Using ISA/IEC Standards to Improve Control System Security
|
|
|
- Scarlett McKenzie
- 9 years ago
- Views:
Transcription
1 Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC Standards to Improve Control System Security Contents 1. Executive Summary What s New in this Version Why the Push for Productivity has degraded Control Network Security The ISA/IEC Zone and Conduit Security Model Defining the Security Zones Defining the Security Conduits Securing the Conduits A Real-World Oil Refinery Example Implementing Zones and Conduits with Industrial Security Appliances Testing and Managing the Security Solution Summary Resources Author Eric Byres, P. Eng., ISA Fellow Chief Technology Officer Tofino Security, a Belden Brand Belden Inc. [email protected]
2 1. Executive Summary Anyone integrating automation technologies these days is well aware of the pressure on the operators of industrial plants to increase productivity, reduce costs and share information in real time across multiple industrial and enterprise systems. Adding to these business pressures is the growing fear of cyber attack as the world has become aware that the Stuxnet worm was specifically designed to disrupt an industrial process. Operators and engineers are under pressure to isolate automation systems at the same time as management is asking for greater interconnectedness. How can you help your company or clients deal with the conflicting requirements of more integration and more isolation? This white paper explains how the zone and conduit model included in the ISA/IEC (formerly known as ANSI/ISA-99) security standards provides a framework for helping deal with network security threats that arise from both the push for productivity and the fear of the next Son-of-Stuxnet worm. 2. What s New in this Version In 2010, the standards were renumbered to be the ANSI/ISA series. This change was intended to align the ISA and ANSI document numbering with the corresponding International Electrotechnical Commission (IEC) standards. This revision reflects those changes. 3. Why the Push for Productivity has degraded Control Network Security As corporate networks have converged with Industrial Control System (ICS) networks, there have been many integration projects where proprietary networks were replaced with commercial-off-theshelf equipment using Ethernet-TCP/IP technology. This shift in technology has greatly increased the complexity and interconnectedness of control systems. As a result, they now have many of the same vulnerabilities that have plagued enterprise networks. In addition, the controllers in these networks are now subjected to new threat sources that they were never designed to handle. The result has been a significant increase in the number of plant disruptions and shut-downs due to cyber security issues in the control networks. The Repository for Industrial Security Incidents (RISI 1 ) is the world s largest database of security incidents in control and SCADA systems. An analysis of the data from 1982 to 2010 found that the type of incidents affecting control systems breaks down as follows: 50% of incidents were accidental in nature 30% of incidents were due to malware 11% of incidents were due to external attackers 9% of incidents were due to internal attackers In our study of the incidents included in the RISI database, we see problems arising from three common sources: i. Proliferation of Soft Targets Supervisory Control and Data Acquisition (SCADA) and ICS devices such as PLCs, DCS controllers, IEDs, and RTUs were designed with a focus on reliability and real-time I/O, not robust and secure networking. Many ICS devices will crash if they receive malformed network traffic or even high loads of correctly-formed data. Also, Windows PCs in these networks often run for months at a time without security patches or antivirus updates, and are even susceptible to outdated malware. 1 May
3 ii. Multiple Points of Entry Even without a direct connection to the Internet, modern control systems are accessed by numerous external sources. All of them a potential source of infection or attack. These include: remote maintenance and diagnostics connections historian and Manufacturing Execution Systems (MES) servers shared with business users remote access modems serial connections wireless systems mobile laptops USB devices data files (such as PDF documents or PLC project files) Figure 1: Possible Pathways into the Control System These pathways are underestimated and poorly documented by the owners and operators of industrial systems. In testimony by Mr. Sean McGurk, the Director of National Cybersecurity and Communications Integration Center (NCCIC) at the Department of Homeland Security noted: "In our experience in conducting hundreds of vulnerability assessments in the private sector, in no case have we ever found the operations network, the SCADA system or energy management system separated from the enterprise network. On average, we see 11 direct connections between those networks. In some extreme cases, we have identified up to 250 connections between the actual producing network and the enterprise network. 2 As the Stuxnet worm showed us in 2010, these pathways can be readily exploited by malware and other disruptive elements. Stuxnet used at least eight different propagation mechanisms, including USB drives, PLC project files and print servers to work its way into the victim s control system. 2 The Subcommittee on National Security, Homeland Defense, and Foreign Operations May 25, 2011 hearing. 58: :00 May
