in the search string.
Fields often appear in events as key=value pairs such as user_name=alice. But in many events,
field values appear in fixed, delimited positions without modifying keys. For example, events
might have the user_name value always appear by itself after the timestamp and the user_id
value.
Nov 15 09:32:22 00224 johnz
170
Industrial Security 3.1 Design Guide
Subsearches
A subsearch runs its own search and returns the results to the parent command as the argument
value. The subsearch is run first and is contained in square brackets. For example, the following
search uses a subsearch to find all syslog events from the user that had the last login error:
sourcetype=syslog [ search login error | return 1 user ]
Optimizing Searches
The key to fast searching is to limit the data that needs to be pulled off disk to an absolute
minimum. Then filter that data as early as possible in the search so that processing is done on the
minimum data necessary.
• Partition data into separate indexes, if you will rarely perform searches across multiple
types of data. For example, put web data in one index, and firewall data in another.
• Limit the time range to only what is needed. For example -1h not -1w, or earliest=-1d.
• Search as specifically as you can. For example, fatal_error not *error*
• Use post-processing searches in dashboards.
• Use summary indexing, and report and data model acceleration features.
Command Description
chart/timechart Returns results in a tabular output
dedup Removes subsequent results that match a specified criterion
eval Calculates an expression
fields Removes fields from search results
head/tail Returns the first/last N results
lookup Adds field values from an external source
rename Renames a field. Use wildcards to specify multiple fields
rex Specifies regular expression named groups to extract fields
search Filters results to those that match the search expression
sort Sorts the search results by the specified fields
171
Industrial Security 3.1 Design Guide
where
Filters search results using eval expressions. Used to compare two
different fields
Note: it is not the purpose of this design guide to act as a training guide for creating SPL
queries. Example queries will be used later in the document when providing design guidance for
the deployment of Cisco specific apps, but for a more complete overview, including a tutorial,
see Splunk’s Search Manual.
Apps
Splunk Apps
Splunk Applications are comprehensive solutions that enhance the Splunk platform by providing
pre-built dashboards, reports, workflows, and visualizations designed for specific use cases or
industries. These apps cater to a wide range of scenarios, such as IT operations, security
monitoring, and business analytics, enabling users to derive actionable insights quickly without
the need to create custom configurations. By offering ready-to-use functionality, Splunk Apps
help organizations streamline their workflows and maximize the value of their data.
172
Industrial Security 3.1 Design Guide
Figure 110 Security insights dashboard within the Cisco Cyber Vision Splunk app
Splunk Add-ons
Splunk Add-ons are lightweight extensions that focus on data integration and enrichment. They
enable the collection, parsing, and normalization of data from various sources, such as servers,
devices, cloud services, or third-party applications. Add-ons ensure that raw data is properly
formatted and enriched, making it ready for analysis within the Splunk platform. While they do
not include visualizations or dashboards, add-ons are essential for ensuring seamless data
ingestion and compatibility with Splunk's analytics capabilities.
Figure 111 Cyber Vision Add-on for Splunk input configuration menu
173
Industrial Security 3.1 Design Guide
Splunk Add-ons are required for getting data into the Splunk platform from many data sources,
while the Splunk apps are optional, and provide default visualisations utilising the data extracted
by the add-on.
Dashboards contain panels of modules like search boxes, fields, charts, and so on. Dashboard
panels are usually connected to saved searches or pivots. They display the results of completed
searches and data from real-time searches that run in the background.
174
Industrial Security 3.1 Design Guide
Figure 114 Cisco Secure Firewall dashboard within the Cisco Security Cloud Splunk App
Splunk Enterprise allows you to save searches and pivots as reports and then add reports to
dashboards as dashboard panels. Run reports on an ad hoc basis, schedule them to run on a
regular interval, or set a scheduled report to generate alerts when the result meets conditions.
Figure 115 Sample report highlighting provoleged account usage over time
Alerts, Dashboard and Reports will be explored in depth later in the design guide.
175
Industrial Security 3.1 Design Guide
Install Considerations
The simplest deployment is the one you get by default when you first install Splunk Enterprise
on a machine: a standalone instance that handles both indexing and searching. You log into
Splunk Web or the CLI on the instance and configure data inputs to collect machine data. You
then use the same instance to search, monitor, alert, and report on the incoming data.
However, a single instance is often not the recommended approach for load balancing and
resilience across a production environment and is therefore recommended to install specialized
instances of Splunk Enterprise on multiple machines. The architecture chosen for this design
guide was the single server deployment as the focus of this design guide is data onboarding and
extracting value from that data using Splunk.
Figure 116 Architecture used during validation testing for Splunk in OT environments
To understand which deployment model is best suited for your environment, Splunk has curated
a Topology selection guidance questionnaire. The design details of the chosen deployment can
also be found in the same documentation.
176
Industrial Security 3.1 Design Guide
Getting Data In
Splunk can ingest almost any type of data, by either through a pull model, or listening for
devices and applications to push data into it. The design guide will detail how data was ingested
for the following services:
• Cisco Cyber Vision
• Cisco IOS-XE
• Cisco ISE
• Cisco Firewall Management Center
• Cisco Duo
177
Industrial Security 3.1 Design Guide
integrating Cyber Vision into Splunk, all of the Cyber Vision Centers can be aggregated into a
single app, meaning a single pane of glass can be used to visualise and query data.
