Protocols and Network Security in ICS Infrastructures 2
|
|
|
- Augustus Ross
- 10 years ago
- Views:
Transcription
1
2 Protocols and Network Security in ICS Infrastructures 2
3 Authors Miguel Herrero Collantes Antonio López Padilla May 2015 This publication is the property of INCIBE (the Spanish National Institute for Cyber-security) and is covered by a non-commercial and acknowledged Creative Commons licence 3.0 for Spain. Hence it may be freely copied, distributed and made public under the following conditions: Acknowledgement. The contents of this report may be reproduced in whole or in part by third parties, as long as they indicate its origin and make express reference both to INCIBE or CERTSI and to their website: This acknowledgement must not in any case be phrased in such a way as to suggest that INCIBE supports such third parties or encourages the use that they make of its work. Non-Commercial Use. The original material and any work derived from it may be freely distributed, copied and displayed on condition that the use made of them is not for commercial purposes. Any re-use or distribution of the work must make clear the terms of the licence under which it is so used. Some of these conditions may not need to be applied if prior permission is obtained from CERTSI as owner of its copyright. The full text of the licence may be consulted at: Protocols and Network Security in ICS Infrastructures 3
4 CONTENTS 1 INTRODUCTION Organization of this document 6 2 ICS NETWORK ARCHITECTURE basic Security in designing an ICS network network Security Encryption of communications Authentication and access control remote Access Availability security management policy physical Security of end-user devices 12 3 COMMUNICATION PROTOCOLS IN ICS Protocols to be considered Layers of Operation of protocols Common Industrial Protocol (CIP) Description Implementations of CIP: DeviceNET, ControlNET and CompoNET CIP Implementation: Ethernet/IP CIP Security MODBUS Description Security Security Recommendations DNP Description Security Security Recommendations Profibus Description Security Security Recommendations 28 Protocols and Network Security in ICS Infrastructures 4
5 3.7. Profinet Description Security Security Recommendations PowerLink Ethernet Description Security Security Recommendations OPC Description Security Security Recommendations EtherCAT Description Security Security Recommendations 34 APPENDIX I: COMPARATIVE TABLE OF ICS PROTOCOLS 35 APPENDIX II: GENERAL SECURITY RECOMMENDATIONS 36 I. general Recommendations for firewalls. 36 II. general Recommendations for services 37 REFERENCES 39 Protocols and Network Security in ICS Infrastructures 5
6 1 INTRODUCTION The growth of the Internet and the huge increase in devices with connectivity and processing capacities have brought new security challenges that also affect critical infrastructures. Such infrastructures, normally run by specific industrial control systems for monitoring and managing the processes typical of the industry concerned, are more and more exposed to interaction with other systems in the Internet environment. The trends in threat detection that have been observed lately have made it clear that industrial infrastructures have become a major target for attacks involving participants connected with terrorism, governments, industrial espionage and the like. One proof of this is the increasing appearance of incidents and events related to this kind of infrastructure, as may be seen from the following time line: Illustration 1. ICS threats timeline As stated by the expert Marina Krotofil 1, among the security community dealing with critical infrastructures it is clear that it is not enough just to put in place ordinary information technology (IT) security measures, such as perimeter protections and safe segmentation of networks. Similarly, unlike what happens with standard IT systems, in industrial systems it is dangerous to transfer a solution directly from one system to another, as the characteristics of the second may include factors that make such a direct integration vulnerable. All this means that a detailed awareness of the protocols involved in industrial processes is crucial in understanding which weak points, attack vectors and possible defensive measures should be taken into account when implementing or enhancing an industrial control system ORGANIZATION OF THIS DOCUMENT This document is made up of two chapters. In the first, on ICS Network architecture the intension is to provide readers with certain basic facts about how development of an industrial control system should be undertaken to ensure the greatest possible security. 1 Protocols and Network Security in ICS Infrastructures 6
7 The second chapter, on communication Protocols in ICS, attempts to give a high-level overview of the design, operation and security characteristics of these various protocols. The study concentrates on the protocols most widely used in ICSs in Europe and above all in Spain, without distinctions between the various sectors of industry in which they are used. The aim is to give readers the knowledge they need to understand the properties, functionalities, strengths and weaknesses in their implementation and system monitoring. A set of specific security recommendations for each individual protocol are also outlined, although such security measures should be looked at carefully before being put into operation, so as not to affect operations. Protocols and Network Security in ICS Infrastructures 7
