専門家に問い合わせる

Overview

Expansive Industrial Cybersecurity Protection

In a complex world of ever-evolving technologies, Nexus Controls, a Baker Hughes business, understands the importance of having an experienced industrial cybersecurity partner to help you safely secure your digital assets. 

As a leading provider of operational technology cybersecurity solutions for more than a decade, Nexus Controls is well-equipped to enhance the security posture of your enterprise, achieve greater visibility to protect critical assets, and support internal and external compliance policies and requirements.

Nexus OTArmor Cybersecurity Platform
Application Allow Listing

With the application whitelisting option, Windows®-based devices have an improved security posture by reducing the risk and cost of malware, improving network stability and reliability. 

This feature automatically identifies trusted software that is authorized to run on control system HMIs and prevents unknown or unwanted software.

cybersecurity
Asset Management
Image
asset management diagram

Continuous threat monitoring and advanced logging intelligence that gives you deep, granular ICS visibility. By analyzing network traffic through deep packet inspection and fluent in over 42 of the native industrial protocols commonly found in ICS security, a baseline is constructed of normal operations which is then used to detect anomalies.

Asset Identification

  • Identify and list the assets present on the networks monitored
  • Identify information such as make, model, firmware, Operating System, installed software

Asset Configuration Change Detection

  • Identify if a change has occurred over the network or to the devices on the network which may indicate a compromise
  • Identify if a change has occurred to an industrial device which may be an indicator of a compromise

Methods of Discovery

  • Active discovery
  • Passive discovery
  • Hybrid discovery

Nexus Controls OTArmor Cyber Asset Protection Factsheet

Data Security

Automatic, centralized backup and recovery of the process control domain saves time and cost by deploying a quick disaster recovery plan with minimal downtime. 

All backup activities are logged and easily accessed for generating reports that conform with compliance reporting.

filtered shot of a rack server interface
Data Diodes

hardware-based electronic device designed with two separate circuits - one send-only, and one receive-only - which physically constrain the transfer of data to one direction only and form an “air gap” between the source and destination networks.

A data diode is a physical piece of hardware that acts as a unidirectional network communication device that facilitates a secure, one-direction transfer of data between networks. Their design inherently creates a physical separation between the source and destination networks. Data diodes effectively eliminate any and all external points of entry to the sending system, thus preventing unauthorized users the ability to gain access to the protected network.

By securing a network's data outflow, data diodes make it impossible for any third party to inject malware, access your system, or make any harmful changes to your network.

Data diodes can be used to protect network segments of all sizes, from a single controller to an entire facility.

a visual representation of a multi-connection network
Network Security

This customizable network security option monitors and blocks malicious activity and attacks and provides continuous visibility of unusual activity and potential threats to the control system network.

Stateful tracking of network traffic to allow approved communications between connected devices and the “outside” network. In addition, Next Generation Firewalls can inspect certain network traffic types to identify ports that may change during communications to ensure traffic is permitted to flow (e.g. FTP, TFTP). 

Next Gen Firewalls have the ability to perform additional checks on traffic including application-level inspection and filtering of network traffic with exception.

an image of a computer with lines of code in the dark
Patch Management (Centralized)

Patching your systems is one of the essential first steps to take to protect your assets and assure the operating systems and programs running have updates to provide the latest security protection without risking your operation. Listed as two of the “First Five Quick Wins” by The SANS Institute, a well-respected authority on information security and cybersecurity training, patching of application and system software is critical to improving and maintaining a high-security posture.

The Cyber Asset Protection subscription provides monthly software and firmware updates for your HMI, historians, switches, firewalls, OSM and RSG, including essential security patches. With Nexus OTArmor, patches can be centrally deployed, eliminating an average of four hours per HMI of work hours, which can save up to $20,000 monthly per plant.