The Cyber Vision Splunk App provides a default visualisation for this aggregated view, where
data can be looked at individually, focusing on one site at a time, or collectively, where an
organizations security posture can be viewed globally.
Figure 117 Cyber Vision data can either be aggregated across all Cyber Vision Centers, or data can be
filtered on a per site basis
178
Industrial Security 3.1 Design Guide
system across both enterprise and rugged deployments, this app is not limited to OT
environments, however the scope of what it was used for in this design guide is. The app
provides visibility into events such as port flapping, performance issues, and time drift of
network equipment. However, from a security perspective, the app gives analysts insights into
access control lists and authentication requests.
When using TrustSec in the OT network, syslog messages are generated when there is an
SGACL match on the switch. Splunk provides users the ability to take these SGACL events and
create their own custom dashboards for monitoring the security events across the OT network.
179
Industrial Security 3.1 Design Guide
180
Industrial Security 3.1 Design Guide
The rich user interface renders a cohesive user experience that provides detailed instructions for
each Cisco product to help facilitate the setup process. For installation instructions, see the Cisco
Security Cloud App for Splunk User Guide.
Note: For this version of the design guide, Cisco Secure Firewall Management Center (FMC)
and Cisco Duo were used as other apps on this list were not used earlier on in this design
guidance. If other apps in the list are introduced later in guidance for security industrial
networks they will be added to this section too.
Cisco Secure Firewall Management Center
When integrating Cisco FMC and Cisco Secure Firewall with Splunk for log ingestion, it is
crucial to understand the capabilities and limitations of the available integration methods:
eStreamer, Syslog, and API. Below is a detailed comparison and design guidance to help you
decide which method(s) to use based on your requirements.
eStreamer
• The Secure Firewall System Event Streamer (eStreamer) uses a message-oriented
protocol to stream events and host profile information to Splunk
• Data provided by eStreamer includes:
o Intrusion events
o Connection events
o File and malware events
o Security intelligence events
o User activity (if identity policies are configured)
o Host profile data
• eStreamer gets updated on an interval, so will not handle real time log ingestion
• Required Port: TCP 8302
Syslog
• Syslog is a standard protocol that the firewall uses to forward logs in real time
• The following data is sent over syslog as they occur:
o Connections events
o Intrusion events
o Security intelligence events
o Audit logs
• Syslog is easy to configure, and enables Splunk to react to firewall logs in real time. It is
recommended to pair syslog with eStreamer for complete coverage.
• High-volume environments may require careful running to avoid performance issues.
• Required port: UCP/TCP 1025 (customizable)
181
Industrial Security 3.1 Design Guide
API
• Splunk can also use the RESTful API provided by Cisco FMC for querying specific data.
• The following data is available over API:
o Configuration data
o Policy and rule definition
o Event data
• Port required: TCP 443
The recommendation is to install eStreamer as a minimum for its depth in data. Install syslog if
real-time monitoring is required, and use the API access method to configuration data or rules
are required.
Figure 119 Cisco Secure Firewall Dashboard within the Cisco Security Cloud App for Splunk
Cisco Duo
In this design guide, Cisco Duo was integrated into Cisco Secure Equipment Access for an added
layer of protection for remote access into OT networks. There is only one method for integrating
Duo into Splunk, and that is through an API connector.
Required Ports:
• API: TCP 443
When connecting Duo to Splunk, SOC analysts have access to the following events:
• Account logs
• Activity logs
182
Industrial Security 3.1 Design Guide
• Administrator logs
• Authentication logs
• Telephony logs
• Trust monitor logs
• Endpoint logs
The Duo logs enable analysts to get insights into which countries users are attempting to log in
from, what device they were using, or if they were failing their MFA prompt. Singular Duo logs
may not mean anything in isolation, but when a burst of events come in, it could signal a
problem. For example, a legitimate user may accidentally fail an MFA prompt, or maybe they
are logging in from a new PC. However, if the same user is logging in from multiple countries in
the space of minutes, or they have repeated failed authentication attempts, it may be a sign that
the account has been compromised. Creating alerts and repetitive data will be covered later in the
guide.
Note: When doing validation testing, the Duo functionality within the Cisco Security Cloud app
was not working. To test Duo, the standalone app was used. This standalone app will be
deprecated soon, and the combined app should be fixed. Reach out to your Cisco representative
for a date of completion for the Duo fix if it still broken at the time of reading this.
183
Industrial Security 3.1 Design Guide
plan you aging policy, it is recommended to explore the detailed information at How the indexer
stores indexes.
184
Industrial Security 3.1 Design Guide
185
Industrial Security 3.1 Design Guide
186
Industrial Security 3.1 Design Guide
1 Applications menu Switch between Splunk applications that you have installed. The
current application, Search & Reporting app, is listed. This menu
is on the Splunk bar.
2 Splunk bar Edit your Splunk configuration, view system-level messages, and
get help on using the product.
