An Evaluation of Security Posture Assessment Tools on a SCADA Environment
|
|
|
- Shona Davidson
- 10 years ago
- Views:
Transcription
1 An Evaluation of Security Posture Assessment Tools on a SCADA Environment Shahir Majed 1, Suhaimi Ibrahim 1, Mohamed Shaaban 2 1 Advance Informatics School, Universiti Teknologi Malaysia, International Campus, Jalan Semarak Kuala Lumpur Malaysia [email protected],[email protected] 2 Centre of Electrical Energy Systems (CEES) Faculty of Electrical Engineering Universiti Teknologi Malaysia [email protected] Abstract Increased concerns for energy grid cybersecurity has lead to the development of compliance requirements that must be evaluated by utilities. The North American Electric Reliability Council (NERC) has created Critical Infrastructure Protection (CIP) requirements for all cyber assets supporting the bulk energy system [17]. This research explores whether the methodologies and tools commonly used for traditional information technology (IT) systems are sufficient to meet the cybersecurity assessment needs in power systems. This paper reviews these assessment tools to determine their ability to assist in the evaluation of the CIP requirements. In addition to the evaluation the tool capabilities, they are also reviewed for their potential to negatively impact the network availability properties. Evaluation was performed on the SecureCyber testbed at MIMOS & UTM-AIS Lab which implements real-world environment as in employs industry standard hardware, software and field devices. The result of this analysis is provided along with a review known gaps where current IT cybersecurity tools do not appropriately support SCADA environments. I. INTRODUCTION While cyber vulnerability assessments have become a standardized process in information technology (IT), they have only recently gained importance in SCADA environments. Demand from the IT side has driven the development of evaluation tools, test methodologies, impact scoring and reporting procedures to assist with the reliability and efficiency of the assessment process. The similarities between traditional IT and SCADA systems should ensure a portion of IT assessment methods have some applicability to SCADA environments. This paper documents the results from an evaluation of whether current techniques for vulnerability assessments provide appropriate coverage of SCADA assessments. The evaluation of current IT assessment tools will be reviewed on the MIMOS-UTM SecureCyber testbed. These analyses will specifically targeting their ability to evaluate IEC61850 compliance. In addition, these tools will be analyzed to detect potential negative affects the assessment may have on network availability. II. PREVIOUS WORK The evaluation of cyber vulnerabilities in control systems has been a popular area of recent research. Center of Smart Grid Systems at MIMOS has establish the National SCADA Testbed (NSTB) which provides a resource to evaluate critical vulnerabilities in realistic SCADA systems.[14] MIMOS has provided research documenting cyber vulnerabilities commonly found in SCADA systems and has also provided an overview of tools and techniques utilizes to perform this analysis.[11][9][15]. Research at Sandia National Laboratory has provided guidance on performing a 347
2 cyber vulnerability assessment on an SCADA system. [19] Additional work has addressed concerns for performing penetrations tests on control systems.[12] This research differentiates itself from the previous works as it applies techniques from a cybersecurity assessment method- ology to a SCADA testbed utilizing known tools commonly used in traditional IT assessments to simulate the assessment capabilities of current utilities. relays. The network is implemented on an Ethernet network and all communications utilize TCP/IP. A. Testbed Architecture The SecureCyber testbed was developed at UTM AIS to provide a realistic SCADA system for cyber vulnerability evaluation.[13] The testbed utilizes realworld hardware and software to provide an accurate representation of a SCADA system. The components contained in the testbed include human-machine interfaces (HMIs), SCADA servers, remote terminal units (RTUs), overcurrent protection relays, historian servers and virtual private network (VPN) devices. The HMI provides the operator with an interface to the SCADA server. This is utilized to perform monitoring and control of the system operations. The SCADA server communicates with the RTUs in the appropriate substations and relays commands from the HMI. The RTU provides a centralized system within a substation to communicate with various intelligent electronic devices (IEDs), such as the relays. The testbed architecture, as displayed in figure 1, shows the layout of the control center and two substations. The control center contains the HMI, SCADA server, and historian server. Each substation contains a RTU which is connected to a relay. Communication between the control center and substation is protected with the VPN devices provide which a secure channel. The SCADA specific protocols in use are DNP3 and IEC DNP3 is a protocol primarily intended for the communication of a variety of different process control system. In the testbed DNP3 is used to transmit the data points between the RTUs and SCADA server. The IEC protocol