4 iii. Poor Internal Network Segmentation Control networks are now more complex than ever before, consisting of hundreds or even thousands of individual devices. Unfortunately the design of many of these networks has remained flat with virtually no segmentation. As a result, problems that originate in one part of the network can quickly spread to other areas. 4. The ISA/IEC Zone and Conduit Security Model Given the above concerns, what can the control or SCADA engineer do to secure his or her system? With the competitive pressure that most companies face to improve productivity and access to the data in their plants, it is unlikely that engineers will be able to significantly reduce the number of internal and external pathways into their facilities. Furthermore, the use of modern IT technologies now requires a steady stream of electronic data onto the plant floor as well. These often take the form of upgrades, patches, process recipes and remote support connections, all of which pose a security risk. There is also limited opportunity for plant engineers to address the proliferation of soft targets in the short term. Aggressive patching strategies do help reduce the risk of exposed operating system vulnerabilities, but most plant operators are dependent on their ICS/SCADA equipment vendors to secure the actual controllers and ICS software products. Unfortunately, this has met with limited success. As of December 2011, the US ICS-CERT had published 137 advisories on control system products 3 with known security vulnerabilities. Less than 50% of these had patches available at the close of the year. The good news is that engineers can address the third cause by implementing good network architectures in their control systems. This white paper explains how to do this using the strategies outlined in the ISA/IEC Standards: Security for Industrial Automation and Control Systems. ISA/IEC is a complete security life-cycle program for industrial automation and control systems. It consists of 11 standards and technical reports on the subject, a number of which have been publicly released as American National Standards Institute (ANSI) documents. Work products from the ISA99 committee are also submitted to International Electrotechnical Commission (IEC) as standards and specifications in the IEC series. ISA/IEC introduces the concepts of zones and conduits as a way to segment and isolate the various sub-systems in a control system. A zone is defined as a grouping of logical or physical assets that share common security requirements based on factors such as criticality and consequence. Equipment in a zone has a security level capability. If that capability level is not equal to or higher than the requirement level, then extra security measures, such as implementing additional technology or policies, must be taken. 3 May
5 Figure 2: Security Zone Definition Any communications between zones must be via a defined conduit. Conduits control access to zones, resist Denial of Service (DoS) attacks or the transfer of malware, shield other network systems and protect the integrity and confidentiality of network traffic. Typically, the controls on a conduit are intended to mitigate the difference between a zone s security level capability and its security requirements. Focusing on conduit mitigations is typically far more cost effective than having to upgrade every device or computer in a zone to meet a requirement. Figure 3: Conduit Definition It is important to understand that ISA/IEC standards do not specify exactly how a company should define its zones or conduits. Instead, the standard provides requirements based on a company s assessment of its risk from cyber attack. Since risk is a function of not only the possibility of a cyber incident, but also the consequences of such an incident, the zones and conduits and the protection needed for each will vary for each facility. Figure 4 lists some of the sub-sections in the document ANSI/ISA ( )-2009 that address network segmentation using zones and conduits. May
6 Sub-section Number and Description Requirement : Develop the network segmentation architecture A network segmentation countermeasure strategy employing security zones shall be developed for IACS devices based upon the risk level of the IACS : Employ isolation or segmentation on high-risk IACS Any high-risk IACS zone shall be either isolated from or employ a barrier device to separate it from other zones with different security policies, levels or risks. The barrier device shall be selected commensurate to the risk reduction required : Block non-essential communications with barrier devices Barrier devices shall block all non-essential communications in and out of the security zone containing critical control equipment. Figure 4: Key Zone and Conduit Requirements from ISA/IEC Defining the Security Zones Zone and conduit design starts with the facility or operation being analyzed to identify groups of devices that have common functionality and common security requirements. These groups are the zones that require protection. For example, a facility might first be divided into operational areas, such as materials storage, processing, finishing, etc. Then within these areas it could be further divided into functional layers, such as Manufacturing Execution Systems (MES), Supervisory Systems (i.e. operator HMIs), primary control systems (e.g. DCS Controllers, RTUs and PLCs) and safety systems. Often models from other standards such as ANSI/ISA or the Purdue manufacturing model are used as a basis for this division. Vendor design documents can also be helpful. Each zone can then be defined by a number of zone characteristics (attributes). The following are some recommended characteristics: 1) Zone Description i) Zone Name ii) Definition iii) Zone Function 2) Zone Boundaries 3) Typical Assets (or if possible, Asset Inventory) 4) Inheritance from Other Zones 5) Zone Risk Assessment i) Security Capabilities of Zone Assets ii) Threats and Vulnerabilities iii) Consequences of a Security Breach iv) Business Criticality 6) Security Objectives 7) Security Strategy 8) Acceptable Use Policy 9) Inter-zone connections (i.e. Access Requirements) 10) Change Management Process May
