a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.
|
|
|
- Carmella Hodges
- 10 years ago
- Views:
Transcription
1 SCADA and CIP Security in a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. CTO, Byres Security Inc.
2 What is Stuxnet?
3 The Stuxnet Worm July, 2010: Stuxnet worm was discovered attacking Siemens PCS7, S7 PLC and WIN-CC systems around the world Infected 100,000 computers Infected at least 22 manufacturing sites Appears to have impacted its possible target, Iran s nuclear enrichment program
4 Great - We Weren t the Target Stuxnet infected a large US manufacturing plant Started with two USB keys Spread over the network to 100 WinCC HMIs communicating with about 60 OPs and about 45 S7 PLCs Virus would modify project communication configuration for the PLC's Ethernet ports Impact: Major resource drain to disinfect project files Plant continued to experience symptoms on PLCs one month later
5 How Stuxnet Spreads
6 Isn t a Nuclear Materials System Air-Gapped? How could Stuxnet migrate from the Internet to an isolated industrial control system? Could the next worm do the same to a different victim?
7 A Trivial Scenario Scenario: 1. Joe finds a USB flash drive in the parking lot and brings it into the control room 2. Joe plugs it into the PLC programming station 3. PLC programming station ti infects PLCs Solution: 1. Ban all USB flash drives in the control room NOT Realistic!
8 Gap Analysis Methodology Goal: Understanding the routes that a directed worm takes as it targets an ICS Premise: Start with an industrial site that exactly follows the security best practices defined in vendor documents Model: Map ways that Stuxnet could make its way through the defenses to cause physical damage
9 Core SIMATIC PCS 7 Control System Components Engineering System (ES) Client Operator System (OS) Client Automation System (AS) S7 PLC
10 PCS 7 High Security Architecture Enterprise Control Network Manufacturing Operations Network Perimeter Control Network Process P Control Network Control System Network WinCC PCS7 Historian Remote Access General Purpose
11 PCS 7 High Security Architecture Identical Firewalls Here No Firewall Between CSN and PCN WinCC PCS7 Historian Remote Access General Purpose
12 Stuxnet Phases Penetration Infection Propagation Detection Avoidance Target Identification Target Modification Process Impact
13 Penetration (aka Handoff to Target Organization) Stuxnet handoffs were highly focused June 2009 to May infiltration events Handoffs were made to at least five separate target organizations Sample Graph of Infected Hosts Domain E / Infection initiation 2010/05/11 Courtesy of Symantec Inc
14 Penetration Possibilities Employee given infected USB flash drive Employee given infected project files from contractor Employee is transmitted with dropper Employees laptop infected offsite. Many ypossibilities for attackers
15 Core Propagation Methods Via Infected Removable Drives USB flash drives Portable hard disks Via Local Area Networks Administrative and IPC Shares Shared network drives Print spooler services SQL Connections Via infected Siemens project files WinCC files STEP 7 files A very simplified view
16 Penetrating Perimeter Network Firewalls Many paths through firewalls: Network printer and file shares WinCC SQL Server database RPC between PCS 7 systems Piggybacked on core PCS 7 protocols, t l making ki it iimpossible ibl tto block at the firewall
17 Stuxnet Had Many Paths to its Victim PLCs
18 Green highlights infection path described in paper Red highlights more direct paths which bypass existing security controls
19 Some Lessons Learned A modern ICS or SCADA system is highly complex and interconnected Multiple potential pathways exist from the outside world to the process controllers Assuming an air-gap between ICS and corporate networks is unrealistic Focusing security efforts on a few obvious pathways (such as USB storage drives or the Enterprise/ICS firewall) is a flawed defense
20 The Death of Security by Obscurity
21 A Typical Month for ICS/SCADA Vulnerabilities March 15 Moscow-based Gleg Ltd. released their Agora SCADA+ exploit pack for Canvas, which included 11 0-days (now at 54 exploits) On March 21, a security researcher from Italy publically disclosed 34 vulnerabilities on 4 different ICS platforms On March 22-23, 23 vulnerabilities were disclosed for 2 additional ICS platforms
22
23
24
25
26
27 The Life Cycle of a ICS Exploit ICS platforms are becoming an obvious target for attacks Security Researchers focusing on SCADA/ICS because it is easy money/fame (little malicious intent) Actors with intent have access to the weapons: Download exploits for free (Italian list) Purchase tool kits (Gleg) Directed where to look for more vulnerabilities