is highly specialized towards substations and, therefore, is used for communication between the RTU and Fig. 1. Secure Cyber Lab Architecture III. SECURECYBER EVALUATION Techniques used to evaluate the current cybersecurity posture can vary based on requirements and goals. Often these techniques combine reviews of technical security controls and non-technical policies, procedures and documentation. This section will review current cybersecurity evaluation methods to determine their applicability to SCADA environments. A. Compliance Requirements An important objective for a cybersecurity assessment methodology is the ability to determine whether compliance requirements have been sufficiently meet. Since SCADA systems supporting the bulk power system are required to be IEC compliant, an effective SCADA test methodology must evaluate each individual requirement. A review of the IEC standards was performed to determine technical security requirements which must be addressed by SCADA assessment 348
3 methodologies. A table documenting the relevant technical security controls is provided in figure 2. B. Assessment Methodologies The scope of assessment activities is dependent on the test methodology. A thorough methodology is imperative to ensure that all required evaluations are performed consistently. Before reviewing various methodologies we first review the different assessment types. Technical security evaluations are often categorized as either vulnerability assessments or penetration tests. While both share common techniques, there are significant differences in how they are performed and their impact on the target systems. Vulnerability assessments are an evaluation of tech- nical vulnerabilities in a system. Vulnerability assessments are typically performed as white-box tests where testers have access to documentation, configurations and personnel in order to obtain a full understanding of all potential security weak- nesses. During a vulnerability assessment security concerns are documented, but no exploitation occurs. Penetration testing involves attempts to exploit weaknesses to validate its severity and determine the feasibility of a cyber attack. Since penetration tests involve attempts to bypass security controls they are more likely to negatively impact system availability. From a SCADA perspective, vulnerability assessments will typically be preferred as they provide a comprehensive review of the security posture. In addition, it is generally not recommended to perform penetration testing on production SCADA systems. [12] Assessment methodologies can employ varying breadth and depth of analysis. Some notable methodologies from tradi- tional IT are displayed below. NIST SP , Technical Guide to Information Secu- rity Testing and Assessment [20] NIST SP A, Guide for Assessing the Security Controls in Federal Information Systems [10] Open Source Security Testing Methodology Manual (OS- STMM) [6] Open Information Systems Security Group (OISSG) ISAAF Penetration Testing Framework [3] This research primarily utilizes a slight modification to the methodology provided by NIST SP because it is publicly available and also references other methodologies. NIST provides a comprehensive review of the vulnerability assessment process including coordination, planning, technical and non-technical analysis, data handling and reporting. In addition, it suggests additional resources that may be helpful when performing an assessment such as software tools, vulnerability sources and additional documentation. Figure 3 documents the assessment steps performed in this assessment, note they essentially follow those documented in NIST except for potentially disruptive system penetration activities. IV. ASSESSMENT RESULTS The section will address the various evaluation activities in further detail and document cybersecurity evaluation tools used to perform this analysis. This specifically addresses two concerns, first, whether the assessment tool was able to achieve CIP Critical Cyber Asset Identification R1.1 documentation describing its risk-based assessment methodology that includes procedures and evaluation criteria CIP Security Management Controls R5.2 R5.2 at least annually the access privileges to protected information to confirm that access privileges are correct CIP-005-2a Electronic Security Perimeters R2.1 use an access control model that denies access by default R2.2 enable only ports and services required for operations and for monitoring Cyber Assets within the Electronic R2.3 maintain a procedure for securing dial-up access to the Electronic Security Perimeter(s) R.26 display an appropriate use banner on the user screen upon all interactive access attempts 349