7 Examples are provided later in this white paper to help clarify these attributes. Notice that each zone is defined with not only its boundaries, assets and risk analysis, but also its security capabilities. In other words, the security capabilities of a zone full of Windows 2008 servers is very different than of a zone of Windows NT servers or a zone with PLCs. This security capability, along with the security risk faced by the zone, drives the security function requirements for conduits that connect the zone to other zones. The soon to be published ISA ( ): Security for Industrial Automation and Control Systems: System Security Requirements and Security Assurance Levels helps the user define these security capabilities and requirements. Zones can also be defined according to a control asset s inherent security capabilities. For example, older PLCs that have very weak password controls (i.e. authentication) could be grouped into a zone that provides them with additional defenses. 6. Defining the Security Conduits The next step is to discover the pathways in the system through which data is passed between these zones; these are the network conduits. Each conduit should be defined in terms of the zones it connects, the technologies it utilizes, the protocols it transports and any security features it needs to offer its connected zones. Typically, determining the information transfer requirements between zones over the network is straight forward. Tools like traffic flow analyzers or even simple protocol analyzers can show which systems are exchanging data and the services they are using. It is also wise to look beyond the network, to determine the hidden traffic flows. For example, are files ever moved via USB drive between the lab and the primary control systems? Do people remotely connect to the RTUs using a dialup modem? These flows are easy to miss, but can result in serious security issues if not managed carefully. Data flow diagrams are an excellent tool to summarize the conduits and the traffic flows they contain. Each zone can be represented by a node and each flow can be represented by a vector. Figure 5: Example Data Flow Diagram May
8 7. Securing the Conduits Once the conduits and their security requirements are defined, the final phase is to implement the appropriate security technologies. There are two popular options for this stage: Firewalls: These devices control and monitor traffic to and from a zone. They compare the traffic passing through to a predefined security policy, discarding messages that do not meet the policy s requirements. Typically they will be configured to pass only the minimum traffic that is required for correct system operation, blocking all other unnecessary traffic. They can also filter out high risk traffic, such as programming commands or malformed messages that might be used by hackers to exploit a security hole in a product. Industrial firewalls are designed to be very engineer-friendly and are capable of detailed inspection of SCADA protocols such as DNP-3, Ethernet/IP and Modbus/TCP. VPNs (Virtual Private Networks): These are networks that are layered onto a more general network using encryption technology to ensure private transmission of data and commands. VPN sessions tunnel across a transport network in an encapsulated format, making them invisible to devices that don t have the have access to the VPN members secret keys or certificates. The whole zone and conduit approach implements a strategy of defence in depth multiple layers of defence distributed throughout the control network which has been proven in the IT community to be a strategy that works well. 8. A Real-World Oil Refinery Example Figure 6: Core Refinery Operations An example from the oil industry site shows how the ISA/IEC zones and conduits design techniques were used by a large refinery to create a security architecture and protect its operations. This company owns a large industrial refinery process facility. Inside the facility there are multiple operations such as Distillation, Hydrotreating, Catalytic Reformers and Utilities. The company also follows the concepts of ANSI/ISA and ANSI/ISA ( )- 2007, dividing its process operations into Levels 0 through 4. Because of the nature of its operations, many (but not all) of its operations require safety integrated systems (SIS). It also has several control areas that are beginning to use wireless technology. Finally, suppliers (such as control system vendors) and downstream customers (for custody transfer) must interface with its control systems. A high-level network diagram of the refinery is shown in Figure 6. For simplicity, only two refinery operations areas (Op #1 and Op #2) are shown in this diagram, but in real life, there were multiple operations. Each operation has its own basic control, safety and HMI/supervisory systems. These systems connect to a common Process Information Network, where Historian and MES servers are accessible from both the Enterprise and control networks. In addition, wireless sensors are being May