28 Incident Types from RISI Database N/A 0% External Hacker Outsider 47% Insider 53% Network Device, Software Flaw Intentional 20% Disgruntled Employee IT Dept, Technician Unintentional 80% N/A 48% Insider 14% Outsider 38% Malware 2011 Security Incidents Organization
29 Stuxnet s Legacy Model for simple, destructive SCADA worms Exploits inherent PLC design issues Applicable to almost all industrial controllers There are no possible patches to the PLC
30 Some Lessons Learned SCADA and ICS are now targets of interest Most systems stems have many exploit opportunities Patching is an issue for many companies Patch deployment e requires es plant downtime Vendor only patches most current version Patch releases are slow Upgrading to latest version may not be an option
31 Protecting Against the Son-of-Stuxnet The Good and The Ugly Models for Effective CIP Security
32 The Ugly: The US Electrical Industry Security Model NERC CIP defines security compliance requirements for organizations who are involved with the bulk electrical network in North America Industry has focused on compliance rather than security The standard focus on boundary protection, not defense in depth. Yet in 2009 NERC listed their #2 vulnerability in control systems as: Inadequately designed control system networks that lack sufficient defense-in-depth mechanisms
33 The Bastion Model of Security Installing a single firewall between business and the control system is known as the Bastion Model since it depends on a single point of security Other examples of the bastion model: The Great Wall of China The Maginot Line
34 A Perimeter Defense is Not Enough We can t just install a boundary firewall and forget about security The bad guys will eventually get in Many problems originate inside the control network We must harden the ENTIRE system We need Defense in Depth Crunchy on the Outside - Soft in the Middle
35 ANSI/ISA-99: Dividing Up The Control System A core concept in the ANSI/ISA-99 (now IEC ) 01) security standard is Zones and Conduits Offers a level of segmentation and traffic control inside the control system. Control networks divided into layers or zones based on control function on control function Multiple separated zones manage that defense in depth strategy
36 Using Zones: An Example Oil Refinery
37 Specifying the Zones
38 Defining the Conduits
39 Protecting the Conduits with Firewalls Corporate Firewall Industrial Firewall
40 Look At All Possible Pathways Don t focus on a single pathway such as USB keys Consider all possible infection pathways: a Removable Media (CDs, DVDs, USB Drives) File Transfer (Database, PDFs, PLC Project Files) Portable Equipment (Laptops, Storage Units, Config Tools) Internal Network Connections (Business, Lab, QA, Support) External Connections (Support, Contractor, Customer) Wireless (802.11, , Licensed-band, Cellular, Wireless HART, ISA-100a, Bluetooth, USB tethering) Other Interfaces (Serial, Data Highways) Have strategies for discovering/mitigating ALL pathways
41 The Attack/ Consequence Funnel External Corporate Internal Enterprise Assets Process DMZ HMI/Supervisory Systems Primary Control Systems Safety Systems Att tack Qua antity Avai ilablepath hways Co onsequen nces Explo oit Opport tunities Process
42 Securing Last-line-of-Defense CIP Systems External Corporate Internal Enterprise Assets Process DMZ HMI/Supervisory Systems Primary Control Systems Safety Systems Process Focus on monitoring and securing SIS Boundary Limited Pathways High Consequence
43 SCADA/ICS-Appropriate Appropriate Technologies Need ICS-appropriate detection technologies to raise an alarm when equipment is compromised or at risk of compromise Deploy ICS-appropriate security technologies Look beyond traditional network layer firewalls, towards firewalls that are capable of deep packet inspection of key SCADA and ICS protocols
44 Example: Honeywell Safety System Firewall Honeywell needed a firewall to protect critical their safety instrumented systems (SIS) Wanted NO user configuration Security Requirements: Allow data to be read from system but not written (Read-only Firewall) Must provide sanity check SCADA application protocols Configuration is locked to SIS- appropriate rule set Honeywell Modbus Read-only Firewall for SIS
45 Making Security Simple "Certainly controls engineers and operators need to be security aware, but they should not all need to be security experts. "We have to make this [security] something a plant superintendent, engineer, or senior operator can do in their spare time, or it will flop. Two Major End Users to ISA99 Committee