4 CIP-007-2a System Security Management R1.1 create, implement, and maintain cyber security test procedures R2 implement process to ensure that only those ports and services required for normal emergency operations are enabled R3.1 assessment of security patches and security upgrades for applicability within thirty calendar days of availability R4.2 implement a process for the update of anti-virus and malware prevention signatures. The process must address testing and installing the signatures. R5 establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity R5.1.3 review, at least annually, user accounts to verify access privileges R5.3 require and user passwords, subject to the following, six characters, combination of alpha, numeric and special characters and changed at least annually R6.3 maintain logs of system events related to cyber security R6.4 retain all logs specified in Requirement R6 for ninety calendar days R8.3 review of controls for default accounts Fig. 2. NERC CIP statements requiring technical cybersecurity assessment[17] sufficient to evaluate NERC CIP requirements. Any data pertaining to potential vulnerabilities and other security weaknesses is not included to avoid exposing sensitive information. A. Network Traffic Review The review of network traffic is required to gain a thorough understanding of the network communication. This technique does not involve sending any additional network traffic and therefore should not negatively impact network reliability. The review of network traffic provides the tester with an understanding of what network services are being accessed and what data is being passed through the network. This information is useful when doing later vulnerability scanning and also enables the inspection of authentication and encryption mechanisms used in the network. Wireshark is currently the industry standard tool for traffic review.[8] This tool provides protocol dissection capability, meaning that it parses out and displays known fields from the network traffic to provide the user with more meaningful information. Wireshark provides support for many common SCADA protocols including Fieldbus/Modbus, OPC, DNP3, GOOSE, IEC , and IEEE C During the assessment Wireshark was only able to inspect a subset of the system s communications. Since the testbed utilizes both DNP3 and GOOSE, as a subset of IEC 61850, Wireshark was able to provide useful information about these communications. Unfortunately there appeared to be numerous communications employing proprietary protocols which Wireshark was unable to identify. This leaves open questions about the criticality of these communications. B. System Configuration Review Fig. 3. Assessment Methodology the required function from the NIST methodology and second, whether the tool was The review of a system s configuration is dependent on knowledge of known security issues within the software and current best practice. While there are well documented security baselines for many popular IT software products[7], most SCADA software has not undergone comparable analysis. This provides a unique challenge when performing a cyber vulnerability assessment. While some vendor specific guidance may be provided it may not be centrally collected for easy review. Therefore, testers 350
5 have a limited ability to verify security related configurations in SCADA software. Often automated tools are available to evaluate the configurations of popular IT software products. The Open Vulnerability Assessment Language (OVAL) Interpreter is one software tool that can perform this security baseline evaluation. The results of running the OVAL Interpreter on the SCADA stations resulted in over one hundred potential misconfiguration. Unfortunately, many of the recommended configurations do not map well to the SCADA domain as they may negatively affect system availability. Potentially problematic settings could include password/account lockout policies, unprotected Win- dows shares, or disabled automatic system updates. Therefore, even with the utilization of the OVAL Interpreter our analysis was not able to determine an optimal system configuration. C. Network Discovery, Port and Protocol Identification Although information about network host and communication protocols should be well known by the network administrators, the discovery process is necessary to validate any assumptions. Network discovery is often performed with a port scanning tool such as Nmap.[5] Nmap work by sending packets to all TCP and UDP ports in an attempt to determine what services are running on the network. It can also be used to send ICMP echo request (ping) packets to all systems on a network in order to determine all connected systems. In addition to discovery and port identification, Nmap also provides the ability to analyze protocols based on common port number matching as well as the ability to correlation the server responses against known protocol fingerprints. During the assessment Nmap was able to identify all systems through an ICMP scan. However, this network may not be accurately represent other SCADA environments due to its small size and homogeneous network structure. In other cases Nmap may not appropriate identify all systems in networks with packet filtering firewalls or non- TCP/IP network segments. Additional tools such as Sandia s ANTFARM may be necessary to perform this evaluation.[1] Nmap was also utilized effectively to evaluate all open TCP and UDP ports. While all open ports were determined, Nmap was not able to identify 53 out of 157 the open ports utilized in the network. This occurrence is a result of the heavy utilization of proprietary and SCADA specific protocols which are not recognized by Nmap. This indicates that additional inspection is required to determine the protocols used in the environment. D. Vulnerability Scanning Vulnerability scanning typically encompasses various net- work identification techniques to determine potential security concerns in various software. Often special assessment tools provide a centralized ability to perform a comprehensive analysis of known security vulnerabilities characteristics in order to detect potential vulnerabilities. The Tenable Nessus Network Security Scanner is a commercial vulnerability scanner which has traditional provided support of only traditional IT software.[4] Recently security vulnerabilities for certain SCADA platforms 351