8 2 ICS NETWORK ARCHITECTURE From the point of view of security, when a network architecture is being designed it is always advisable to set up a model with differentiation of network segments. Separation of networks into sections with differing functions and purposes makes it possible to apply greater granularity in security measures and to avoid unnecessary flows of information. Along the lines of such recommendations the network segment for industrial control systems (ICS) should be kept separate from the corporate network segment, as the nature of the traffic in these is obviously different. In the corporate network area there is a need for services, including access to the Internet, , file transfer protocols (FTP) and others, such that they would involve risks for the ICS network area. Hence, an appropriate design with differentiated zones and mechanisms for controlling traffic between the various segments should always be the first step towards safe implementation of a network architecture. Thus, it is advisable to establish different levels in the network architecture as an initial move in planning an ICS infrastructure. Each segment should be identified in accordance with its mission in the platform. The ICS architecture that is put forward as a norm by the International Society of Automation (ISA) [1] in its ISA-95 standard on the integration of business and control systems is an example of this kind of separation by levels. This standard proposes a model called the Purdue Enterprise Reference Architecture, which establishes five logical levels on which elements of the architecture with different functions are to be grouped, as may be seen in Illustration 2. This proposal for segmentation simplifies the designing of security strategies that adopt specific measures on each of the levels and establish safe mechanisms for information flows among them. Protocols and Network Security in ICS Infrastructures 8
9 Illustration 2. ICS Reference Architecture 2.1. BASIC SECURITY IN DESIGNING AN ICS NETWORK Based on a network architecture separated by zones, network should be divided into the number of segments needed in order to ensure they are differentiated and provided with appropriate security and traffic control arrangements. This separation is a concept that is both effective and essential when planning any network architecture and is equally applicable to industrial control systems. This sort of design, combined with suitable controls over data flows between the domains defined, will minimize the damage caused by any possible compromising of a device in a given domain NETWORK SECURITY This objective may be achieved by incorporating the usual design solutions for separating and protecting network segments. This will take the following into account: Segmentation into zones, which means dividing the network architecture into zones differentiated by function so as to match as closely as possible the standards proposed in ISA-95. As may be seen from illustrati, there should be at the very least three areas, with separation of Network Control, the demilitarized zone (DMZ) and the corporate local area network (LAN). This measure allows an infection to be contained within a single zone, making it difficult for it to jump to other zones. Protocols and Network Security in ICS Infrastructures 9
10 Illustration 3. A Reference Architecture for ICS [2] Matching the ISA-95 Model. Encryption of communications and logical isolation between network segments using virtual local area network (VLAN) and virtual private network (VPN) technologies. This measure also serves to avoid an infection jumping from one layer to another. Control and filtering of traffic by means of firewalls 2, proxies, and elements intended to identify and separate traffic and communications at the level both of the network (IP, routing) and of the port, protocol and applications layer. This measure will aid in detecting an infection when it attempts to change zone. If in addition the network has elements such as an intruder detection system (IDS) or security information and event management (SIEM) for controlling events, intruder alerts, and logs, its configuration will be on the lines shown in Illustration 4. 2 General recommendations for rules for firewalls and other services may be found in Appendix I Protocols and Network Security in ICS Infrastructures 10