9 Figure 7: Refinery Zone Diagram deployed throughout Op #2, and a Remote Access gateway is provided to permit remote maintenance on plant systems by the control system engineers. The company then began to divide its systems into zones based on operational function, process level, security requirements and security capabilities as shown in Figure 7. All control functions belong to an overall Process Control Zone (A) and within that there are Operational Zones (O1, O2 On) for each major operational unit. This way security requirements for a particular operation could be adjusted for its potential for risk (e.g. security for a low consequence unit like waste water could be relaxed, as compared to a hydrocracker unit). Finally, the Operational Zones could be divided into subzones based on the ISA-95 level they operate at. Once the zones were defined, they needed to be described with the zone attributes as noted earlier. Figure 8 shows an example zone definition for one of the safety area zones. It is worth mentioning that the zone definition procedure is an iterative process. It is likely that zone boundaries need to be redefined and new zones created as the description stage is conducted. May
10 ZONE S 1 Zone Name: Unit 1 Hydrocracker Safety System Definition of this Zone: This zone includes all safety integrity systems for the Unit 1 Hydrocracker. Controlling Agency: Process Automation Department, SIS Team. Zone Function: The systems in this zone provide safety functions to the Unit 1 Hydrocracker. Zone Boundaries: The Safety Integrated System as defined by the Unit 1 Hydrocracker HAZOP. Typical Assets: The Safety Integrated System controller, engineering station and communications hardware Inheritance: This zone inherits attributes from Zone C1 (Unit 1 Hydrocracker Basic Control System) Zone Risk Assessment: This is a low to moderately secure zone with extreme consequences if breached. a) Security Capabilities of Zone Assets: All assets are assumed to be incapable of withstanding low level attacks (i.e. those launched by unsophisticated attackers or malware) on their availability or confidentiality. This is a result of the protocols in use and system design. Assets are assumed to be capable of withstanding medium level attacks (i.e. those launched by moderately sophisticated attackers or malware) on their integrity. b) Threats and Vulnerabilities: The vulnerabilities of this zone are assumed to be typical of legacy industrial control devices using MODBUS for communications. The principal threats are: a. Network-based Denial of Service to SIS communications. b. Internal or External unauthorized access to the SIS engineering station. c. Spoofing of MODBUS/TCP control commands. d. Spoofing of MODBUS/TCP responses to the process system. e. Reprogramming of safety functions. c) Consequences of a Security Breach: a. Loss of production >6 hrs from false trip of emergency shutdown system. b. Loss of production <6 hrs due to loss of visibility to safety system. c. Disabling/manipulation of emergency shutdown resulting in fatality or major community incident. d) Business Criticality: Extreme Security Objective: To protect the integrity and availability of the Unit 1 Hydrocracker Safety System. Acceptable Use Policy: I/O and Fieldbus communications is allowed to Zone P1 (Unit 1 Hydrocracker Process). Read access to published data is allowed to approved systems in the Zone C1 (Unit 1 Hydrocracker Basic Control System). All Write access to this zone is forbidden. All system management and programming functions shall be internal to this zone. Inter-zone Connections: Conduits to this zone may be established from Zone C1 (Unit 1 Hydrocracker Basic Control System) and from Zone P1 (Unit 1 Hydrocracker Process). Security Strategy: All connections to this zone must be controlled using type S conduits. Access to these systems must be approved by the Controlling Agency. Change Management Process: All changes to this zone or any of its connecting conduits must follow the approved change management process of its corresponding Controlling Agency (see above). This includes, but is not limited to, the installation or replacement of equipment, modification of security policy, and exceptions to security policy or existing practices. Figure 8: Example Zone Definition Document for the Safety Zone May
11 This facility was no exception. Following the initial analysis, the potential threat sources and consequences of an attack were identified and reviewed with the plant engineers. Through this analysis, it was evident that the safety integrated system (SIS) in each operational unit should be located in its own zone (initially they were part of the basic control zone). To ensure continued safe plant operation, it was vital that the safety system could not be compromised from the plant control network. Later in the process, these were the first zones to be protected with security appliances on the conduits. Figure 9: Defined Conduits in Refinery With the zones defined, the next stage was the conduit definitions. For all connections between two zones, a conduit was defined. This is a record of approved connections and data flows (called channels in ISA/IEC 62443) between zones. Figure 9 shows a simplified diagram of the network conduits. Non-network conduits should also be documented, such as information transfers by USB drives between zones, or the use of dial up modems. 