Cisco Cyber Vision for Operational Technology (OT) Security

Author: Fatih Ermis | Senior Solution Consultant

Section 1: What is Cisco Cyber Vision?

The security layers used for IT have now become indispensable for OT security. Especially recently, most data leaks are made by infiltrating the inside through different means. It is seen that security products positioned for North-South internet traffic are not sufficient for such leaks. In addition to North-South traffic, similar data leaks can be prevented by routine anomaly/vulnerability scans on the East-West, i.e. horizontal axis.

Although most OT products work on intranet (closed circuit / closed to the internet) systems, information security gaps can occur at many points with different integrations. One of the biggest problems in OT technologies is visibility. One of the reasons for this is that there are too many devices in the structures and the structure is constantly being expanded uncontrollably by making additions. In addition, it can be added that a structure of this size cannot be intervened without any problems. Both the fact that critical services are running on it and that very serious financial losses can be experienced in the event of a problem can cause obstacles by the management in making the necessary improvements and/or security additions.

To prevent similar situations from occurring, Cisco aims to prevent such problems with its Cyber ​​Vision product, which increases the visibility of OT environments, reveals existing threats, and creates existing inventories.

Cyber ​​Vision to your institution;

  • Providing full visibility for OT environments (assets and processes)
  • Real-time monitoring of your dynamically changing inventory and network

( Dynamic Asset Management and Monitoring )

  • Providing the same information security for the OT network as for IT,
  • It will take your organization's security to the next level with comprehensive threat intelligence.

Security Assessments

Securing your OT infrastructure starts with a clear view of your asset inventory, communication models, and accurately positioned network maps (network topologies). Cyber ​​Vision automatically generates a list of your industrial assets and detailed network maps.

 

Network Segmentation

Industrial security applications (best practices) recommend that networks be moved to compatible architectures, and in order to prevent a possible attack from spreading to the entire architecture, network segmentation and the ability to create policies between these segmented networks provide great benefits to institutions in terms of information security vulnerabilities. In this area, Cisco Cyber ​​Vision product integrates with Cisco ISE (Identity Service Engine) to create asset groups and enables segmentation policies to be applied dynamically (dynamic network segmentation).

 

Standard IT cyber security solutions and methods may not always be sufficient to meet OT cyber security needs. In response to this need, Cisco has introduced its Cyber ​​Vision product for the security of OT technologies.

Chapter 2: Cyber ​​Vision Installation

To download Cyber ​​Vision Center software;

https://software.cisco.com/download/home/286325414/type

Features required for a virtual environment;

You can install and test Cyber ​​Vision Center in a virtual environment with 2 CPUs, 6G RAM and 50GB HDD.

The installation steps are as follows;

  • Cyber ​​Vision software is downloaded from Cisco's website
  • The downloaded .ova file is uploaded to the virtual environment.

  • The installed virtual machine is opened and the system is started.

  • Click “Start” to start the Cyber ​​Vision Center installation.

  • Relevant DHCP settings are made.

  • Once the configuration is complete, the necessary information is entered into the Cyber ​​Vision Center interface.

The Cyber ​​Vision Center main screen is designed very simply and the Dashboard screen includes event levels with descriptions as critical, high, medium and low.

If we need to summarize Cyber ​​Vision in 4 main features, we can summarize it as collecting all the information of the inventories by collecting meaningful information from your OT network via passive sensors using DPI technology; taking these inventories under control, generating an alarm when any possible opening/anomaly is detected and finally, providing comparative data for taking action by examining the records of past traffic movements.

There are 2 options for Cyber ​​Vision Licensing. Essential and Advantage licenses. In addition 

As with many of Cisco's security products, a 90-day Essential or Advantage trial license is available.

Cyber ​​Vision consists of 2 main components, Cyber ​​vision center (Hardware and Software) and Sensors. Cyber ​​vision center can be installed in a virtual environment.

You can monitor security activities in your OT network from the Cyber ​​Vision Center interface.

With the Network Explore feature, the map of which TAGGED or unTAGED devices are communicating with whom will increase the visibility of your network.

You can easily access reports on what type of vulnerabilities there are in your network, the score information, and the vulnerabilities that need to be closed.

Related articles

Riverbed Alluvio NetProfiler

Author: Emin YÖNEY | Senior Solution Consultant

Alluvio NetProfiler is a software designed for network performance monitoring and management. This software is preferred and used by network administrators and other related technical personnel.

Read more »
Contact Us

Write Your Requirements and We Will Contact You

We are happy to answer your questions and help you determine which of our services best suits your needs.

Advantages
Then what happens?
1

We will schedule a call at your convenience

2

We are having an exploratory and advisory meeting

3

We are preparing an offer

Consult Us