Zero Trust Maturity Model

Zero Trust Maturity Model

Identity

Zero Trust Maturity Model Identity
An identity can be a control system user (e.g., operator or engineer), or a service or application that interacts with the system that is uniquely defined by a set of attributes. DeltaV supports two-factor authentication to prevent stolen user credentials.

Devices

Zero Trust Maturity Model Devices
A device is any asset connected to an Ethernet network such as a controller, field instrument, workstation, or server. DeltaV device firmware is signed with a CA certificate to ensure that it cannot be modified between when it was created and installed.

Networks

Zero Trust Maturity Model Networks
Networks are Ethernet-based, wired or wireless, public or private, physical or virtual. DeltaV is segmented from the enterprise network by a firewall to create a security zone which only allows authorized traffic between the control system and enterprise.

Applications

Zero Trust Maturity Model Applications
Applications run on workstations, controllers, etc., communicate across a network, act on data (e.g., control), or present information to users. The DeltaV DCS development team is certified to Secure Development Lifecycle Assurance (SDLA) maturity level 3.

Data

Zero Trust Maturity Model Data
Process control system data includes control configuration, sensor values, setpoints, historical information, and metadata, which resides in controllers, field instruments, etc., is transmitted across networks, and is protected using Access Control Lists.

The Zero Trust Maturity Model is structured around five distinct pillars, each supporting stepwise advancements toward optimization over time. These pillars are built upon a foundation of cross-cutting capabilities that are integrated across all five pillars.

Enables Boundless Automation
Secure Communications
Least Privilege
Embedded Node Integrity

Advancing Cybersecurity Across DeltaV

As cybersecurity threats evolve, Emerson is making ongoing investments to maintain the resilience of the DeltaV DCS and SIS and keep you protected in an ever-changing digital landscape. Below are examples of planned security enhancements towards a Zero Trust solution.

Enables Boundless Automation

Emerson’s Boundless Automation vision relies on a software-driven foundation, designed to integrate seamlessly with a software-centric Zero Trust cybersecurity approach.

Enables Boundless Automation
Secure Communications

Emerson will fortify the DeltaV DCS and SIS communications at the protocol level to achieve higher cybersecurity standards, ensuring a secure and reliable system.

Secure Communications
Least Privilege

Emerson will implement the Principle of Least Privilege (POLP) throughout the DeltaV DCS and SIS system to prevent unauthorized access and further reduce the attack surface.

Least Privilege
Embedded Node Integrity

Emerson will enhance the protection of DeltaV embedded nodes (e.g. controllers) against malicious firmware modification with hardware enforced secure boot.

Embedded Node Integrity

Contáctenos

¿Desea obtener más información sobre cómo los productos, los servicios y las soluciones industriales de DeltaV pueden beneficiar a su empresa?

Ver más...
Haga clic para continuar leyendo Contáctenos

Lo más reciente

Emerson agiliza la creación de fórmulas de ciencias de la vida para acelerar el lanzamiento al...

La nueva herramienta DeltaV MES Recipe Importer automatiza la creación de registros de lotes para ejecutar el flujo de trabajo, lo que reduce los...

La aplicación móvil rediseñada para SCADA en la nube de Emerson impulsa operaciones más...

Aplicación móvil DeltaV SaaS SCADA actualizada para proporcionar a los operadores y técnicos más opciones de visibilidad, conocimiento y...

Emerson lanza la biblioteca de modalidades para impulsar una innovación más rápida en ciencias de...

La nueva DeltaV PKM Modality Library acorta la transferencia tecnológica para ayudar a las empresas de ciencias de la vida a ofrecer nuevos...
Habilite JavaScript para usar este sitio web.