9. Implementing Zones and Conduits with Industrial Security Appliances The final stage of the zone and conduit security process is to select technologies to secure the conduits and zones. Some industrial security appliances are engineered specifically to support this defence in depth strategy in control networks. These are the ideal platform on which to base an ISA/IEC zones and conduits deployment. On start-up, any industrial security appliance should be plug and protect ready. That is, as shipped from the factory, it transparently bridges all traffic between its Ethernet ports, so it can be installed in the control network without any changes to the design or IP addressing of the network. Some industrial security appliances can be fine-tuned for a particular purpose by installing firmware modules that implement security features, such as firewall, asset management, VPN and content inspection of particular protocols such as Modbus or OPC. In an ISA/IEC zones and conduits deployment, industrial security appliances can be installed in each conduit identified in the network. Once this is done, a firewall module can be activated in each appliance to provide the capability to filter all traffic passing through that conduit. The firewall makes it simple to build Figure 10: Securing the Conduits and Zones with Firewalls and VPNs May
12 intrinsically secure networks because it automatically blocks and reports any traffic for which there is no allow rule. The control system engineer need only configure firewall rules that specify which devices in the network will be allowed to communicate through the conduit and what protocols they may use, and the industrial security appliance will block any other traffic not matching these rules. 10. Testing and Managing the Security Solution The next stage in the process is to test the architecture and implementation. This includes not only making sure the deployment blocks attack, but also ensuring that the operation of the industrial process is not negatively affected by the security deployment. Ideally, the industrial firewall s configuration tools should be designed specifically to match the needs of the control engineer responsible for configuration and testing. Good security tools make it very easy not only to configure firewall rules, but also to test them before they are actually implemented. This is essential for safe deployment of a firewall or VPN in control networks it is not acceptable to accidently block good network traffic that is required for correct plant operation. One solution is a Test mode that transparently bridges all traffic through the firewall, but reports any traffic that would have been blocked if the firewall rules had been active. This permits the control engineer to interactively edit and test the rules in the network using real network traffic, but with no risk of accidently shutting down the plant. When no more blocked traffic alarms are generated by the device, the engineer can have a high level of confidence that the firewall rules are correct and complete. It is then safe to switch the security appliance to Operational mode where the firewall rules will be enforced. The final stage is to manage the system on an ongoing basis. Typical control networks will have multiple conduits distributed over many locations in a plant. Ideally, the multiple industrial security appliances should be managed from a single management console application. We will discuss this in more detail in future white papers. 11. Summary New network and PC-based technologies introduced into control systems have provided tremendous improvements in plant performance and productivity. In 2010 the Stuxnet worm showed us that sophisticated malware targeted at industrial processes exist and are likely to be more common in the future. The impact of these two trends will be to increase the urgency and thus project priorities for cyber security initiatives that improve control network security and reliability. The ISA/IEC Standards provide a framework for companies to achieve and maintain security improvements through a life cycle that integrates design, implementation, monitoring and continuous improvement. System integrators and control engineers who become proficient with segmenting control networks for zones and conduits, and who gain expertise with appropriate industrial security solutions, will be able to mitigate cyber security threats that arise from both the push for productivity and Son-of-Stuxnet malware. 12. Resources White Paper on the penetration of control systems by Stuxnet: ANSI/ISA ( )-2007 Security for Industrial Automation and Control Systems Part 1: Terminology, Concepts, and Models: ANSI/ISA ( )-2009 Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program: May
Using Tofino to control the spread of Stuxnet Malware
technical datasheet Application Note Using Tofino to control the spread of Stuxnet Malware This application note describes how to use the Tofino Industrial Security Solution to prevent the spread of the
White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012
Tofino Security exida Consulting LLC White Paper Version 1.0 Published February 16, 2012 Contents Executive Summary... 1 Step 1 Assess Existing Systems... 1 Step 2 Document Policies & Procedures... 3 Step
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
Effective OPC Security for Control Systems - Solutions you can bank on
Effective Security for Control Systems - Solutions you can bank on Darek Kominek Manager, Marketing, Matrikon Eric Byres, P. Eng., ISA Fellow CTO, Byres Security Inc. Executive Summary There is a perception
a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.