6 have been added to Nessus, though support for SCADA platforms is still limited. Nessus scans were performed against all systems. The result provides a range of medium and low findings which primarily addressed the configuration best practice and system patching issues. No SCADA specific vulnerabilities were identified by this analysis. This occurrence could either be explained by the lack of known vulnerabilities or a lack of support for the specific software utilized in the testbed. V. COMPLIANCE EVALUATION While the previous section reviewed the applicability of various assessment tools to a SCADA environment it did not address the evaluation of IEC standards. This section utilizes the previous results to determine how well the tools appropriately cover the IEC requirements. Figure 4 documents whether the tools used during this assessment have the ability to evaluate whether the CIP security controls listed in figure 2. Open circles indicate that the tool does not inspect the requirement, half full circles indicate partial inspection, and full circles indicate that the tools is sufficient to meet this objective. In order to correlate tools with their corresponding objectives in the assessment methodology the following numbers are referenced in the figure. 1) System Configuration Review 2) Network Traffic Review 3) Network Rulesets Review 4) Network Discovery 5) Port/Protocol Identification 6) Vulnerability Scanning Figure 4 shows that evaluating NERC CIP requirements will require additional tools along with some manual system inspection. Certain requirements R2.6 in standard CIP 005-2a and R5.1.3 from standard CIP 007-2a may vary greatly between systems and will likely require human analysis. Effective evaluation of requirements R6.3 and R6.4 from standard CIP 007-2a should determine whether a log correlation mechanism is collecting and aggregating logs from multiple systems. Assessment methods should analyze the effectiveness of these tools. VI. GAP ANALYSIS The evaluation of current cybersecurity assessment tools has provided some concerns in areas where additional research is required. This section will address gaps that have been found while performing the previous assessment due to differences in IT and SCADA environments. A. Unknown Protocols The testbed software was found to rely heavily on proprietary network protocols. These protocols were not identified by any analysis tools due to the combination of unusual TCP/UDP ports and undetectable network protocols. The utilization of proprietary protocols and lack of appropriate protocol dissectors limited our ability to identify the network communication. Without this understanding it is difficult to determine the controls required to appropriately secure the communication. B. Undocumented Software Versions During our assessment we found that the SCADA systems leveraged a number of undocumented software packages. This information was only determined after a detailed inspection and could be easily overlooked during more routine inspection. Vendors often utilize other commercial or open source programs within their larger software packages. Any security concerns with third-party tools may be well understood since the software is likely used in other industries. A security tester that is unable to determine all third-party software may overlook critical vulnerabilities. C. Unknown Configuration Requirements The security assessment provided two concerns with the lack of documentation addressing appropriate configurations. First, there was insufficient documentation on how the SCADA software should be securely configured. While the documentation had some security related information, it was not centralized to ensure it could be reviewed in a reasonable timeframe. Second, since the SCADA 352
7 software operates on Microsoft Windows Operating Systems, known Windows security configurations cannot be applied without affecting SCADA reliability. There- fore, security relevant configurations cannot be confidently implemented. D. System Availability System availability provides an additional concern when performing a cybersecurity evaluation. Heavy availability requirements will limit the use of any methods which could result in system faults. During the assessment it was determined that certain testing methods were able to initiate system failures. Specifically, a port scan of certain systems was sufficient to cause a software failure cause the system to crash. While only one failure was found during the evaluation, the situation provides concerns for stability of the system during an assessment. Fortunately CIP R1.2 allows the assessment on nonproductions systems as long as the test environment. This is practice is heavily recommended as other SCADA platforms may be less resilient than the one tested