3 Apps bar Navigate between the different views in the application you are in.
For the Search & Reporting app the views are: Search, Datasets,
Reports, Alerts, and Dashboards.
5 Time range picker Specify the time period for the search, such as the last 30 minutes
or yesterday. The default is Last 24 hours.
6 Search history View a list of the searches that you have run. The search history
appears after you run your first search.
7 How to Search Use the links to learn more about how to start searching your data,
as well a summary of the data that you have access to.
8 Analyze Your Data Create curated collections of event data into datasets that you
with Table Views design for a specific business purpose.
The Data Summary dialog box shows three tabs: Hosts, Sources, Sourcetypes. These tabs
represent searchable fields in your data. Selecting a host, source, or source type from the Data
Summary dialog box is a great way to see how your data is turned into events.
The host of an event is the host name, IP address, or fully qualified domain name of the network
machine from which the event originated. In a distributed environment, you can use the host
field to search data from specific machines.
187
Industrial Security 3.1 Design Guide
Figure 121 Example data summary page in the Search & Reporting app showing the hosts where data
originates
The source of an event is the file or directory path, network port, or script from which the event
originated.
188
Industrial Security 3.1 Design Guide
Figure 122 Example data summary page in the Search & Reporting app showing the data sources available
for creating queries
The source type of an event tells you what kind of data it is, usually based on how the data is
formatted. This classification lets you search for the same type of data across multiple sources
and hosts. For example, searching for cisco:cybervision:events would provide Cyber Vision
events across all of the Cyber Vision nodes in the environment.
189
Industrial Security 3.1 Design Guide
Figure 123 Example data summary page in the Search & Reporting app showing the sourcetypes available
190
Industrial Security 3.1 Design Guide
Figure 124 Example search query to highlight the data available to a user after an initial search has run
1 Apps bar Navigate between the different views in the Search & Reporting app:
Search, Metrics, Datasets, Reports, Alerts, and Dashboards.
191
Industrial Security 3.1 Design Guide
4 Search Actions that you can perform, including working with your search Job,
action sharing, printing, and exporting your search results.
buttons
5 Search The tab that your search results appear on depends on your search. Some
results tabs searches produce a set of events, which appear on the Events tab. Other
searches transform the data in events to produce search results, which appear
on the Statistics tab.
6 Search Use the search mode selector to provide a search experience that fits your
mode needs. The modes are Smart (default), Fast, and Verbose.
menu
7 Timeline A visual representation of the number of events that occur at each point in
time. Peaks or valleys in the timeline can indicate spikes in activity or server
downtime. The timeline options are located above the timeline. You can
format the timescale, zoom out, or zoom to a selected set of events.
8 Fields Displays a list of the fields discovered in the events. The fields are grouped
sidebar into Selected Fields and Interesting Fields.
9 Events Displays the events that match your search. By default, the most recent event
viewer is listed first. In each event, the matching search terms are highlighted. To
change the event view, use the List, Format, and Per Page options.
10 Save As Use the Save As menu to save your search results as a Report, Dashboard
menu Panel, Alert, or Event Type.
192
Industrial Security 3.1 Design Guide
As letters are typed into the Search bar, the Search Assistant shows match terms to help auto
complete the query, enabling users to navigate the data without the need to remember every
index name or source type available to them. The recommendation is to learn the fundamentals
of SPL query language, get familiar with the most common terms, and then Splunk will provide
guidance from there.
Fields sidebar
When you add data to the Splunk platform the data is indexed. As part of the index process,
information is extracted from your data and formatted as name and value pairs, called fields.
When you run a search, the fields are identified and listed in the Fields sidebar next to your
search results. The fields are divided into two categories.
• Selected fields are visible in your search results. By default, host, source, and sourcetype
appear. You can select other fields to show in your events.
• Interesting fields are other fields that have been extracted from the events in your search
results.
193
Industrial Security 3.1 Design Guide
Figure 126 Highlighting the CVE field shows all unique values available for further queries
Fields provide a mechanism to help explore the data available to you. For example, after running
the search query for vulnerabilities detected in the OT network, the CVE values were extracted
as an interesting field from the returned data.
Figure 127 Follow on search query after clicking on the CVE of interest
Click on one of the extracted CVE’s simply created a new search, focusing on the CVE that had
been chosen.
194
Industrial Security 3.1 Design Guide
Figure 128 Adding data directly from the event into a new search
By clicking on the field that is of interest, there is an option to Add to search. In this scenario, we
have noticed that the vulnerability has a solution related to a firmware update. This has created
an interested to understand all of the vulnerabilities that can be cleared via a firmware patch.
Figure 129 Example query that searches for all vulnerabilities in the database with the term firmware update
in the solution
While clicking on Add to search adds the full body of text to the search, a simple modification
using an asterisk either side of “firmware update” and removing the original CVE provides all
vulnerabilities in the database that contain the word “firmware update” in the solution field.
There is still one problem with this search. The previous query resulted in 8803 events with the
firmware update event. Due to the nature of the Cyber Vision integration, vulnerability
information is kept up to date with each query, so if a vulnerability continues to exist, Splunk
will create a new event for it every time it polls the system. To combat this, we use the dedup
command which removes duplicates based on the field provided.