Cyber Security Lock
Role-Based Access Control (RBAC)

Provides centralized control and management specific to the controls environment, enabling you to manage access to the industrial control system based on permissions. Benefits of RBAC include:

Increased Oversight for Admins -  RBAC gives admins and managers deeper visibility and greater oversight, while also controlling authorized users and guests on the system so that they are only given access to what they need for their respective roles.

Lower Risk -  By implementing RBAC, you have inherently restricted access to sensitive information while simultaneously creating logs of access for those with proper permissions, thus greatly reducing your risk of a data breach.

Cost Reduction -  By restricting a user's access to certain processes and applications, admins can effectively conserve their key system resources such as bandwidth, memory, and storage.

Enhanced Operational Efficiency - By employing an effective RBAC strategy, organizations can decrease the need for password changes when onboarding new hires or when a user has to switch their role within the organization. RBAC lets you quickly add and change user-defined roles, while greatly reducing the time and resources needed to implement these roles across platforms, operating systems, and applications.  Additionally, RBAC allows organizations to easily integrate outside, third-party users into their networks by assigning them predefined roles specifically designed for contractors and the like.

Improved Compliance -  Every industry has its own governmentally mandated standard for compliance. Most organizations prefer to implement RBAC systems to meet the regulatory and statutory requirements, thus allowing their IT departments to more effectively manage how their data is accessed and used. This is particularly important for power providers and their supporting plants/locations where unauthorized access to their networks represents a significant threat that manage sensitive data.

 

People's Corner: Sales 2
Security Information and Event Management (SIEM)

We provide a scalable solution with both real-time and historic dashboard views of cyber activity, such as changes to switch configurations, failed login attempts, unauthorized port access, and USB usage.

Operator Cybersecurity Dashboards

  • Nexus Controls designed dashboards
  • Data-rich Security Incidents & Events Management (SIEM)
  • Ready for Security Operator Center (SOC) integration
security data enrichment diagram
Multi-Factor Authentication (2FA)

Adopting stronger employee and vendor authentication is an easy method to reduce risk. 

Multifactor Authentication (MFA), sometimes referred to as two-factor authentication or 2FA, is a security protocol that requires a user to present two pieces of evidence when logging in to a given account or application. The most common example of multifactor authentication you'll typically encounter is when looking into your personal bank account. You will have one set of authenticators, your username and password for the site/app, and a second set of authenticators, usually by means of a separate device, i.e. your phone, where you will be sent a one-time code that must be entered into your banking site/app in order to proceed. This exponentially reduces the risks associated with brute force and stolen credential attacks as this 2FA protocol requires access to a separate device, and the window for authentication is typically pretty short. 

Multi-factor authentication combines hardware-based authentication and public key cryptography to ensure strong authentication and eliminate account takeovers.

tablet hands
Secure Remote Access
Image
diagram of secure remote access

zero-trust solution that safeguards against cyber risks, including insider threats, through its unique, browser-based hardened platform. Secure remote access technology provides a simple and secure access mechanism to critical assets by utilizing protocol and system isolation, encrypted display, and multi-factor authentication.

Benefits include:

 

  • Multi-Factor Authentication encrypted remote access
  • Secure gateway using Zero Trust secure access solution
  • Video replay technology for maximum isolation between plant operation assets and external remote access users
  • Granular access control mechanisms and mediated remote file transfer
  • Protect against zero-day malware utilizing advanced malware detection
  • Simultaneous user access, ideal for a work-from-home environment

Secure Remote Access Factsheet

Nexus OTArmor Cybersecurity Services
Managed Security Services (MSSP/MDR)

Nexus Controls’ team of cybersecurity analysts are experts in big data solutions like, Elastic Search, Splunk & Hadoop. These highly skilled forensic analysts review relevant logs to minimize false positives and maximize detection of threats

Whether you already have a Security Operations Center (SOC) or not, our 24X7 managed security services are scalable to meet your unique needs.