11 Illustration 4. Network Segmentation and Communications Controls [3] Extending security to the data-link and application layers brings in security measures for the data-link layer, such as access controls in accordance with 802.1x and filtering by media access control (MAC) address, and for the applications level through the use of a web application firewall (WAF). Access control based on whitelisting, implementing rules for access based on recognized elements and denying access to all others. Wireless networks involve an additional risk. Hence, they should be implemented only when absolutely necessary or because of a specific decision by the organization and always with clear justification. In their case, IEEE 802.1x mechanisms will be used for authentication, involving extensible authentication protocol transport layer security (EAP-TLS) that authenticates clients with certificates, or a RADIUS server may be used. Access points will be situated on networks that are isolated or have the minimum possible interconnections with the ICS control network (none at all if this can be achieved). A robust protocol for wireless communications, such as WPA2, will be in place and additionally a characteristic and unique service set identifier (SSID) will be used, with broadcast deactivated, but with filtering by MAC address in operation ENCRYPTION OF COMMUNICATIONS Most industrial control protocols do not incorporate encryption in their implementation. Thus, any successful unauthorized access to the network would allow an attacker to inspect and manipulate traffic. For this reason, the use of hypertext transfer protocol secure (HTTPS), secure shell (SSH), and simple network management protocol (SNMP) Version 3 as far as this is possible is highly advisable for authentication and access to services on the network or to the devices composing it. Protocols and Network Security in ICS Infrastructures 11
12 2.4. AUTHENTICATION AND ACCESS CONTROL Appropriate management of privileges through role-based access control (RBAC) 3 is a measure that brings more security through restrictions set for each profile. Hence, the creation of various differentiated user profiles and the assignment of an operational role to each, depending on its functions, would be a worthwhile complement. Adding further measures, such as warning messages, helps to identify the service being accessed as a guard against possible unintentional errors REMOTE ACCESS If access from infrastructures external to the control network is necessary, the use of VPN solutions would bring the encryption and authentication necessary to protect the connection. Specialized software, hardware, or both, should be used for remote access, together with suitable security policies in relation to updates, and to managing access and users AVAILABILITY In a system controlling processes, latency and the speed of transmission of messages are critical. Hence, they are a factor that determines whether the design of the control network is able to face up to potential problems of congestion or loss of connectivity. Recommendations for enhancing the resilience of a network to these problems would be: Using switches that at network functionalities to segment a VLAN and prioritize certain types of traffic of the basis of quality of service criteria 4. Using redundant topologies to bolster availability, as also implementing the Spanning Tree Protocol (STP) to keep control of the formation of network loops. Using the internet group management protocol (IGMP) 5 together with a VLAN to provide better performance and restrict multicast messages in accordance with the type of traffic and the devices concerned 2.7. SECURITY MANAGEMENT POLICY All the components contributing to the security of the infrastructure must get periodical monitoring and follow-up to determine whether there is a need for patches or updates, or there are other problems arising from the emergence of vulnerabilities or defects that may be detected in periods of functioning PHYSICAL SECURITY OF END-USER DEVICES Restricting physical access to process control devices and to elements of the network is a necessary complement to restrictions on remote access and to authentication. Similarly, Protocols and Network Security in ICS Infrastructures 12
13 connection panels, cabling, power supplies, and similar items must be suitably protected against unauthorized access. Protocols and Network Security in ICS Infrastructures 13
14 3 COMMUNICATION PROTOCOLS IN ICS 3.1. PROTOCOLS TO BE CONSIDERED In this chapter the safety of communication protocols in the industrial control systems in widest use in Europe and more specifically in Spain will be considered, with no distinctions being made between the sectors in which individual protocols are most predominant. The protocols to be analyzed are the following: Common Industrial Protocol (CIP). MODBUS DNP3 Profibus Profinet PowerLink Ethernet OPC EtherCAT 3.2. LAYERS OF OPERATION OF PROTOCOLS Although the seven-layer OSI model of the International Standards Organization is very popular, this document will use the TCP/IP model of just four layers will be used so as to simplify analysis and comparison. The four layers are: The application layer: comparable to Layers 5, 6 and 7 of the OSI model. The transport layer: similar to Layer 4 of the OSI model. The internet layer: equivalent to Layer 3 of the OSI model. The network access layer: comparable to Layers 1 and 2 of the OSI model. A comparison between the OSI and TCP/IP models may be seen in Illustration 5. Protocols and Network Security in ICS Infrastructures 14