46 Some Closing Thoughts Stuxnet has changed the threat landscape ICS/SCADA is the target of sophisticated attacks ICS/SCADA is the focus for vulnerability discovery Industry must accept that the complete prevention of ICS infection is impossible Improved defense-in-depth strategies for industrial control systems are needed urgently Waiting for the next worm may be too late
47 References Siemens Automation Security concept PCS 7 and WinCC - Basic document Tofino Security White Papers and Application Notes Analysis of the Siemens PCS7 Stuxnet Malware for Industrial Control System Professionals: Using Tofino to Control the Spread of the Stuxnet Malware - Application Note: Stuxnet Mitigation Matrix - Application Note: Other White Papers and Documents t / t t/ / / t / / it / hitepapers/w32_stuxnet_dossier.pdf
48
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
Effective OPC Security for Control Systems - Solutions you can bank on
Effective Security for Control Systems - Solutions you can bank on Darek Kominek Manager, Marketing, Matrikon Eric Byres, P. Eng., ISA Fellow CTO, Byres Security Inc. Executive Summary There is a perception
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
Session 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
CYBER SECURITY. Is your Industrial Control System prepared?
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Stuxnet Malware. Official communication presented at CIP Seminar 02-11-2010 by Thomas Brandstetter. Siemens AG 2010. All Rights Reserved.
Official communication presented at CIP Seminar 02-11-2010 by Thomas Brandstetter What is the Stuxnet and what can it do? Stuxnet is a high sophisticated malware that targets very specific configurations
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012
Tofino Security exida Consulting LLC White Paper Version 1.0 Published February 16, 2012 Contents Executive Summary... 1 Step 1 Assess Existing Systems... 1 Step 2 Document Policies & Procedures... 3 Step
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Three Simple Steps to SCADA Systems Security
Three Simple Steps to SCADA Systems Security Presented by: Gabe Shones, PE / Gilbert Kwan, PE Insert Photo Here Rockwell Automation Process Solutions User Group (PSUG) November 14-15, 2011 Chicago, IL
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
Decrease your HMI/SCADA risk
Decrease your HMI/SCADA risk Key steps to minimize unplanned downtime and protect your organization. Are you running your plant operations with serious risk? Most industrial applications lack recommended
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware
Post-Stuxnet Industrial Security: Zero-Day Discovery and Risk Containment of Industrial Malware A White Paper presented by: Torsten Rössel Director of Business Development Innominate Security Technologies
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA Cyber Attacks and Security Vulnerabilities: Review Jinan Fiaidhi, Yvette E. Gelogo Department of Computer Science, Lakehead University, Hannam University, Korea [email protected], [email protected]
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
Cyber Security in a Modern Process Network. Philip Nunn Product Manager - Industrial Networks
Cyber Security in a Modern Process Network Philip Nunn Product Manager - Industrial Networks 2 Philip Nunn Philip started work in the wider electrical industry with Crabtree Electrical, now a part of the
Plant Network Security
Whitepaper Plant Network Security How to defend your Plant against the threats of 2014? Yokogawa Europe B.V. Euroweg 2 3825 HD Amersfoort, The Netherlands July 2014 Table of Content 1. Introduction...
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Protecting productivity with Plant Security Services
Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services
ABB s approach concerning IS Security for Automation Systems
ABB s approach concerning IS Security for Automation Systems Copyright 2006 ABB. All rights reserved. Stefan Kubik [email protected] The problem Most manufacturing facilities are more connected (and
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
PLC Security for Water / Wastewater Systems
INDUSTRIAL INTERNET IN ACTION CASE STUDY PLC Security for Water / Wastewater Systems EXECUTIVE SUMMARY You have likely never worried about the possibility of a high school geek doing some programming that
Top five strategies for combating modern threats Is anti-virus dead?