Figure 130 Using the dedup search command to focus on unique CVE entries
195
Industrial Security 3.1 Design Guide
In this example, the CVE was used to only show unique vulnerabilities in the network that can be
removed via a patch. The de-duplication of data reduced the results from 8803 events, to only 2.
Note: more sample queries will be included later in the design guide when discussing custom
dashboards.
Use the time range picker to retrieve events over a specific time period. Real-time searches
displays a live and continuous view of events as they stream, into the Splunk platform. Real-time
searches are the default when the system is first used, capturing all events that have occurred in
the last 24 hours. Historical searches a those with a distinct time range, such as the past hour, the
previous day, or “between 2 and 4 last Tuesday”. The time range picker has many preset time
ranges that you can select from, but you can also type a custom time range. When searching for
data, and more importantly when building reports and dashboards, make sure to pick an
appropriate time range. Monthly reports should analyse the previous 30 days, weekly reports
should analyse the previous 7. Incident investigation may require historical searching to narrow
in to a specific indicator of compromise.
For more information, see About searching with time.
196
Industrial Security 3.1 Design Guide
Search actions
There are a wide range of search actions you can perform, including working with your search
Jobs, saving, sharing, exporting, and printing your search results.
Search actions were not considered in this design guide, however, for more information, see:
• Perform actions on running searches
• About jobs and job management
• Export search results
197
Industrial Security 3.1 Design Guide
198
Industrial Security 3.1 Design Guide
Alert Actions
Alert actions help respond to triggered alerts. Multiple alert actions can be taken, and the following
options are available:
• Email notification
• Webhook
• Output results to a CSV lookup file
• Monitor triggered alerts
• Sending an alert to Splunk mobile users
For more information, see Set up alert actions.
Creating Alerts
To create a schedule alert:
• Navigate to the Search page in the Search and Reporting app
• Create a search
• Select Save As > Alert
• Follow the prompts to build either scheduled or real-time alerts.
The following search queries were used during alert validation testing:
• Return the number of assets in the Cyber Vision database that belong to an unwanted
vendor list.
index="security" sourcetype="cisco:cybervision:devices"
| dedup id
| search asset_vendor IN ("Belkin International Inc.", "Siemens")
| stats count by asset_vendor, id
• Return the number of assets in the Cyber Vision database that do not belong to a known
vendor list.
index="security" sourcetype="cisco:cybervision:devices"
| stats dc(id) as "Device Count" by asset_vendor
| eval is_unwanted=if(asset_vendor IN ("Siemens AG", "Siemens", "Cisco
Systems, Inc"), "No", "Yes")
| where is_unwanted="Yes"
| rename asset_vendor as Vendor
| table Vendor, "Device Count"
• Find devices that have known vulnerabilities in Cyber Vision and have also triggered an
intrusion event in the firewall
(index=security sourcetype="cisco:cybervision:devices"
vulnerabilitiesCount > 0) OR (index="cisco_secure_fw"
EventType="IntrusionEvent")
| eval ResponderIP=if(index=="cisco_secure_fw", ResponderIP, dest_ip)
| stats values(label) as "Label", values(dest_ip) as "Device IP",
values(vulnerabilitiesCount) as "Vulnerabilities Count",
count(eval(index=="cisco_secure_fw")) as IntrusionEventCount by
ResponderIP
199
Industrial Security 3.1 Design Guide
Getting the search used to generate the chart gives us the first thing needed for creating widgets –
the data source. Copy the search, this will be used in the next step:
sourcetype="cisco:cybervision:events" category IN ("*") "*"| dedup id| stats count by
severity
200
Industrial Security 3.1 Design Guide
Navigate to the Search & Reporting app and open the Dashboards tab. Click Create New
Dashboard and choose Dashboard Studio. You are now ready to build the dashboard. There
are many out of the box visualisation options available to choose from:
• Area and line charts
• Bar and column charts
• Bubble charts
• Choropleth SVG
• Events Viewer
• Filler and maker gauges
• Icons
• Link graphs
• Maps
• Parallel coordinates
• Pie charts
• Punchcard charts
• Sankey diagram
• Scatter charts
• Shapes
• Single value visualisations
• Table
• Trellis layout
The original widget that the data has been copied from was a pie chart, so let’s start there. In the
top left corner of the dashboard editor, click on the chart icon and choose Pie.
201
Industrial Security 3.1 Design Guide
Click + Create search and copy the search from earlier in the process.
202
Industrial Security 3.1 Design Guide
Click Apply and close and the widget will be copied to the dashboard. However, just because the
original widget uses a pie chart does not mean this has to be the case. It is recommended to
experiment with the visualization types to find the one that best fits the data. The search query
does not need to change, users can experiment by changing the options in the Visualization type
dropdown. For example, the image below shows the data in a bar chart instead.
Figure 135 Changing the original visualization type to a bar chart
Continue this process until all of the visualisation are complete. Experiment with color and sizing
to meet visual needs when the dashboard gets busy. The following image represents a custom
dashboard with various widgets across the apps that were used in validation testing.
