Skip to content Skip to navigation Skip to footer

操作技術的網路安全

操作技術(OT)和資訊技術(IT)的結合,會影響工業控制系統(ICS)和監督控制與資料擷取(SCADA)系統的安全性。透過 OT-Aware Fortinet Security Fabric 安全織網在複雜的基礎設施中採用安全性設計,OT 組織可以用高效、不中斷的方式,確保 OT 環境受到保護且合乎規範。

scada ics ot report

2023 年操作技術和網路安全狀態

保護 OT 系統的重要性已提升到前所未有的程度,有越來越多的組織將他們的 OT 環境連上網際網路。雖然 IT/OT 融合有許多好處,但它正受到破壞性的進階網路威脅的阻礙和傷害。這些攻擊的溢出效應,越來越常以 OT 環境為目標。

了解更多

適用於 OT 環境的 Fortinet Security Fabric 安全織網

借助 Fortinet Security Fabric 安全織網,可順利實現融合 IT/OT 生態系統的安全性。它提供以 OT 為中心的功能和產品,將 Security-Fabric 功能擴展到 OT 網路。為了減輕整個組織的安全風險,Fortinet 增強了 OT 安全性產品線。創新的範圍從邊緣產品一直延伸到 NOC/SOC 工具和服務,以確保高效能。

立即觀看
power utilities solution

操作技術網路安全解決方案指南

隨著數位轉型(DX)加速,組織要瞭解 IT 與 OT 網路之間的相似性和差異性,這一點十分重要。Fortinet Security Fabric 安全織網可保護 OT 和 IT 網路的數位攻擊面。部署 Fabric,可為您的安全環境提供可視性、整合、自動化和彈性。

了解更多

挑戰

缺乏有效的安全性

大多數工業控制系統有效的安全性設計,無力應對變革。

擴大攻擊面

隨著氣隙保護減弱,網路實體資產的攻擊面越來越大。

IT-OT 網路

數位轉型(產業 4.0)計畫正在推動 IT-OT 網路的融合。

連線能力提高

5G、loT 和雲端等技術增加了複雜性,必須受到保護。

擴展安全遠端存取

第三方和員工的遠端存取要求會造成額外風險。

技能差距風險不斷增長

資產所有者對 OEM 和 SI 的依賴讓關鍵系統面臨額外風險。

Fortinet 的 ICS/SCADA 解決方案

保護雲端和外部區域,包括網際網路、雲端和 VPN。這些區域透過雲端防火牆、VPN 閘道、單一登入和多因素驗證加以保護

Purdue 模型

Fortinet 的網路架構參考 Purdue 模型,以區分 IT 和 OT 解決方案。 幸運的是,對於尋求供應商整合和 IT/OT 融合的客戶來說,Fortinet IT Security Fabric 安全織網和 Fortinet OT-Aware Security Fabric 安全織網實現了 IT 和 OT 之間的無縫網路和安全運作。 以下是 Fortinet 保護 IT 和 OT 的產品和服務的細項。

保護雲端和外部區域,包括網際網路、雲端和 VPN。這些區域透過雲端防火牆、VPN 閘道、單一登入和多因素驗證加以保護

雲端和外部區域

網際網路/WAN 區域提供對基於雲端的計算和分析服務的存取,以支援營運環境中的 ERP 和 MRP 系統。為了進行強效驗證,使用雙因素驗證 (2FA) 和 VPN 通道來驗證身分並保持資料隱私。

保護業務和企業區域,包括 IT 和融合的 IT 和 OT、企業網路(企業系統和網路),以及業務規劃和物流(現場系統和網路)。這些區域受到沙箱、欺敵、SIEM、SOAR、安全型 SD-WAN、特別存取權限管理、網站應用程式防火牆,以及 Fabric-Ready 合作夥伴等各種技術保護

業務和企業區

企業區域通常位於企業層級,涵蓋多個設施、地點或工廠,而業務系統則負責執行營運任務,並包括 IT 網路和安全營運中心(IT NOC/SOC)。

企業區域與現場作業區域之間,是融合的 IT 和 OT 區域,又稱為非軍事區(DMZ)。DMZ 可讓組織安全地連接具有不同安全要求的網路。安全保護包括驗證和業務區隔,提供可視性、控制和態勢感知,以管理已知和未知的威脅。驗證網路上的人員和內容,並為使用者、裝置、應用程式和通訊協定提供角色型存取控制。利用沙箱模擬分析與偵測,防範未知的威脅,並提供業界資安訊息給 NOC/SOC。