15 Illustration 5: Relationship between the OSI and TCP/IP Models Layer 1 in this model, the network access layer, is responsible for the transmission of individual bits between stations and so includes measures to check that bits have been correctly transmitted. However, it contains no security measures properly so called at this point. It does also have security mechanisms, such as 802.1x, to check that access to the network is gained only by authenticated devices. As each of the protocols is considered individually, an analysis will be given of the specific security measures of the higher layers, complementary to the generic measures of the network access layer. Protocols and Network Security in ICS Infrastructures 15
16 3.3. COMMON INDUSTRIAL PROTOCOL (CIP) Description The Common Industrial Protocol (CIP) is a protocol created by the ODVA company 6 for automating industrial processes. CIP comprises a set of services and messages for control, security, synchronization, configuration, information, and so forth which can be integrated into Ethernet networks and into the Internet. CIP has a number of adaptations, providing intercommunication and integration for different types of networks. These are: Ethernet/IP: an adaptation of CIP to TCP/IP. ControlNet: an integration of CIP with concurrent time domain, multiple access (CTDMA) technologies. DeviceNet: an adaptation of CIP with controller area network (CAN). CompoNet: a version adapted to time division multiple access (TDMA) technologies. An indication of how the various different families of this protocol fit the OSI model, with their levels of equivalence, may be seen in Illustration Protocols and Network Security in ICS Infrastructures 16
17 Illustration 6. How the CIP Architecture Fits the OSI Model for Networks. Source: odva.org The CIP Model for Objects CIP is a protocol that follows a model for objects. Each object is made up of attributes (data), services (commands), connections and behavior (the relationships between data and services). CIP has an extensive range of objects to cover typical communications and functions with common elements in automation processes, such as analog and digital input or output devices, HMI, movement controls and so forth. To ensure intercommunication, any given CIP object implemented on different devices must behave identically on all, which constitutes what is termed a device profile. Hence, any device that takes on a profile will respond in the same way to any given command and have the same network behavior as any other device with the same profile CIP Messages CIP follows a producer-consumer pattern. This type of architecture, unlike the older origindestination format, is of a multicast type. This means that messages are put into circulation by a producer and it is the various consumer nodes in the network that decide whether a given message is for them or not, on the basis of an identifier field that accompanies messages. Protocols and Network Security in ICS Infrastructures 17
18 Thus, two types of message can be distinguished, more or less identified with one of the two architectures: Implicit messages (Illustration 7), which have only an identifier rather than origin and destination addresses, so that it is the consumer nodes that known whether the message concerns them and what action to take if so, on the basis of this identifier. Explicit messages (Illsutration 8), which contain information about the origin and destination addresses for devices and information about a specific action as in an IP model. Some implementations of CIP, such as Ethernet/IP or ControlNet do also make some use of explicit messages. Illustration 7. The producer-consumer model of message (multicast) Illustration 8.The Origin-Destination Model of Message Implementations of CIP: DeviceNET, ControlNET and CompoNET Description These families of CIP technologies use different media for transmissions. Respectively, they use a CAN bus 7, coaxial RG-6 8 and round cables (replacing flat cables 9 ) Protocols and Network Security in ICS Infrastructures 18
19 Security The difference between the three implementations lies in the physical mechanism for transmitting information, which has no particular capacity to provide any security measure Security Recommendations The best security measure to protect these implementations of CIP lies in a logical separation from the rest of the network, which means they must be deployed in such a way that they are isolated from any external connection. In addition, systems for inspecting traffic, detecting intruders, or both (intrusion detection system [IDS] or intrusion prevention system [IPS]) 10 are advisable CIP Implementation: Ethernet/IP Description Ethernet/IP was introduced in 2001 and is one of the protocols implementing CIP that is most widespread, tested and complete in respect of the automation of manufacturing industry. Thus, Ethernet/IP is the adaptation of CIP to the Ethernet network model which is inherently linked to TCP/IP. Consequently, Ethernet/IP uses the TCP/IP stack for all transport and network tasks, adapting CIP for the application layer, as may be seen in Illustration Protocols and Network Security in ICS Infrastructures 19