203
Industrial Security 3.1 Design Guide
Figure 136 Sample Splunk Studio Dashboard using widgets from existing Splunkbase apps
204
Industrial Security 3.1 Design Guide
205
Industrial Security 3.1 Design Guide
Figure 137 Scheduling a weekly report using the custom dashboard from the previous section
Note: Exporting dashboard PDFs, scheduling PDF delivery, and printing PDFs with Classic
Simple XML dashboards is deprecated in Splunk Enterprise as of version 9.4.0 and Splunk Cloud
Platform as of 9.3.2408. Although this feature continues to function, it might be removed in a
future version, hence why this design guide recommends to use Dashboard Studio only.
For more information on reports see the Splunk reporting manual.
206
Industrial Security 3.1 Design Guide
207
Industrial Security 3.1 Design Guide
• Making using OT Data easier: Prebuilt dashboards, reports, and other content related to
perimeter monitoring, infrastructure monitoring, and centralized monitoring of multiple
OT Security solutions. This content is in direct response to customers wanting quicker
time to value from their OT data.
• Prioritized vulnerability matching: Evaluate, filter, and score matching vulnerabilities
using iteratively executing correlation queries and dynamically calculated Asset Risk
scores.
• Integrated OT Asset Behavior Profiling: Monitor asset behavior profiles to detect
activity changes on critical assets that may represent increased threat risk.
• Constructing and evaluating asset baselines: Create baseline groups and baselines to
verify assets follow a consistent hardened setup. Baselines can be created from data and
extended to customer baseline types.
• OT ready Correlation Searches: Extend the deep bench of existing Enterprise Security
correlation searches that monitor identity, endpoint, network and access in Splunk with
OT-specific searches including mapping to common security frameworks including the
MITRE ATT&CK for ICS.
• Support for key elements of NERC CIP: Dashboards and associated reports reviewed
by trusted practitioners and NERC CIP auditors to help clients focus on NERC CIP
requirements where Splunk can be assistive in compliance monitoring and audit support.
Note: the OT security add-on for Splunk is out of scope for this version of the design guide. More
details will be added at a later date. In the meantime, for more information, see the OT Security
Add-on for Splunk: Technical Guide and Documentation.
208
Industrial Security 3.1 Design Guide
Cyber Vision
• Cisco Cyber Vision Center Appliance Installation Guide -
https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/Center-
Appliance/Release-4-1-
2/b_Cisco_Cyber_Vision_Center_Appliance_Installation_Guide.html
• Cisco Cyber Vision Center VM Installation Guide -
https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/Center-
VM/Release-4-1-2/b_Cisco_Cyber_Vision_Center_VM_Installation_Guide.html
• Cisco Cyber Vision Network Sensor Installation Guide for Cisco IE3300 10G, Cisco
IE3400 and Cisco Catalyst 9300 -
https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/IE3400/b_Cisc
o_Cyber_Vision_Network_Sensor_Installation_Guide_for_Cisco_IE3300_10G_Cisco_I
E3400_and_Cisco_Catalyst_9300.html
• Cyber Vision Monitor Mode / Baseline Creation -
https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/GUI/Release-
4-1-2/b_Cisco_Cyber_Vision_GUI_User_Guide_Release-4-1-2/m_monitor.html
ISE
• Cisco Identity Services Engine Installation Guide -
https://www.cisco.com/c/en/us/td/docs/security/ise/3-
2/install_guide/b_ise_installationGuide32.html
• Cisco Identity Services Engine Segmentation Chapter-
https://www.cisco.com/c/en/us/td/docs/security/ise/3-
2/admin_guide/b_ise_admin_3_2/b_ISE_admin_32_segmentation.html
• Integration Cisco Cyber Vision with Cisco Identity Services Engine (ISE) via pxGrid -
https://www.cisco.com/c/dam/en/us/td/docs/security/cyber_vision/Integrating-Cisco-
Cyber-Vision-with-Cisco-Identity-Services-Engine-via-pxGrid_3_1_1.pdf
209
Industrial Security 3.1 Design Guide
XDR
• Cisco Cyber Vision XDR Integration -
https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/GUI-
Administration-Guide/Release-5-0-0/b_cisco-cyber-vision-GUI-administration-
guide/m_integrations.html?bookSearch=true#xdr
210
Industrial Security 3.1 Design Guide
211
Industrial Security 3.1 Design Guide
After creating the SGTs in Cisco Catalyst Center, the policy matrix can be updated to suit the
enforcement intent. To make changes to the TrustSec policy matrix in Catalyst Center, do the
following:
1. From the Cisco Catalyst Center web interface, navigate to Policy > Group-Based Access
Control.
2. Click the Policies tab.
3. Click the square of the source and destination pair for which there needs to be a permit or
deny contract.
4. On the Create Policy slide-in pane, click the Change Contract link and choose the
appropriate option (Permit IP, Deny IP, and so on). Click the Change button.
5. Click the Deploy link at the top of the matrix.
Figure 108 shows the TrustSec policy matrix in Cisco Catalyst Center. The Create Policies
button (1) is used to create a new policy and the Default link (2) allows you to change the
default action on the policy. For a default deny policy, choose the Deny_IP default action.
