Zero Trust Maturity Model

Zero Trust Maturity Model

Identity

Zero Trust Maturity Model Identity
An identity can be a control system user (e.g., operator or engineer), or a service or application that interacts with the system that is uniquely defined by a set of attributes. DeltaV supports two-factor authentication to prevent stolen user credentials.

Devices

Zero Trust Maturity Model Devices
A device is any asset connected to an Ethernet network such as a controller, field instrument, workstation, or server. DeltaV device firmware is signed with a CA certificate to ensure that it cannot be modified between when it was created and installed.

Networks

Zero Trust Maturity Model Networks
Networks are Ethernet-based, wired or wireless, public or private, physical or virtual. DeltaV is segmented from the enterprise network by a firewall to create a security zone which only allows authorized traffic between the control system and enterprise.

Applications

Zero Trust Maturity Model Applications
Applications run on workstations, controllers, etc., communicate across a network, act on data (e.g., control), or present information to users. The DeltaV DCS development team is certified to Secure Development Lifecycle Assurance (SDLA) maturity level 3.

Data

Zero Trust Maturity Model Data
Process control system data includes control configuration, sensor values, setpoints, historical information, and metadata, which resides in controllers, field instruments, etc., is transmitted across networks, and is protected using Access Control Lists.

The Zero Trust Maturity Model is structured around five distinct pillars, each supporting stepwise advancements toward optimization over time. These pillars are built upon a foundation of cross-cutting capabilities that are integrated across all five pillars.

Enables Boundless Automation
Secure Communications
Least Privilege
Embedded Node Integrity

Advancing Cybersecurity Across DeltaV

As cybersecurity threats evolve, Emerson is making ongoing investments to maintain the resilience of the DeltaV DCS and SIS and keep you protected in an ever-changing digital landscape. Below are examples of planned security enhancements towards a Zero Trust solution.

Enables Boundless Automation

Emerson’s Boundless Automation vision relies on a software-driven foundation, designed to integrate seamlessly with a software-centric Zero Trust cybersecurity approach.

Enables Boundless Automation
Secure Communications

Emerson will fortify the DeltaV DCS and SIS communications at the protocol level to achieve higher cybersecurity standards, ensuring a secure and reliable system.

Secure Communications
Least Privilege

Emerson will implement the Principle of Least Privilege (POLP) throughout the DeltaV DCS and SIS system to prevent unauthorized access and further reduce the attack surface.

Least Privilege
Embedded Node Integrity

Emerson will enhance the protection of DeltaV embedded nodes (e.g. controllers) against malicious firmware modification with hardware enforced secure boot.

Embedded Node Integrity

Contact Us

Want to learn more about how DeltaV products, services and industry solutions can benefit your business?

Read More...
Click to continue reading Contact Us
Please enable JavaScript to use this website.