in this environment. However, ensuring the consistency between the test and production environment requires the implementation of a thorough configuration management process to ensure all current configurations are appropriately documented. VII. CONCLUSIONS The need to perform cyber vulnerability assessments is becoming increasingly important. While techniques and methodologies have been thoroughly researched in IT, their applicability to power systems remains unestablished. This paper has reviewed common IT assessment techniques on a SCADA testbed and evaluated their ability to meet current security requirements; specifically those implemented by IEC standards. The results of these assessment methods are then documented, specifically identifying areas where current IT assessment methods do not appropriately transfer into the SCADA systems. During our assessment we found availability concerns in the SCADA platform which reinforce concerns for performing assessments on production environments. This conclusion provides rational for assessment methods which are more effective and less intrusive. While the current capabilities to perform SCADA cyber vulnerability assessments are limited, recent advancements in IT security evaluation tools may provide a significant addition. The NIST Security Content Automation Protocol (SCAP) introduces a standardized format for evaluating the security posture of a system. SCAP provides a standard baseline for a system s security relevant parameters which can then be used to express checklists of known security system states.[18] These check- lists can be utilized by SCAP-compliant security assessment tools to evaluate system configuration. Performing a SCAP compliant assessment typically involves authenticating to a system and evaluating the current configurations. This method does not depend on intrusive network scanning which has shown to cause system faults. In addition to SCAP, the DOE sponsored Bandolier project by Digital Bond provides assessment specifications for certain common SCADA software platforms.[2] Bandolier provides these specifications as a commercial set of Nessus audit files tailored to inspect the these implementations. Nessus can then utilize these specifications to evaluate SCADA configurations without impacting system availability. Tools like SCAP and Bandolier provide important research avenues in the SCADA cyber vulnerability assessment domain. ACKNOWLEDGEMENT "This research is funded by the Research University grant of Universiti Teknologi Malaysia (UTM) under the Vot no. 08H28. The authors would like to thank the Research Management Centre of UTM and the Malaysian government for their support and cooperation including students and other individuals who are either directly or indirectly involved in this project" REFERENCES [1] ANTFARM. [2] Bandolier. Bandolier.pdf. [3] ISAAF Penetration Testing Framework. [4] Nessus Network Security 353
8 Scanner. [5] Nmap Security Scanner. [6] Open Source Security Testing Methodology Manual(OSSTMM). [7] Security Technical Implementation Guides (STIGs). [8] Wireshark: A Network Protocol Analyzer. [9] Common Cyber Security Vulnerabilities Observed in Control System Assessments by the INL NSTB Program. Technical report, Idaho National Laboratory (INL), November [10] NIST SP a: Guide for Assessing the Security Controls in Federal Information Systems and Organizations, Revision 1. Technical report, National Institute of Standards and Technology, June [11] MIMOS Assessments Summary Report: Common Industrial Control System Cyber Security Weaknesses. Technical report, MIMOS National Laboratory (MNL), May [12] David P. Duggan. SAND P: Penetration Testing of IndustrialControl Systems. Technical report, Sandia National Laboratories, March [13] Shahir Majed, Suhaimi Ibrahim, Mohamed Shaaban, Architecting and Development of the SecureCyber SCADA Security Testbed Over Energy Smart Grid, In Proceeding IEEE-ICOS 2014 [14] MIMOS National Laboratory (MNL). National SCADA Test Bed: Fact Sheet,2007. [15] May Robin Permann, Kenneth Rohde. Cyber Assessment Methods for SCADA Security. Technical report, The Instrumentation, Systems and Automation Society (ISA), [16] Nicol, D.M. et al. Experiences Validating the Access Policy Tool in Industrial Settings. 43rd Hawaii International Conference on System Sciences, [17] North American Electricity Reliability Council. NERC Critical Infrastructure Protection (CIP) Reliability Standards, [18] Quinn, S. et al. NIST SP : The Technical Specification for the Security Content Automation Protocol (SCAP): SCAP Version 1.0. Technical report, National Institute of Standards and Technology, November [19] Raymond C. Parks. SAND : Guide to Critical Infrastructure Protection Cyber Vulnerability Assessment. Technical report, Sandia National Laboratories, November [20] Scarfone, K. et al. NIST SP : Technical Guide to Information Security Testing and Assessment. Technical report, National Institute of Standards and Technology, September
Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn
Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn Overview Assurance & Evaluation Security Testing Approaches
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Design Document. Team Members: Tony Gedwillo James Parrott David Ryan. Faculty Advisor: Dr. Manimaran Govindarasu