Warning: Do not change default action to deny until all TrustSec elements have been configured
and the policy has been tested with monitoring mode or log analysis.
212
Industrial Security 3.1 Design Guide
213
Industrial Security 3.1 Design Guide
5. On the Advanced Configuration step, choose the device from the Devices list if there
are any template settings to be configured. When finished, or if no template is applied,
click the Next button.
6. On the Summary page, review the configuration to be added to the device. Click the
Deploy button.
After the device has been provisioned, it will be in the device list of the specified Site.
Note: Provisioning a device that has already been configured with AAA before being discovered
will fail. Remove any AAA configuration before pushing AAA using Cisco Catalyst Center.
214
Industrial Security 3.1 Design Guide
215
Industrial Security 3.1 Design Guide
216
Industrial Security 3.1 Design Guide
description endpoint
switchport access vlan $dataVlan
switchport mode access
device-tracking attach-policy IPDT_POLICY
#if($netflowPolicy)
ip flow monitor dnacmonitor input
#end
access-session port-control auto
mab
dot1x pae authenticator
spanning-tree portfast
service-policy type control subscriber
IA_DOT1X_MAB_POLICIES
service-policy input CIP-PTP-Traffic
service-policy output PTP-Event-Priority
#if($stormControl)
storm-control broadcast level 3 1
#end
exit
vlan $dataVlan
#end
#foreach($uplinkInterface in $trunkInterfaces)
interface $uplinkInterface.portName
description trunk
switchport trunk allowed vlan $vlans
switchport mode trunk
#if($cts)
cts manual
policy static sgt $uplinkSGT trusted
exit
exit
#end
vlan $vlans
#end
217
Industrial Security 3.1 Design Guide
218
Industrial Security 3.1 Design Guide
219
Industrial Security 3.1 Design Guide
220
Industrial Security 3.1 Design Guide
3. Enter the subnet details. The session mappings of the network devices with IP addresses
from this subnet are sent to the SXP domain selected from the SXP Domain drop-down
list.
4. From the SXP Domain drop-down list, choose the SXP domain to which the mappings
must be sent.
5. Click Save.
221
Industrial Security 3.1 Design Guide
Note: follow the Integrating Cisco Cyber Vision with Cisco Identity Services Engine (ISE) via
pxGrid document to use Cisco Cyber Vision attributes for ISE profiling.
222
Industrial Security 3.1 Design Guide
223
Industrial Security 3.1 Design Guide
#MODE_END_ENABLE
#end
vlan 2
remote-span
interface AppGigabitEthernet 1/1
switchport mode trunk
exit
monitor session 1 source interface $intRange
monitor session 1 destination remote vlan 2
monitor session 1 destination format-erspan 169.254.1.2
224
Industrial Security 3.1 Design Guide
225
Industrial Security 3.1 Design Guide
block tcp any any -> any 20000 (msg:"drop DNP3 read";
dnp3_func: 1; classtype:misc-activity; sid:1000001;)
block tcp any any -> any 20000 (msg:"block DNP3 write";
dnp3_func: 2; classtype:misc-activity; sid:1000002;)
alert tcp any any -> any 20000 (msg:"DNP3 select";
dnp3_func: 3; classtype:misc-activity; sid:1000003;)
alert tcp any any -> any 20000 (msg:"DNP3 operate";
dnp3_func: 4; classtype:misc-activity; sid:1000004;)
alert tcp any any -> any 20000 (msg:"DNP3
direct_operate"; dnp3_func: 5; classtype:misc-activity;
sid:1000005;)
alert tcp any any -> any 20000 (msg:"DNP3
direct_operate_nr"; dnp3_func: 6; classtype:misc-
activity; sid:1000006;)
alert tcp any any -> any 20000 (msg:"DNP3 immed_freeze";
dnp3_func: 7; classtype:misc-activity; sid:1000007;)
alert tcp any any -> any 20000 (msg:"DNP3
immed_freeze_nr"; dnp3_func: 8; classtype:misc-activity;
sid:1000008;)
alert tcp any any -> any 20000 (msg:"DNP3 freeze_clear";
dnp3_func: 9; classtype:misc-activity; sid:1000009;)
alert tcp any any -> any 20000 (msg:"DNP3
freeze_clear_nr"; dnp3_func: 10; classtype:misc-activity;
sid:1000010;)
alert tcp any any -> any 20000 (msg:"DNP3
freeze_at_time"; dnp3_func: 11; classtype:misc-activity;
sid:1000011;)
alert tcp any any -> any 502 (msg:"Modbus Read Coils
request"; modbus_func: 1; classtype:misc-activity;
sid:1000133;)
alert tcp any any -> any 502 (msg:"Modbus Read Discrete
Inputs"; modbus_func: 2; classtype:misc-activity;
sid:1000134;)
alert tcp any any -> any 502 (msg:"Modbus Read Holding
Registers"; modbus_func: 3; classtype:misc-activity;
sid:1000135;)
alert tcp any any -> any 502 (msg:"Modbus Read Input
Registers"; modbus_func: 4; classtype:misc-activity;
sid:1000136;)
drop tcp any any -> any 502 (msg:"Modbus Write Single Coil";
modbus_func: 5; classtype:misc-activity; sid:1000137;)
226
Industrial Security 3.1 Design Guide
alert tcp any any -> any 502 (msg:"Modbus Write Single
Register"; modbus_func: 6; classtype:misc-activity;
sid:1000138;)
alert tcp any any -> any 502 (msg:"Modbus Read Exception
Status"; modbus_func: 7; classtype:misc-activity;
sid:1000139;)
alert tcp any any -> any 502 (msg:"Modbus Diagnostics";
modbus_func: 8; classtype:misc-activity; sid:1000140;)
alert tcp any any -> any 502 (msg:"Modbus Get Comm Event
