Skip to content Skip to navigation Skip to footer

运营技术网络安全

随着运营技术 (OT) 和信息技术 (IT) 网络的不断融合,工业控制系统 (ICS) 以及监控和数据采集 (SCADA) 系统面临更多安全挑战。凭借支持 OT 感知的 Fortinet Security Fabric 将安全性无缝融入复杂基础设施,助力 OT 组织全面保护 OT 环境,确保持续高效运营并满足合规性要求。

scada ics ot report

2023 年运营技术和网络安全态势

随着越来越多的组织加速实现 OT 与 IT 网络的互联互通,保护安全性薄弱的 OT 系统比以往任何时候都更加迫切。虽然 IT/OT 融合优势众多,但同样面临高级破坏性网络威胁的制约和阻碍。层出不穷的威胁正加紧向 OT 环境发起针对性攻击。

了解更多

面向 OT 环境的 Fortinet Security Fabric 安全平台

Fortinet Security Fabric 可为 IT/OT 融合生态系统打造无缝融合的安全防护体系。该安全平台无缝集成面向 OT 环境的优势功能及卓越的安全产品,并将其无缝扩展至 OT 网络。为有效缓解组织整体安全风险,Fortinet 不断增强其 OT 安全产品。创新技术和服务包括边缘网络防护解决方案、NOC(网络运营中心)/SOC(安全运营中心)工具和服务,为用户提供高效性能体验。

马上观看
power utilities solution

运营技术网络安全解决方案指南

随着数字化转型 (DX) 的加速,企业应深入洞察 IT 与 OT 网络之间的相似点和不同点。Fortinet Security Fabric 可全面保护 OT 和 IT 网络数字化攻击面。部署该平台可为企业构建具备深度集成、动态协同和组网弹性的网络环境。

了解更多

挑战

缺乏有效安全性

多数工业控制系统设计缺乏安全性,无法自适应网络环境的细微变化。

不断扩大的攻击面

随着物理隔离保护环境的日渐消失,网络物理资产攻击面正持续扩大。

IT 与 OT 融合网络

数字化转型(工业 4.0)计划正有力推动 IT-OT 网络加速融合。

增强的连接性

5G网络、物联网和云等先进技术增加了组网复杂性,必须对其加以防护。

安全远程访问需求日益增长

为满足第三方用户和员工的远程访问需求,致使企业面临更多安全风险。

技能差距风险持续攀升

资产所有者对原始设备制造商(OEM)和系统集成商(SI)的依赖,令关键系统面临更多风险。

Fortinet ICS/SCADA 解决方案

保护云和外部区域,包括互联网、云和 VPN。这些区域由云防火墙、VPN 网关、单点登录(SSO)和多因素身份验证解决方案提供有效防护

Purdue 模型

Fortinet 采用 Purdue 模型作为参考网络架构,实现 IT 和 OT 解决方案的有效区分。 幸运的是,对于寻求供应商整合和 IT/OT 融合的客户,Fortinet IT Security Fabric 安全平台和 Fortinet OT 感知的 Security Fabric 安全平台,可跨 IT 和 OT 环境实现网络与安全运营的无缝融合。 以下为保护 IT 和 OT 环境的 Fortinet 产品和服务分类介绍。

保护云和外部区域,包括互联网、云和 VPN。这些区域由云防火墙、VPN 网关、单点登录和多因素身份验证解决方案提供有效防护。

云和外部区域

Internet/WAN 区域可提供基于云的计算和分析服务,高效支持运营环境中的 ERP 和 MRP 系统。用户可使用双因素身份验证和 VPN 隧道构建强身份验证机制,以验证访客身份并确保数据私密性。

保护业务和企业区域,涉及 IT 环境、 IT 和 OT融合环境、企业网络(企业系统和网络)以及业务规划和物流(站点系统和网络)环境。这些区域由沙箱、欺骗防御、SIEM、SOAR、安全 SD-WAN、特权访问管理、Web 应用防火墙和 fabric-ready 合作伙伴等共同提供有效保护。