20 Illustration 9. The Ethernet/IP Implementation in the OSI Model. Encapsulation in the TCP/UDP Framework As a CIP protocol, Ethernet/IP defines two connection methods for its TCP/IP communications. These are explicit messages, using transmission control protocol (TCP), and implicit (input or output) messages using user datagram protocol (UDP). Explicit messages follow the clientserver or request-response pattern of connection. Among them there are messages between programmable logic controllers (PLCs) and human-machine interfaces (HMIs), diagnostic messages, and file transfers. The port used is TCP Implicit messages are those which are critical and are employed for real-time communications, such as the transmission of data, and they generally operate with multicast addresses for efficiency. Thus, a message destined for a number of different devices need only be sent once. They are transmitted using port UDP Illustration 10 shows this type of communication. Protocols and Network Security in ICS Infrastructures 20
21 Illustration 10. CIP Producer-Consumer Model of Messaging in Implicit Multicast Communication Security Ethernet/IP is susceptible to being affected by all the vulnerabilities of Ethernet, such as identity theft or traffic capture. Moreover, since it uses UDP for its implicit messages, and this lacks transmission controls, it is possible to injection malicious traffic and to manipulate the transmission route by using IGMP Security Recommendations As Ethernet/IP is a protocol based on Ethernet that uses UDP and IGMP, it is necessary to provide the perimeter of the Ethernet/IP network with all the safety mechanisms that are based on Ethernet and IP. It is also advisable to undertake passive monitoring of the network so as to ensure that Ethernet/IP traffic is associated solely with explicitly identified pieces of equipment and does not come from outside the network CIP Security Although CIP uses a well-defined model for objects, it does not define any mechanism, whether implicit or explicit, for security. Furthermore, it has obligatory objects for identifying devices, which might make it easier to find out about equipment in the network, providing targets to attackers. As it also has common application objects for exchanging information between devices, an intruder is able to manipulate a large range of industrial devices by adjusting and sending this type of object. Moreover, the characteristics of some messages in CIP (real-time, multicast) are incompatible with the encryption of communications, so that CIP has no provision for mechanisms permitting it. Protocols and Network Security in ICS Infrastructures 21
22 3.4. MODBUS Description Modbus is one of the oldest industrial control protocols. It was introduced in 1979 using serial communications to interact with PLCs. In the 1990s it saw a considerable spurt of growth and with the aim of achieving greater integration with modern systems a version for TCP/IP networks, Modbus/TCP, appeared in This step consolidated Modbus as one of the most widely used protocols in industrial control. At the present day it is extensively used in a broad range of industries, including critical infrastructures. Modbus is a protocol for industrial communications that is sited in the application layer, which thus permits different physical means to be used for transport. It provides communication in client-server mode among differing sorts of equipment connected through different technologies on lower layers, which include but are not limited to, the TCP/IP protocol layer. It can thus be said that there are two kinds of implementation of Modbus: Serial Modbus: The transmission technology used is the high-level data link control (HDLC) standard 11, if Modbus proper is being implemented, and RS232 or RS485 if it is being implemented in a master-slave mode. Modbus-TCP: This uses the TCP/IP protocol stack to transmit information. Since the Modbus protocol is common to all implementations, security measures implemented on Layer 7 will be independent of those set on lower layers Security Implementations of serial Modbus use both RS232 and RS485, which are physical layer communication protocols. These protocols, by definition, are responsible for transmitting bits from one station to another and define the conditions under which a bit is understood as a bit. It makes no sense to speak of security on this layer, as these are functionalities that are developed on higher layers. Above physical access to media there are data link level protocols, HDLC and Ethernet according to the implementation (serial or TCP, respectively). Modbus does not implement any security characteristics at this level. In respect of the security offed by the application layer, Modbus was designed to be used in highly controlled environments and it does not include any security mechanism on this layer. Hence, it lacks authentication, so that all that is necessary for the Modbus session is an address and function code that are valid. This is information that can easily be obtained over the Internet using a network sniffer. Likewise, it does not allow for encryption of information. These functionalities were not added when the possibility arose of using TCP/IP stack for protocols for lower layers. It is possible to apply generic measures for the TCP/IP stack (IDS 11 Protocols and Network Security in ICS Infrastructures 22