SCADA and CIP Security in a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. CTO, Byres Security Inc. What is Stuxnet? The Stuxnet Worm July, 2010: Stuxnet worm was
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Session 14: Functional Security in a Process Environment
Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
May/June 2014. Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight. www.isa.
May/June 2014 A PUBLICATION OF THE INTERNATIONAL SOCIETY OF AUTOMATION Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight www.isa.org/intech Top ten differences
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Cybersecurity considerations for electrical distribution systems
White Paper WP152002EN Supersedes January 2014 electrical distribution systems Authors Max Wandera, Brent Jonasson, Jacques Benoit, James Formea, Tim Thompson, Zwicks Tang, Dennis Grinberg, Andrew Sowada,
SCADA Security: Challenges and Solutions
SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative
Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative November 2014 Disclaimer Current SCADA Vulnerability Factors Industrial Control Systems 101 Proposed Countermeasures
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
Network Security Infrastructure Testing
Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment
Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment Introduction 1 Distributed SCADA security 2 Radiflow Defense-in-Depth tool-set 4 Network Access
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)
Cyber Security Design Methodology for Nuclear Power Control & Protection Systems By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC) 1. INTRODUCTION In today s world, cyber security is one
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
SCADA Cyber Attacks and Security Vulnerabilities: Review
SCADA Cyber Attacks and Security Vulnerabilities: Review Jinan Fiaidhi, Yvette E. Gelogo Department of Computer Science, Lakehead University, Hannam University, Korea [email protected], [email protected]
Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com
Ernie Hayden CISSP CEH GICSP Executive Consultant www.securicon.com V1 10-7-14 This Presentation is Proprietary to Securicon, Inc. Any use of this document without express written approval from Securicon
GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems
GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act
A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK With organizations rushing to adopt Voice over IP (VoIP) technology to cut costs and integrate applications designed to serve customers better,
Understanding SCADA System Security Vulnerabilities
Understanding SCADA System Security Vulnerabilities Talking Points Executive Summary Common Misconceptions about SCADA System Security Common Vulnerabilities Affecting SCADA Networks Tactics to Strengthen
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.
Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi [email protected] Security IT & Control System Security: where are we?