保護操作與控制區域,這些區域包含模擬、工程與測試。這些區域受到隔離防火牆、網路存取控制、集中報告和集中政策的保護

操作和控制區域

Site Operations 可將設施中執行流程的所有系統集中控制,並加以監控。這是 OT 系統與 IT 系統共用資料的地方。FortiGate 新一代防火牆設備經常部署在此處,以實現頂級保護和分段,同時提供可視性和控制。

製程控制區包括區域監督控制(HMI、歷史資料庫)、基本控制(PLC、RTU、IED)及製程(執行器、感應器)。這些區域受到多種技術保護,包括透明防火牆、應用程式控制、入侵防護、端點偵測與回應、安全網路交換器、安全 wi-fi 存取點、安全無線網路延伸器,以及零信任網路存取。

製程控制區

工控區是生產所在。此區域包含 PLC 和 RTU 等數位控制元件,可將 IP 通訊轉換成序列指令,包括支援 IoT 裝置的其他網路。此區域中的 Fortinet 產品包括:FortiGate、FortiSwitch 和 FortiAP。

案例研究

有了 Fortinet,團隊的努力可以更進一步,因為我們可以讓許多事物自動完成。這代表我們可以用同樣的團隊,為教育社群提供更多的支援。」
- Humberto Vidal, IT 協調人員, FIEB
我們對於使用 FortiGate 新世代防火牆 NGFW 的經驗非常好,更廣泛的 Fortinet Security Fabric 安全織網所提供的整合層級,以及 Fortinet 具有競爭力的價格,讓人印象深刻。重要的是,Fortinet 還可以提供存取聯邦政府和州級資金所需的安全級別,交付也是依據 NIST(國家標準和技術研究院)的網路安全框架。」
- Eric Scholl, 資安長, GASD
Fortinet 每天查看大量設備,讓我們能獲得最近的威脅快照,幾乎可以立即更新我們的平台。有了 FortiAnalyzer,我們能透過監視器實際查看威脅形勢,是個很棒的工具,我們的客群也很喜歡。」
- Dave Cahoon, 技術長, Red Bison Technology Group
公司受益於可安全遠端存取鑚油機,並對所有相關 OT 系統有完整的可視性。透過將日誌記錄和危害指標(IOC)與客戶的 SOC 完全整合,內部安全團隊能夠更好地識別及降低威脅。
- , Maritime Drilling Rig Operator
現在,網路和資安集中在一處,成為一體。彼此不可或缺。」
- Tri Nguyen, IT 總監, Waukesha-Pearce Industries
我們的目標是協助客戶管理業務風險,並提升價值。Fortinet 在 OT 網路基礎設施和安全態勢現代化方面,發揮了關鍵作用。」
- Tarun Patel, 產品總監, Oxford Properties Group

相關產品

網路安全,無處不在

體驗

透過自助導覽,體驗 Fortinet Security Fabric 安全織網如何應對操作技術中的網路安全挑戰。

了解更多

資源

分析報告
白皮書
解決方案簡介
電子書
檢查清單
影片
How to Use NERC-CIP: An Overview of the Standards and Their Deployment with Fortinet
How to Use NERC-CIP: An Overview of the Standards and Their Deployment with Fortinet »

This paper is a unique review of a few key products and how those products align with existing CIP regulation requirements. This paper also takes a look at how those products might aid an organization in the process of maintaining compliance and explores the product features that will help defend the organization’s program during an audit.

Effective ICS Cybersecurity: Using the IEC 62443 Standard
Effective ICS Cybersecurity: Using the IEC 62443 Standard »

IEC 62443 is a set of Industrial Control System (ICS) security standards written by ICS experts for ICS owners, manufacturers and integrators across a range of applications and sectors. Evaluating assigned security levels within identified security zones and conduits against functional and system requirements provides a cohesive approach to security. Fortinet teamed with the SANS Institute to review the standard and the needs from technology that support implementation. With guidance from IEC 62443 and implementation of Fortinet’s solutions, you can address the security of an ICS strategically.