Top five strategies for combating modern threats Is anti-virus dead? Today s fast, targeted, silent threats take advantage of the open network and new technologies that support an increasingly mobile workforce.
Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters
sorry Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters Jonathan Pollet, CISSP, CAP, PCIP July 2010 Table of Contents Introduction...3 Power Generation, Transmission, and Distribution...4
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
Patch Management. Is it recommended to patch an Industrial Automation Control System and, if so, why? Siemens AG 2012. All Rights Reserved.
Patch Management Is it recommended to patch an Industrial Automation Control System and, if so, why? Facts Most of the computer components of modern Industrial Automation Control System are based on standard
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
SCADA Security Training
SCADA Security Training 1-Day Course Outline Wellington, NZ 6 th November 2015 > Version 3.1 web: www.axenic.co.nz phone: +64 21 689998 page 1 of 6 Introduction Corporate Background Axenic Ltd Since 2009,
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.
Security all around Industrial security for your plant at all levels siemens.com/industrialsecurity Answers for industry. A systematic approach to minimize threats With the increased use of Ethernet connections
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
IACS Network Security and the Demilitarized Zone
CHAPTER 6 IACS Network Security and the Demilitarized Zone Overview This chapter focuses on network security for the IACS network protecting the systems, applications, infrastructure, and end-devices.
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Computer System Security Updates
Why patch? If you have already deployed a network architecture, such as the one recommended by Rockwell Automation and Cisco in the Converged Plantwide Ethernet Design and Implementation Guide (http://www.ab.com/networks/architectures.html),
SCADA Security @ City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor
SCADA Security @ City of Raleigh Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor Agenda 1. PLCs, SCADA and Stuxnet 2. Selecting Audit Standards 3.
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Implementing Security Update Management
Implementing Security Update Management Wayne Harris MCSE Senior Consultant Certified Security Solutions Business Case for Update Management When determining the potential financial impact of poor update
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011
10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection September 2011 10 Potential Risks Facing Your IT Department: Multi-layered Security & Network Protection 2 It s
Process Control Networks Secure Architecture Design
Process Control Networks Secure Architecture Design Guest Speaker Robert Alston Principle Lead Network and Security Consultant Over 25 years network experience including design, implementation, troubleshooting
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
Network Instruments white paper
Network Instruments white paper USING A NETWORK ANALYZER AS A SECURITY TOOL Network Analyzers are designed to watch the network, identify issues and alert administrators of problem scenarios. These features
May/June 2014. Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight. www.isa.
May/June 2014 A PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATION Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight www.isa.org/intech Top ten differences
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy
For Public Use G/On Basic Best Practice Reference Guide Version 6 Make Connectivity Easy 2006 Giritech A/S. 1 G/On Basic Best Practices Reference Guide v.6 Table of Contents Scope...3 G/On Server Platform
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12
Trends in Malware DRAFT OUTLINE Presentation Synopsis Security is often a game of cat and mouse as security professionals and attackers each vie to stay one step ahead of the other. In this race for dominance,
13 Ways Through A Firewall
Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco
Secure Access into Industrial Automation and Systems Industry Best Practice and Trends Serhii Konovalov Venkat Pothamsetty Cisco Vendor offers a remote firmware update and PLC programming. Contractor asks
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
Industrial Cyber Security 101. Mike Spear
Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell
Safe Network Integration
UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright
13 Ways Through A Firewall What you don t know will hurt you
Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Insert Title Here Cybersecurity for Industrial Automation & Control Environments Protection and Prevention Strategies in the Face of Growing Threats
Insert Title Here Cybersecurity for Industrial Automation & Control Environments Protection and Prevention Strategies in the Face of Growing Threats A Frost & Sullivan White Paper in Partnership with Schneider
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Increasing Situational Awareness and Multi-zone Protection of Utility Infrastructure
Increasing Situational Awareness and Multi-zone Protection of Utility Infrastructure Reference implementation demonstrates a comprehensive end-to-end security solution based on leading McAfee* and Intel
Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