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015
An Introduction to SCADA-ICS System Security Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015 Overview Supervisory Control And Data Acquisition (SCADA) for Industrial Control Systems
High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:
High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems: Water Pumping Station Security Case Study Industrial Network Security: New Threats The convergence of IT and industrial
Dr. György Kálmán [email protected]
COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Securing The Connected Enterprise
Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise
New Era in Cyber Security. Technology Development
New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Cisco Security Optimization Service
Cisco Security Optimization Service Proactively strengthen your network to better respond to evolving security threats and planned and unplanned events. Service Overview Optimize Your Network for Borderless
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is
1 2 This slide shows the areas where TCG is developing standards. Each image corresponds to a TCG work group. In order to understand Trusted Network Connect, it s best to look at it in context with the
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems
Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks
Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
PLC Security for Water / Wastewater Systems
INDUSTRIAL INTERNET IN ACTION CASE STUDY PLC Security for Water / Wastewater Systems EXECUTIVE SUMMARY You have likely never worried about the possibility of a high school geek doing some programming that
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
Best Practices for DanPac Express Cyber Security
March 2015 - Page 1 Best Practices for This whitepaper describes best practices that will help you maintain a cyber-secure DanPac Express system. www.daniel.com March 2015 - Page 2 Table of Content 1 Introduction
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015
Industrial Control System Cyber Situational Awareness Robert M. Lee* June 10 th, 2015 Executive Summary Cyber situational awareness is the concept of understanding and visualizing the networked environment
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
An Analysis of the Capabilities Of Cybersecurity Defense
UNIDIRECTIONAL SECURITY GATEWAYS An Analysis of the Capabilities Of Cybersecurity Defense Michael Firstenberg, Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright
CYBER SECURITY. Is your Industrial Control System prepared?
CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there
Defending Against Data Beaches: Internal Controls for Cybersecurity
Defending Against Data Beaches: Internal Controls for Cybersecurity Presented by: Michael Walter, Managing Director and Chris Manning, Associate Director Protiviti Atlanta Office Agenda Defining Cybersecurity
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
Zone Labs Integrity Smarter Enterprise Security
Zone Labs Integrity Smarter Enterprise Security Every day: There are approximately 650 successful hacker attacks against enterprise and government locations. 1 Every year: Data security breaches at the
SCADA Cyber Security
SCADA Cyber Security Information on Securing SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
Safe Network Integration
UNIDIRECTIONAL SECURITY GATEWAYS Safe Network Integration Stronger than Firewalls Shaul Pescovsky, Sales Director Waterfall Security Solutions [email protected] Proprietary Information -- Copyright
TECHNICAL SPECIFICATION
TECHNICAL SPECIFICATION IEC/TS 62443-1-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 1-1: Terminology, concepts and models INTERNATIONAL ELECTROTECHNICAL
Cybersecurity Training
Standards Certification Education & Training Publishing Conferences & Exhibits Cybersecurity Training Safeguarding industrial automation and control systems www.isa.org/cybetrn Expert-led training with
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Industrial Cyber Security Risk Manager. Proactively Monitor, Measure and Manage Cyber Security Risk
Industrial Cyber Security Risk Manager Proactively Monitor, Measure and Manage Cyber Security Risk With Today s Cyber Threats, How Secure is Your Control System? Today, industrial organizations are faced
Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities
Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE
Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services
Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance
Cisco Advanced Services for Network Security
Data Sheet Cisco Advanced Services for Network Security IP Communications networking the convergence of data, voice, and video onto a single network offers opportunities for reducing communication costs
BlackRidge Technology Transport Access Control: Overview
2011 BlackRidge Technology Transport Access Control: Overview 1 Introduction Enterprises and government agencies are under repeated cyber attack. Attacks range in scope from distributed denial of service
Security Management. Keeping the IT Security Administrator Busy
Security Management Keeping the IT Security Administrator Busy Dr. Jane LeClair Chief Operating Officer National Cybersecurity Institute, Excelsior College James L. Antonakos SUNY Distinguished Teaching
Industrial Firewalls Endpoint Security
Industrial Firewalls Endpoint Security Is there a need for a new type of industrial firewall? Industries have a huge park of different management and control systems to monitor their production. These
Recommended Practice Case Study: Cross-Site Scripting. February 2007
Recommended Practice Case Study: Cross-Site Scripting February 2007 iii ACKNOWLEDGEMENT This document was developed for the U.S. Department of Homeland Security to provide guidance for control system cyber
Industrial Security Solutions
Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats
Deploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking
ProCurve Networking by HP Protecting the Extended Enterprise Network Security Strategies and Solutions from ProCurve Networking Introduction... 2 Today s Network Security Landscape... 2 Accessibility...
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
How to Choose the Right Industrial Firewall: The Top 7 Considerations. Li Peng Product Manager
How to Choose the Right Industrial Firewall: The Top 7 Considerations Li Peng Product Manager The right industrial firewall can strengthen the safety and reliability of control systems Central to industrial