业务和企业区域

企业区域通常位于企业层面,跨多个设施、地点或工厂,业务系统运行其中以执行运营任务,涉及 IT 网络和安全运营中心(IT NOC/SOC)。

企业和站点运营区域之间为 IT 和 OT 融合区域,即隔离区 (DMZ)。隔离区允许组织对具有不同安全要求的网络构建安全连接。可采用的安全保护措施包括身份验证和业务分段,为用户提供可见性、安全控制和态势感知,助其有效管理已知和未知威胁。还可验证网络上的人员和内容,为用户、设备、应用和协议提供基于角色的访问控制。而沙箱和欺骗检测可有效应对未知威胁,并向 NOC(网络运营中心)/SOC(安全运营中心)提供工业安全信息。

保护运营和控制区域,涉及模拟、工程和测试。这些区域由分段防火墙、网络访问控制、集中报告和集中策略解决方案提供有效保护。

运营和控制区

站点运营可集中控制并监控在设施中运行的所有系统。OT 系统与 IT 系统可在此处实现数据共享。FortiGate 下一代防火墙设备通常部署于该区域,为用户提供顶级防护和网络分段,实现深度可见性及安全控制能力。

过程控制区域包括区域监控(HMI、历史记录)、基本控制(PLC、RTU、IED)和过程监控(执行器、传感器)。这些区域由透明防火墙、应用控制、入侵防御、终端检测和响应、安全网络交换机、安全 wi-fi 接入端、安全无线扩展器和零信任网络访问等先进技术提供有效防护。

过程控制区域

工业区域即生产区域。该区域包括将 IP 通信转换为串行命令的数字控制元件,如 PLC 和 RTU,涉及支持物联网设备的网络等附加网络。该区域可部署的 Fortinet 产品包括:FortiGate 防火墙、FortiSwitch 交换机和 FortiAP 无线接入端。

案例研究

借助 Fortinet 产品和服务,我们团队取得了进一步成果,实现了多项自动化。这意味着我们无需增加人手,即可为我们的教育社区提供更大支持。”
- Humberto Vidal, IT 协调员, FIEB
我们在 FortiGate 下一代防火墙 (NGFW) 方面的使用体验非常棒,我们对支持更广泛功能的 Fortinet Security Fabric 安全平台的集成水平以及 Fortinet 的竞争性定价印象深刻。重要的是,Fortinet 还支持获得联邦政府和州政府资助所需的安全等级,并依据 NIST(国家标准和技术研究所)网络安全框架进行交付。”
- Eric Scholl, 首席安全官, GASD
由于 Fortinet 每天负责监控众多设备,因此我们可以获得最新威胁快照,并且快速实现平台更新。部署 FortiAnalyzer 后,即可通过监控器实时查看威胁态势,这一优势功能令人赞叹,我们也因此受到客户群的强力推崇。”
- Dave Cahoon, 首席技术官, Red Bison Technology Group
我们公司实现了对钻机的安全远程访问和所有相关 OT 系统的全面可见性。由于日志记录和入侵指标 (IOC) 与用户 SOC 实现全面集成,助力内部安全团队更高效地识别和缓解各类威胁。
- , Maritime Drilling Rig Operator
现在,网络与安全合二为一,无需分散部署和管理。两者缺一不可。”
- Tri Nguyen, IT 总监, Waukesha-Pearce Industries
我们的目标是帮助客户管理业务风险并提升价值。Fortinet 在实现 OT 网络基础设施和安全态势现代化方面发挥了关键作用。”
- Tarun Patel, 产品总监, Oxford Properties Group

相关产品

Fortinet,构建数字安全,在您需要的任何地方

案例导览

欢迎进行案例自助导览,体验 Fortinet Security Fabric 安全平台如何高效应对运营技术网络安全挑战。

了解更多

资源

分析报告
白皮书
解决方案简报
电子书
检查清单
视频
How to Use NERC-CIP: An Overview of the Standards and Their Deployment with Fortinet
How to Use NERC-CIP: An Overview of the Standards and Their Deployment with Fortinet »

This paper is a unique review of a few key products and how those products align with existing CIP regulation requirements. This paper also takes a look at how those products might aid an organization in the process of maintaining compliance and explores the product features that will help defend the organization’s program during an audit.

Effective ICS Cybersecurity: Using the IEC 62443 Standard
Effective ICS Cybersecurity: Using the IEC 62443 Standard »

IEC 62443 is a set of Industrial Control System (ICS) security standards written by ICS experts for ICS owners, manufacturers and integrators across a range of applications and sectors. Evaluating assigned security levels within identified security zones and conduits against functional and system requirements provides a cohesive approach to security. Fortinet teamed with the SANS Institute to review the standard and the needs from technology that support implementation. With guidance from IEC 62443 and implementation of Fortinet’s solutions, you can address the security of an ICS strategically.