2022 State of Operational Technology and Cybersecurity Report
2022 State of Operational Technology and Cybersecurity Report »

The 2022 State of Operational Technology and Cybersecurity Report, now in its fourth annual iteration, finds that organizations are still moving too slowly toward full protection of their operational technology (OT) assets.

Cybersecurity in Water Management Facilities
Cybersecurity in Water Management Facilities »

Fortinet surveyed water utility leaders during the fourth quarter of 2021 to understand utilities’ status and future needs for improved water system cybersecurity

A Solution Guide to Operational Technology Cybersecurity
A Solution Guide to Operational Technology Cybersecurity »

This comprehensive guide explains how Fortinet effectively provides security throughout the interconnected IT and OT infrastructure while fully enabling integration across Fortinet and partner security solutions and supporting security automation across the entire security ecosystem.

Effective Implementation of the NIST Cybersecurity Framework with Fortinet
Effective Implementation of the NIST Cybersecurity Framework with Fortinet »

This paper reviews the NIST-based approach to implementing security for an ICS/OT, referencing the NIST Cybersecurity Framework (CSF), the five cybersecurity Critical Controls from the SANS Institute that are most relevant to ICSes, and Fortinet Security Fabric technologies. We also examine how to effectively support and implement the NIST CSF and explore how some of Fortinet’s cybersecurity offerings can help an organization fulfill its ICS/OT security road map.

Enabling NIS2 Directive Compliance with Fortinet for Operational Technology
Enabling NIS2 Directive Compliance with Fortinet for Operational Technology »

The NIS2 Directive (NIS2) is an improved approach to cybersecurity controls, with an expanded scope and mandatory penalties.

Independent Study Finds That Security Risks Are Slowing IT-OT Convergence
Independent Study Finds That Security Risks Are Slowing IT-OT Convergence »

Aligning Your Security Program with the NIS Directive
Aligning Your Security Program with the NIS Directive »

Securing OT Systems in the Face of Rapid Threat Evolution
Securing OT Systems in the Face of Rapid Threat Evolution »

As organizations modernize and embrace efficiency gains from Industrial Internet-of-Things (IIoT) technologies, the air gap between IT and OT disintegrates, and the attack surface expands. OT sensors are increasingly being integrated into IT networks to interface with machine learning and big data technologies. This connectivity creates both competitive advantage for the company and an increased risk of cyber intrusion. The growing attack opportunities are especially problematic because “headless” OT devices were not designed with security in mind.

Simplifying SD-WAN Operations with Single-Pane Management
Simplifying SD-WAN Operations with Single-Pane Management »

Fortinet simplifies SD-WAN operations with network operations center solutions

Fortinet Secures OT Networks Against Advanced Threats
Fortinet Secures OT Networks Against Advanced Threats »

OT-specific threat intelligence provided by FortiGuard Labs and Fortinet partners delivers the insight and context required to identify and remediate OT-specific threats.

Securing OT Networks with Microsegmentation
Securing OT Networks with Microsegmentation »

Read how Fortinet microsegmentation it is possible to implement a zero-trust security policy and to scan all traffic within a VLAN using a next-generation firewall (NGFW)

Fortinet Provides Zero-day Protection in OT Environments
Fortinet Provides Zero-day Protection in OT Environments »

Sandboxing and deception solutions complement each other in detecting zero-day threats. To fulfill their role in the kill chain, each must then share detected threat intelligence with an integrated next-generation firewall (NGFW). The NGFW enforces internal network controls (via segmentation) and updates broader OT defenses to block any previously unknown forms of attack. FortiSandbox and FortiDeceptor support comprehensive OT security—including intelligence sharing for protection against zero-day threats.

Securing Open Platform Communications in OT Environments with FortiGate Next-generation Firewalls
Securing Open Platform Communications in OT Environments with FortiGate Next-generation Firewalls »

Fortinet FortiGate next-generation firewalls (NGFWs) are not only able to understand OPC but they also provide granular control of more than 250 standard OPC functions. Additionally, the FortiGate application control feature supports more than 30 different OT/ICS protocols.