23 or a firewall, say), but only for implementations based on Ethernet and never those based on the serial bus. Moreover, in serial implementations commands are issued broadcast, which means that all connected elements might be affected by one single denial of service attack. All of these deficiencies are magnified by the fact that Modbus is a protocol designed for programming control elements like remote terminal units (RTUs) or PLCs, so that the injection of malicious code into these elements becomes possible Security Recommendations Owing to the security problems mentioned above, communication between devices using Modbus should be controlled. Hence, deployment of a traffic analyzer to check that Modbus traffic is allowed only from specific devices and only with permitted functions might help palliate communications problems when using this protocol. Furthermore, checks should be made of those Modbus TCP packets with erroneous data about their size and of traffic through port TCP 502 will incorrectly formed packets. As an additional measure, those functions that force slaves to go into listen-only mode, functions forcing reinitiation of communications, those erasing or resetting diagnostic information such as that from counters or traffic from one server to multiple slaves should also be actively monitored to make the network more secure. There are generic IDS solutions, like Snort, and others specially adapted for Modbus, like the IPS Tofino TCP Enforcer LSM, which are highly advisable for enhancing security in this protocol DNP Description DNP3 is a communications protocol developed in 1993 which is widely implemented in the electricity sector, principally in the U.S.A. and Canada. It is only sparsely used in Europe, because there are alternatives such as IEC or IEC It is a threelayer protocol operating at the data link, application and transport layer levels Security DNP3 is a protocol designed to maximize system availability, and puts less care into factors of confidentiality and data integrity. 12 This might be better termed pseudo-transport, as it does not correspond precisely to the transport layer of OSI. Protocols and Network Security in ICS Infrastructures 23
24 At the data link level the functions typical of this are included, such as the detection of transmission errors by means of cyclical redundancy check (CRC) calculation. This latter is not a security measure, since anybody wanting to modify frameworks should be capable of changing the CRC. Furthermore, it includes no additional security measure that is not already offered by the Ethernet protocol. At the application level some efforts have been being made to provide a safe authentication standard in DNP3 [4], promoted by the DNP3 Users Association. This authentication is carried out at application level so as to guarantee communications from start to finish, since DNP3 is a protocol that can be used on different technologies for Layers 1 and 2. This standard for safe authentication resolves several problems: Identity theft, generally for malicious use. Modification of messages in such a way that the functioning of the system may be altered. Attacks involving re-injection of traffic, consisting of the malicious or fraudulent transmission of valid data. Eavesdropping, in other words fraudulently tapping into information circulating over the network, although usually only exchanges of cryptographic keys and not the rest of the data moving over the network. The standard has an operations model based on challenge and response, so that when a request is made for a function that requires authentication, the request is not processed unless an authentication challenge is resolved. This form of communication is shown in Illustration 11. Protocols and Network Security in ICS Infrastructures 24
25 Unauthenticated requests Authenticated requests Illustration 11: Different Types of DNP3 Request. This mode of operation may involve delays and network overload, so it may be configured in an aggressive mode, with the request and the response to the challenge being sent together Security Recommendations Since DNP3 has a safe implementation, the main recommendation would be to deploy only secure DNP3. This deployment may not be possible because of a number of different factors, such as the manufacturer s media. In such cases it is advisable to use DNP3 encapsulated Protocols and Network Security in ICS Infrastructures 25
26 within a secure transport protocol like TLS. There are currently several manufacturers, like PJM 13, that offer this type of deployment [5], as may be seen from Illustration 12. Illustration 12: DNP3 Encapsulated within TLS. In addition, it is advisable to monitor any non-dnp3 communication through ports normally used by DNP3 (TCP/UDP 20000), as well as paying special attention to function codes 4, 5 and 6 (Operate, DirectOperate and DirectOperate no ACK), 18 (Stop Application), and 21 (DisableUnsolicitedMessages) PROFIBUS Description Profibus (an acronym from PROcess Field BUS) is a standard for communication through Fieldbus promoted in 1989 by the German Department of Education and Research and used by Siemens. It is based on serial communications by cable (RS-485, MBP) or optical fiber cable. It currently has two variants, as may be seen in Illustration 13: Profibus DP (for decentralized peripherals) used to operate sensors and actuators through as central controller and Profibus PA (for process automation) used to monitor measuring equipment through a process control system A full list of the applications functions of DNP3 may be consulted on [7]. It should be noted that in this list the notation is hexadecimal, whilst in the text decimal notation is used. Protocols and Network Security in ICS Infrastructures 26
