CWISA Guide Giveaway detailsThere are two copies of the Certified Wireless IoT Solutions Administrator (CWISA) study/reference guidesWinners will be drawn randomly on episode 10 (episode title TBD)ONE winner will be from ITONE winner will be from OTClick the link below to enter the drawing! (One entry per person)—> https://forms.gle/eE4rYtixhbppyMti8 ←- (link now inactive)Let’s talk security – Owning your industrial airspaceThree things you need to considerSituational awareness of your siteUnderstanding the current RF landscapeSecuring your wireless assetsSituational awarenessWhere is your siteIs it in an industrial park?Is it in an urban area close to other buildings and businesses?Is it out in the middle of “nowhere”?What is around your siteResidential?Commercial?Industrial / manufacturing? Who is around your siteStatic residential High volume transient populationLions, tigers and bears, oh my!What is your riskUnderstand your RF landscapeWhat other structured wireless networks are operating on your site?802.11802.15.4Proprietary wirelessAre there transient wireless networksMobile hotspotsTransportation and fleet management Are there and sources of EMI / RFIHow badWhat frequenciesWhat is your risk?Securing your wireless assets802.11 securityObviously, do not use WEP or WPA (granted I do know that there are still legacy devices in production environments out there and that sometimes you have no choice. Be sure to document what you cannot mitigate!)WPA2 still the most common, enable Protected Management Frames if you can/have the optionWPA3 the most preferableAdvanced and improved encryptionMFP is mandatory 802.15.4 security128-bit AES encryption is built into the standardAfter layer 2 in the OSI, these compliant devices often implement other security options from onboarding to CRCs, it depends on the vendorWant to know more about Bluetooth security – check out episode 6Want to know more about WirelessHART or ISA100 security – check out episode 4Proprietary wireless securityUsually have encryption optionsUnique onboarding processes for mesh devicesContextless data transfer Management accessDisable Over-the-air (OTA) managementUse HTTPS/SSH whenever possibleVLAN/segment out management IP addresses whenever possibleNEVER use default passwords and security settingsKey takeawaysOwning your industrial airspace is much more than simply encrypting wireless trafficYou need to look at your site as a whole to fully realize and understand your overall riskYou do not have the luxury of deciding whether or not you are a targetThis is what my 900MHz signal generator looks like in spectrum analysis. It’s definitely a unique signature from the Density view at the top to the Waterfall view in the middle. You can also see in the bottom panel how it just eats up airtime utilization.
If you would like to know more about our guests, check them out on LinkedIn:
Jeremy Baker – https://www.linkedin.com/in/jeremyabaker/
If you would like to connect with me or learn more about my employer, Global Process Automation (GPA), then check the following:
Scott McNeil – https://www.linkedin.com/in/americanmcneil/
GPA – https://www.global-business.net/