Professional Documents
Culture Documents
CybersecurityWWWEN
CybersecurityWWWEN
Deploy ransomware on Lock the system Claim money from PC Deliver key to
a PC via mail, USB, etc. with ransomware owner for unlocking unlock the system
2015 2017
2007 Forecast costs US$20
The first known cyber-attack on a costs US$370 million
billion by 2021
country was mounted on Estonia in
April 2007, affecting the online a ransomeware attack
services of banks, media outlets every 11 seconds in
and government bodies for weeks. 2021
2019
According to Verizon*, 86 %
of breaches committed in
2016 2019 were financially
a ransomeware attack every motivated and 10 % by
40 seconds espionage
critical infrastructure
All over the world people work hard to prevent such things to happen
3 • Cybersecurity is an effort
• in time
• in money
• in Know-How and experience
• in inhouse employees with Know-How and experience
Why should one spend time and money to gain Know-How and experience, when everthing runs fine?
Plant security
Defense
• Physical access protection
in depth
• Processes and guidelines
• Security services protecting systems
Network security
Security • Cell protection
• Perimeter network
threats • Firewalls and VPN
System integrity
• System hardening
• Patch-Management
• Detection of attacks
• Authentication and access protection
International Standard IEC 62443/ As the first company to receive TÜV ANSSI certifies and gives a classi- As the first provider of automation
ISA99, in particular, has proven its SÜD certification based on IEC fication to some Siemens products. technology, Siemens holds Level
worth in the industrial automation 62443-4-1 for the interdisciplinary 2 certification for Communication
environment. It is aimed both at plant process of developing Siemens Robustness for multiple controls,
operators, integrators and component automation and drive products, CPs and DPs.
manufacturers, and covers all including industrial software, Siemens
security-relevant aspects of Industrial received the certification at seven
Security. development sites in Germany.
Security implementation
• Secure reference architecture blueprints and secure
configuration guides acc. IEC62443-3-3
• Checklist allows a comprehensive implementation of cyber security in W&WW
WTP and WWTP “large” WTP and WWTP WTP and WWTP “small” Secure operation
WinCC Open Architecture “medium” WinCC V7 WinCC RT PROF/TIA • IEC62443-3-3 compliance supports TÜV certification
of the specific customer installation
Secure Configuration guides according to IEC62443-3-3, • Siemens industrial security services ensure a secure
implementation of technical measures to fulfil Blueprint security operation over the lifecycle
requirements
Available for all WinCC Systems for typical
water and waste water treatment plant sizes Siemens has developed a consistent security
(Release in June 2020)
concept, which is unique in the market
Robustness
Security
Stability
Transport Discovery
Protocol Detection of Servers
Cybersecurity Services
https://new.siemens.com/global/en/products/services/cybersecurity.html