Counter"; modbus_func: 11; classtype:misc-activity;
sid:1000141;)
227
Industrial Security 3.1 Design Guide
228
Industrial Security 3.1 Design Guide
SecureX Ribbon
Part of the SecureX design philosophy is that you shouldn’t have to navigate to multiple different
consoles to get all the functions you need for one business task. The SecureX ribbon brings this
philosophy to reality across the portfolio. Via the ribbon, a persistent bar in the lower portion of
the UI of all ribbon-capable products, you have access to all the functions lent to SecureX by all
your deployed SecureX-capable technologies. The ribbon is collapsible and expandable to open
ribbon apps, launch integrated applications, and view your account profile. From the ribbon, you
can pivot between SecureX or the console of any integrated product, into any other integrated
product, and search the current web page for malicious file hashes, suspicious domains and other
cyber observables. You can then also add observables to a case or investigate observables in the
threat response app.
229
Industrial Security 3.1 Design Guide
The SecureX ribbon is a feature of Cyber Vision and appears on the bottom of the Cisco Cyber
Vision Center user interface.
230
Industrial Security 3.1 Design Guide
• Casebook: save, share, and enrich threat analysis to enable documentation of all analysis
in a cloud casebook so seamlessly work a case across multiple tools, Cisco or otherwise
and better collaborate among staff
• Response Actions: enforce protective controls without pivoting to other product consoles
Figure 142 SecureX Threat Response Example
It is possible to launch a SecureX investigation from Cisco Cyber Vision Center. The Cyber
Vision baseline feature can help highlight unexpected and potentially malicious activity in the
network by monitoring a known good state for any changes. Often, an infected device starts by
scanning the network to identify vulnerable components to attack. This traffic anomaly can be
easily identified using Cisco Cyber Vision Monitor Mode. To cross launch an investigation in
SecureX Threat Response, click on the Investigate in Cisco Threat Response button after
clicking on the suspicious component.
SecureX Orchestration
SecureX orchestration automates repetitive and critical security tasks such as threat investigation,
hunting, and remediation use cases. SecureX orchestration provides pre-built workflows and
response capabilities, or you can build your own with a no/low-code, drag-drop canvas to
strengthen operational efficiency and precision, and lower operational costs.
231
Industrial Security 3.1 Design Guide
SecureX orchestration enables you to define workflows that reflect your typical security
processes; the automation steps (activities), the logic or flow between these steps, and how to
flow data from one step to the next. With SecureX, you can leverage Cisco Secure and third-
party multi-domain systems, applications, databases, and network devices in your environment to
create these workflows. An example workflow would be to take an IP address, or hostname and
assign that endpoint an SGT in ISE that would ultimately block communication from occurring
on the network.
232
Industrial Security 3.1 Design Guide
Figure 144 Invoking SecureX Orchestration Workflow from the Ribbon in Cyber Vision
233
Industrial Security 3.1 Design Guide
234
Industrial Security 3.1 Design Guide
• Enter your Splunk account credentials and click Agree and Install.
• Repeat the same process for the Cisco Cyber Vision Splunk App.
• In Splunk Enterprise, click on Apps and verify that both apps are successfully installed.
Figure 147 Splunk Apps menu after the Cyber Vision apps have been installed
• In Cyber Vision, navigate to Admin > API > Token and click + New Token
235
Industrial Security 3.1 Design Guide
• Navigate to the Splunk Cyber Vision Add On and select Configuration > Add
Figure 150 Cyber Vision add on configuration page
236
Industrial Security 3.1 Design Guide
Note: before processing, we need to decide which SSL certificate verification method to use. There
are 3 possibilities
• No SSL certification verification (ok for lab/PoC use)
• SSL certificate verification, self-signed certificate
• SSL certificate verification, certificate authority
Proceed to the appropriate section depending on the decision.
No SSL certification verification
• In the Splunk CLI, change VERIFY_SSL (line 10) in the file
TA_cisco_cybervision_utils.py from True to False
Figure 151 Disabling certificate verification in Splunk Enterprise
• In the Splunk Cyber Vision Add On, use the API token from the earlier steps and
complete the fields to connect to Cyber Vision
Figure 152 Adding Cyber Vision to Splunk Enterprise with no certificate
237
Industrial Security 3.1 Design Guide
238
Industrial Security 3.1 Design Guide
Adding Input(s)
• In the Cyber Vision Add On, navigate to Inputs.
• Click Create New Input > Cyber Vision Events
• Complete the fields as shown in the image.