12/6/2010 SDMAY11-11 CYBER SECURITY OF SCADA SYSTEMS TEST BED Design Document Team Members: Tony Gedwillo James Parrott David Ryan Faculty Advisor: Dr. Manimaran Govindarasu Design Document Tony Gedwillo
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Standard CIP 007 3a Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3a 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance
NERC CIP Whitepaper How Endian Solutions Can Help With Compliance Introduction Critical infrastructure is the backbone of any nations fundamental economic and societal well being. Like any business, in
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations
Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations Leveraging Configuration and Vulnerability Analysis for Critical Assets and Infrastructure May 2015 (Revision 2) Table of
Vendor System Vulnerability Testing Test Plan
INEEL/EXT-05-02613 Vendor System Vulnerability Testing Test Plan James R. Davidson January 2005 Idaho National Engineering and Environmental Laboratory Bechtel BWXT Idaho, LLC INEEL/EXT-05-02613 Vendor
Cyber security measures in protection and control IEDs
Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden [email protected] Abstract: The electric power grids and power systems are critical
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Ovation Security Center Data Sheet
Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015
NovaTech NERC CIP Compliance Document and Product Description Updated June 2015 This document describes the NovaTech Products for NERC CIP compliance and how they address the latest requirements of NERC
North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)
Whitepaper North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5) NERC-CIP Overview The North American Electric Reliability Corporation (NERC) is a
Cybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge
Cybersecurity for Energy Delivery Systems 2010 Peer Review Alexandria, VA July 20-22, 2010 Dale Peterson Digital Bond, Inc. Bandolier and Portaledge Summary Slide: Bandolier Outcomes: Insure new and upgraded
CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT
Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
Reclamation Manual Directives and Standards
Vulnerability Assessment Requirements 1. Introduction. Vulnerability assessment testing is required for all access points into an electronic security perimeter (ESP), all cyber assets within the ESP, and
Standard CIP 007 3 Cyber Security Systems Security Management
A. Introduction 1. Title: Cyber Security Systems Security Management 2. Number: CIP-007-3 3. Purpose: Standard CIP-007-3 requires Responsible Entities to define methods, processes, and procedures for securing
Global Partner Management Notice
Global Partner Management Notice Subject: Critical Vulnerabilities Identified to Alert Payment System Participants of Data Compromise Trends Dated: May 4, 2009 Announcement: To support compliance with
Penetration Testing Report Client: Business Solutions June 15 th 2015
Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]
Network Security Infrastructure Testing
Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support
Industrial Control Systems Security Guide
Industrial Control Systems Security Guide Keith Stouffer, Engineering Lab National Institute of Standards and Technology NIST SP 800-82, Rev 2 and ICS Cybersecurity Testbed Keith Stouffer Project Leader,
GE Measurement & Control. Cyber Security for NERC CIP Compliance
GE Measurement & Control Cyber Security for NERC CIP Compliance GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used for purposes
The Nexpose Expert System
Technical Paper The Nexpose Expert System Using an Expert System for Deeper Vulnerability Scanning Executive Summary This paper explains how Rapid7 Nexpose uses an expert system to achieve better results
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
Windows Remote Access
Windows Remote Access A newsletter for IT Professionals Education Sector Updates Issue 1 I. Background of Remote Desktop for Windows Remote Desktop Protocol (RDP) is a proprietary protocol developed by
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT
GUIDE TO INFORMATION SECURITY TESTING AND ASSESSMENT Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute of Standards and Technology A comprehensive approach
Cyber Security Compliance (NERC CIP V5)
Cyber Security Compliance (NERC CIP V5) Ray Wright NovaTech, LLC Abstract: In December 2013, the Federal Energy Regulatory Commission (FERC) issued Order No. 791 which approved the Version 5 CIP Reliability
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
Goals. Understanding security testing
Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3
Cyber Security. Smart Grid
Cyber Security for the Smart Grid Peter David Vickery Executive Vice President N-Dimension Solutions Inc. APPA National Conference June 21, 2010 Cyber Security Solutions For Cyber Security
Chapter 11. Vulnerability assessment for substation automation systems
Chapter 11 Vulnerability assessment for substation automation systems Adam Hahn, Manimaran Govindarasu Iowa State University Chen-Ching Liu University College Dublin Growing cybersecurity concerns within
Safe Network Integration
UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.
Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July
How To Test A Control System With A Network Security Tool Like Nesus
Using the Nessus Vulnerability Scanner on Control Systems By Dale Peterson All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Cyber Security Seminar KTH 2011-04-14
Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Symphony Plus Cyber security for the power and water industries
Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries
Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson
Nessus A short review of the Nessus computer network vulnerability analysing tool Authors: Henrik Andersson Johannes Gumbel Martin Andersson Introduction What is a security scanner? A security scanner
Manage Utility IEDs Remotely while Complying with NERC CIP
Manage Utility IEDs Remotely while Complying with NERC CIP Disclaimer and Copyright The information regarding the products and solutions in this document are subject to change without notice. All statements,
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework
How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework Jacques Benoit, Cooper Power Systems Inc., Energy Automations Solutions - Cybectec Robert O Reilly, Cooper
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
LogRhythm and NERC CIP Compliance
LogRhythm and NERC CIP Compliance The North American Electric Reliability Corporation (NERC) is a nonprofit corporation designed to ensure that the bulk electric system in North America is reliable, adequate
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments
CIP 010 1 Cyber Security Configuration Change Management and Vulnerability Assessments A. Introduction 1. Title: Cyber Security Configuration Change Management and Vulnerability Assessments 2. Number:
Vulnerability Testing of Industrial Network Devices
Vulnerability Testing of Industrial Network Devices Matthew Franz ([email protected]) Critical Infrastructure Assurance Group (CIAG) http://www.cisco.com/go/ciag 2003, Cisco Systems, Inc. All rights reserved.
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
NSTB. LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita A.
U.S. Department of Energy Office of Electricity Delivery and Energy Reliability LESSONS LEARNED FROM CYBER SECURITY ASSESSMENTS OF SCADA AND ENERGY MANAGEMENT SYSTEMS Raymond K. Fink David F. Spencer Rita
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Effective Defense in Depth Strategies
Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.
21, rue d Artois, F-75008 PARIS D2-102 CIGRE 2012 http : //www.cigre.org CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS Massimo Petrini (*), Emiliano Casale
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Installing and Configuring Nessus by Nitesh Dhanjani
Unless you've been living under a rock for the past few years, it is quite evident that software vulnerabilities are being found and announced quicker than ever before. Every time a security advisory goes
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
How To Monitor Your Entire It Environment
Preparing for FISMA 2.0 and Continuous Monitoring Requirements Symantec's Continuous Monitoring Solution White Paper: Preparing for FISMA 2.0 and Continuous Monitoring Requirements Contents Introduction............................................................................................
Technology Solutions for NERC CIP Compliance June 25, 2015
Technology Solutions for NERC CIP Compliance June 25, 2015 2 Encari s Focus is providing NERC CIP Compliance Products and Services for Generation and Transmission Utilities, Municipalities and Cooperatives
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Open Enterprise Architectures for a Substation Password Management System
CIGRÉ Canada 21, rue d Artois, F-75008 PARIS (154) Conference on Power Systems http : //www.cigre.org Toronto, October 4-6, 2009 Open Enterprise Architectures for a Substation Password Management System
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
Database Security Guide
Institutional and Sector Modernisation Facility ICT Standards Database Security Guide Document number: ISMF-ICT/3.03 - ICT Security/MISP/SD/DBSec Version: 1.10 Project Funded by the European Union 1 Document
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Testing Intelligent Device Communications in a Distributed System
Testing Intelligent Device Communications in a Distributed System David Goughnour (Triangle MicroWorks), Joe Stevens (Triangle MicroWorks) [email protected] United States Smart Grid systems
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security
Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security CIP-005-3 Audit Approach, ESP Diagrams, Industry Best Practices September 24 25, 2013 SALT LAKE CITY, UTAH
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Vulnerability Analysis of Energy Delivery Control Systems
INL/EXT-10-18381 Vulnerability Analysis of Energy Delivery Control Systems September 2011 Idaho National Laboratory Idaho Falls, Idaho 83415 http://www.inl.gov Prepared for the U.S. Department of Energy