  • Industrial process control experienced
  • Ingest relevant logs to minimize false positives to maximize detection and forensics
  • Expert system assists analysts for human evaluation of most important threats
  • 24x7 operations, geographically distributed
  • Full integration with holistic threat intelligence (not just another feed)
  • Human-Led, OT/IT technology accelerated
Man looking at multiple cybersecurity screens
Patching Program

Cyber Asset Protection (CAP) is a key part of a defense-in-depth system for turbine, plant, and generator controls environments. The patching program includes operating system and application patches as well as anti-virus/ intrusion detection signatures to cover updates for HMIs, servers, switches, and network intrusion detection devices. Monthly updates can be applied to individual HMIs or via the Nexus OTArmor™ platform for network-wide deployment.

How it works:

The Cyber Asset Protection subscription provides monthly updates for your HMI, data historians, switches, firewalls, OSM and RSG. Software updates include:

  • Microsoft Windows® operating system
  • Intrusion detection signatures
  • Anti-virus signatures
  • Switch firmware updates, when impacted by a security vulnerability

The CAP subscription service also provides a monthly report of patches that need to be installed and the areas of which are critical for attention. Only the necessary patches are provided. Installing unnecessary patches, such as those coming directly from Microsoft, can increase the risks to the plant.

Benefits:

  • Provides tested updates to keep your legacy critical infrastructure current
  • Reduces downtime by providing only the necessary validated patches which are tested in an environment to assure applicability and compatibility
  • On a monthly basis, CAP keeps your risk profile updated and increasingly improves your security posture, by protecting your critical assets from known vulnerabilities
  • Helps you meet regulatory requirements and avoid fines
  • Improves safety and reliability by preventing loss of view
  • Provides a dedicated service manager for cybersecurity issues
Cyber Security Lock
Professional Services

Cybersecurity assessments:

Nexus Controls provide a large variety of security assessment services. They are designed so the CEO, CISO, Plant Manager, or Compliance Manager to prioritize steps for mitigation, and even to help obtain future budgets within a multi-year cybersecurity program. Types of Assessments offered include:

  • CIS Top 20 Controls
  • Highly complex risk assessments or Penetration tests
  • Product security assessment (IIOT, Controller, etc.)
  • Compliance gap (NERC, NEI, IEC, etc.)
  • Adversary Emulating Red Team Engagements
  • Hunting as a Service (HaaS)
  • Credential Risk Assessment
  • Network Architecture Assessment
  • Threat Risk Assessment
  • Vulnerability & Risk Assessment

The other professional services that Nexus Controls offers include:

  • Cybersecurity Profiling
  • Industrial Wireless Network Services
  • Cybersecurity/Compliance audits
  • Incident Response Planning
  • Incident Response: Onsite services
  • Forensics & Analysis services
  • Tabletop exercises (TTX) 
  • Virtual CISO
  • Prioritized Security Roadmap 
  • Advanced security consulting (Ex. architecture review)
  • Building the governance model and procedures (network security governance)
Nexus OTArmor Cybersecurity Certifications
Certifications

IEC 62443-2-4 (maturity level 2) certification ensures secure lifecycle of Nexus OTArmor as an integrated system. This ensures safe industrial operations through a detailed analysis of our engineering processes throghout the security lifecycle; product design, manufacturing, network and system security, installation, and commisioning.

IEC 62443 3-3 (security level 3) certified industrial cybersecurity platform that ensures that the Nexus OTArmor cybersecurity solution was engineered utilizing a secure product development lifecycle process that includes IEC defined functionality and maintainable security. Additionally, this certification validates that the Nexus OTArmor portfolio has undergone rigorous testing for security risks. 

These important industry certifications demonstrate our commitment to protecting industrial customers, including assisting them with regulatory and compliance requirements including NERC, NEI 08-9, CIS and NIST.

nexus exida certification

Get in touch with an expert.

Your request has been submitted.
Thank you for your interest. A specialist will be in touch with you shortly.