2022 State of Operational Technology and Cybersecurity Report
2022 State of Operational Technology and Cybersecurity Report »

The 2022 State of Operational Technology and Cybersecurity Report, now in its fourth annual iteration, finds that organizations are still moving too slowly toward full protection of their operational technology (OT) assets.

Cybersecurity in Water Management Facilities
Cybersecurity in Water Management Facilities »

Fortinet surveyed water utility leaders during the fourth quarter of 2021 to understand utilities’ status and future needs for improved water system cybersecurity

A Solution Guide to Operational Technology Cybersecurity
A Solution Guide to Operational Technology Cybersecurity »

This comprehensive guide explains how Fortinet effectively provides security throughout the interconnected IT and OT infrastructure while fully enabling integration across Fortinet and partner security solutions and supporting security automation across the entire security ecosystem.

Effective Implementation of the NIST Cybersecurity Framework with Fortinet
Effective Implementation of the NIST Cybersecurity Framework with Fortinet »

This paper reviews the NIST-based approach to implementing security for an ICS/OT, referencing the NIST Cybersecurity Framework (CSF), the five cybersecurity Critical Controls from the SANS Institute that are most relevant to ICSes, and Fortinet Security Fabric technologies. We also examine how to effectively support and implement the NIST CSF and explore how some of Fortinet’s cybersecurity offerings can help an organization fulfill its ICS/OT security road map.

Enabling NIS2 Directive Compliance with Fortinet for Operational Technology
Enabling NIS2 Directive Compliance with Fortinet for Operational Technology »

The NIS2 Directive (NIS2) is an improved approach to cybersecurity controls, with an expanded scope and mandatory penalties.

Independent Study Finds That Security Risks Are Slowing IT-OT Convergence
Independent Study Finds That Security Risks Are Slowing IT-OT Convergence »

Aligning Your Security Program with the NIS Directive
Aligning Your Security Program with the NIS Directive »

Securing OT Systems in the Face of Rapid Threat Evolution
Securing OT Systems in the Face of Rapid Threat Evolution »

As organizations modernize and embrace efficiency gains from Industrial Internet-of-Things (IIoT) technologies, the air gap between IT and OT disintegrates, and the attack surface expands. OT sensors are increasingly being integrated into IT networks to interface with machine learning and big data technologies. This connectivity creates both competitive advantage for the company and an increased risk of cyber intrusion. The growing attack opportunities are especially problematic because “headless” OT devices were not designed with security in mind.

Simplifying SD-WAN Operations with Single-Pane Management
Simplifying SD-WAN Operations with Single-Pane Management »

Fortinet simplifies SD-WAN operations with network operations center solutions

Fortinet Secures OT Networks Against Advanced Threats
Fortinet Secures OT Networks Against Advanced Threats »

OT-specific threat intelligence provided by FortiGuard Labs and Fortinet partners delivers the insight and context required to identify and remediate OT-specific threats.

Securing OT Networks with Microsegmentation
Securing OT Networks with Microsegmentation »

Read how Fortinet microsegmentation it is possible to implement a zero-trust security policy and to scan all traffic within a VLAN using a next-generation firewall (NGFW)

Fortinet Provides Zero-day Protection in OT Environments
Fortinet Provides Zero-day Protection in OT Environments »

Sandboxing and deception solutions complement each other in detecting zero-day threats. To fulfill their role in the kill chain, each must then share detected threat intelligence with an integrated next-generation firewall (NGFW). The NGFW enforces internal network controls (via segmentation) and updates broader OT defenses to block any previously unknown forms of attack. FortiSandbox and FortiDeceptor support comprehensive OT security—including intelligence sharing for protection against zero-day threats.

Securing Open Platform Communications in OT Environments with FortiGate Next-generation Firewalls
Securing Open Platform Communications in OT Environments with FortiGate Next-generation Firewalls »

Fortinet FortiGate next-generation firewalls (NGFWs) are not only able to understand OPC but they also provide granular control of more than 250 standard OPC functions. Additionally, the FortiGate application control feature supports more than 30 different OT/ICS protocols.