Coordination – Unified Information Security Main Design Characteristics • • • • • •
One Framework – Multiple Certifications
Full ISO 27001/2 Certification End-to-end Infrastructure Visibility Extend Compliance for GE & Customers Unified Monitoring Framework Central Controls – Separate Monitors ISMS (Information Security Mgmt System)
ISO 27K, NIST 800-53 & FIPS 140-2 L1/2 Controls Matrix & Compliance Unified Monitoring Framework Extend Compliance for GE & Customers Over 60 Geo-Industry specific regulations #IndustrialInternet
BRING OPERATIONAL AVAILBILITY & GOVERNANCE WITH “IT”
… at every connection & layer
Common & Layer Identity for User, Device, Software & Data Automated isolation & monitoring - incidents Unified & clean run-time environments Visibility to mixed Information assets
PROTECT OT/IT IN AN APP FACTORY DELIVERY MODEL
ESTABLISH USER-BASED WORLD FOR INDUSTRIAL APPS
… automated secure apps
… end-to-end visibility
SAST, DAST, Artifact integration & automation Code vaulting & Vetted delivery to platform Routine Red Team platform assessments DevOpsSec evaluations for platform base code
End-to-end Infrastructure Visibility Full Security Operations Center & Tooling App-to-App behavioral evaluation Maintain chain of custody for the data communities powered by
Wrap it up!
SECURITY is the WORD – embrace it!
#IndustrialInternet
Prepare your operational teams and systems for connectivity
Reducing platform vulnerabilities – common control
Application security design – HARD requirement
Converged platform – unified compliance
powered by
Any questions?
#IndustrialInternet
powered by
Thank you General Electric reserves the right to make changes in specifications and features, or discontinue the product or service described at any time, without notice or obligation. These materials do not constitute a representation, warranty or documentation regarding the product or service featured. Illustrations are provided for informational purposes, and your configuration may differ.