239
Industrial Security 3.1 Design Guide
Note: It is recommended to start with a long interval between updates. After a few days, check
the data usage required for your deployment and the modify the interval to an appropriate
shorter timespan (if desired). The “Start Date” field only applies the first time the add on pulls
data from Cyber Vision. After that, the add on asks for any new sata that has occurred since the
last data request.
• Repeat the process for Devices, Flows, Activities and Vulnerabilities.
Data can now be visualised in the Cyber Vision App for Splunk. An example dashboard can be
seen below.
240
Industrial Security 3.1 Design Guide
Figure 157 Sample dashboard from the Cyber Vision app for Splunk
The other option for data ingestion is through Syslog, which provides more real time data
ingestion. This is a recommended option if the add on has been configured for long update
intervals.
• In Splunk Enterprise, navigate to Settings > Data inputs
241
Industrial Security 3.1 Design Guide
Figure 158 Splunk Enterprise settings menu for data inputs navigation
242
Industrial Security 3.1 Design Guide
Figure 160 Configuring the TCP input with port 514 which is the standard syslog port
• Select sourcetype cisco:cybervision:syslog and select the Cyber Vision Add on as the
App content
243
Industrial Security 3.1 Design Guide
Figure 161 Input setting ensures data is indexed into the correct format upon arrival
244
Industrial Security 3.1 Design Guide
• Add the Splunk IP address and specify port 514. Note: The use of port 514 is
configurable, just make sure both sides of the configuration match.
Figure 163 Configuring syslog to be sent to Splunk
Nothing more is needed from this point, but data may not appear immediately. Users need to wait
for the next Cyber Vision event to occur so a syslog message is generated.
245
Industrial Security 3.1 Design Guide
246
Industrial Security 3.1 Design Guide
• Click New Index to create a new index to store all the data received in ISE
• In Splunk, navigate to Settings > Data > Data inputs
• Click + Add new in the TCP row to create a syslog listener for ISE events
• Choose port 1468, and click Next
• Select Source Type cisco:ise, App Context Cisco ISE (Splunk_CiscoISE) and Index
as the newly created index from the previous step.
Figure 165 Splunk settings for consuming syslog from Cisco ISE
• In ISE, navigate to Administration > System > Logging > Remote Logging Targets
• Click +Add to add Splunk as a new syslog target
• Enter the connection details for the Splunk server, change the Target Type to TCP
SysLog and increase the Maximum Length for messages to 8192.
247
Industrial Security 3.1 Design Guide
• Navigate to Logging Categories and for each category you are interested in sending to
Splunk, click Edit and add the new logging target to the selected list.
248
Industrial Security 3.1 Design Guide
• At this point all the connections have been successfully setup, however, we may need to
provide the Splunk user with enough permission to read from the newly created security
Index (this step will be non-applicable if the default Index was used).
• In Splunk, navigate to Settings > user and Authentication > Roles
• Select the role of “user” and enable the “Default” checkbox for the newly created index
for ISE.
• Click Save.
249
Industrial Security 3.1 Design Guide
Appendix H - References
• MITRE ATT&CK for ICS - https://attack.mitre.org/matrices/ics/
• Networking and Security in Industrial Automation Environments Design and
Implementation Guide -
https://www.cisco.com/c/en/us/td/docs/solutions/Verticals/Industrial_Automation/IA_Ho
rizontal/DG/Industrial-AutomationDG/Industrial-AutomationDG.html
• Cisco Cyber Vision Home Page -
https://www.cisco.com/site/us/en/products/security/industrial-security/cyber-
vision/index.html
• Cisco Cyber Vision Data Sheet -
https://www.cisco.com/c/en/us/products/collateral/se/internet-of-things/datasheet-c78-
743222.html
• Cisco Cyber Vision Architecture Guide -
https://www.cisco.com/c/dam/en/us/td/docs/security/cyber_vision/Cisco_Cyber_Vision_
Architecture_Guide_V2-00.pdf
• Cisco Cyber Vision GUI Administration Guide -
https://www.cisco.com/c/en/us/td/docs/security/cyber_vision/publications/GUI-
Administration-Guide/b_cisco-cyber-vision-GUI-administration-guide.html
• Cisco Identity Service Engine Home Page -
https://www.cisco.com/site/us/en/products/security/identity-services-engine/index.html
• Cisco Identity Services Engine Administrator Guide -
https://www.cisco.com/c/en/us/td/docs/security/ise/3-
2/admin_guide/b_ise_admin_3_2.html
• Cisco SecureX Home Page - https://www.cisco.com/site/us/en/products/security/securex-
platform/index.html
• Splunk Enterprise docs - https://docs.splunk.com/Documentation/Splunk
• Verizon 2025 Data Breach Investigations Report -
https://www.verizon.com/business/resources/reports/dbir/
• Waterfall 2025 OT Cyber Threat Report - https://waterfall-security.com/ot-insights-
center/ot-cybersecurity-insights-center/2025-threat-report-ot-cyberattacks-with-physical-
consequences/
250
Industrial Security 3.1 Design Guide
251
Industrial Security 3.1 Design Guide
252
Industrial Security 3.1 Design Guide
253