27 Illustration 13: The Architecture of Profibus Security Profibus is a protocol operating in the application, link and physical layers. The link layer in this protocol uses FDL (Fieldbus Data Link) as a mechanism for managing access to the medium. It functions with a hybrid access method that combines master-slave technology with the passing on of a token which indicates who can initiate communication and occupy the bus. These measures ensure that devices do not communicate simultaneously, but they do not constitute any sort of safety mechanism and may be susceptible to attacks involving traffic injection or denial of service. On the application layer, there are three levels of use: DP-V0 for exchanging periodical data, DP-V1 for communications that have no fixed periodicity and DP-V2 for asynchronous communications through broadcast messages. The documentation available does not allow any inference to be drawn that Profibus adds any layer of security to communications on this level. There are some services offered by Profibus than can use TCP/IP as a transport protocol, but only during an initial phase for device assignment. In these services it is possible to add IT security elements, as long as they do not prejudice the operations of the system. Protocols and Network Security in ICS Infrastructures 27
28 Security Recommendations As with other protocols in the Fieldbus family, the absence of any authentication and the lack of security in the protocol require the bus to be isolated from the remaining components in the network. Perimeter security should be very strict to avoid any unauthorized or suspicious traffic PROFINET Description Profinet is a standard based on Profibus that adopts Ethernet as its physical interface for connections rather than RS485, and has a repetition system based on passing on tokens. It offers the complete TCP/IP functionality for data transmission, which allows for wireless applications and high-speed transfers. Equipment using Profinet is oriented toward reliability and real-time communications, together with usability. Illustration 14 shows the architecture of Profinet. Illustration 14: The Architecture of Profinet Security Profinet equipment lacks any native security functions, in the sense of end-point security. Hence, preventing attacks on Profinet equipment is crucial. The measures incorporated into the protocol concentrate on improving system availability and operational reliability, together with robustness of equipment when faced with high volumes of traffic at certain points. The Protocols and Network Security in ICS Infrastructures 28
29 PROFINET Security Guideline [6] document provides recommendations on preventing potential attacks on such systems, including long-standing IT practices such as segmentation of networks with VLANs or the setting up of DMZs, as can be seen in Illustration 15. Illustration 15: One of the Architectures Proposed for ProfiNet Security Recommendations As with other protocols originally created for communication through Fieldbus 15, the absence of authentication and lack of security in the protocol require isolation from the rest of the network. In addition, the use of IT methods to authenticate components in the network, together with encryption of communications within it is good practice. Finally, perimeter security should be very stringent so as to avoid any unauthorized or suspicious traffic POWERLINK ETHERNET Description PowerLink over Ethernet [7] is a communication profile for Ethernet in real time. It extends Ethernet in accordance with the IEEE standard, with mechanisms for transmitting information with precise synchronization and predictable intervals, with an architecture that 15 It should be remembered that Profinet is an adaptation of Profibus for the Ethernet protocol, so that the application layer was originally designed for Fieldbus. Protocols and Network Security in ICS Infrastructures 29
30 can be seen in Illustration 16. The specification for the protocol [8] can be downloaded from the website of the Standardization Group for Ethernet PowerLink 16. PowerLink provides mechanisms to ensure: 1. Transmission of information for which time is critical in asynchronous cycles. The exchange of information is based on a publication and subscription method. 2. Synchronization of nodes in a network with great precision. 3. Transmission of information for which time is not so crucial upon demand. Asynchronous communication may use protocols from the TCP/IP stack or from higher layers such as HTTP, FTP and others. Illustration 16: Reference Model for Ethernet PowerLink. Traffic over the network is managed in such a way that intervals of time are set aside for synchronous and asynchronous transmissions, while it is ensured that only equipment in the network can access the transmission medium. This makes sure that information transmitted asynchronously does not interfere with synchronous transmissions and that communication intervals maintain. This mechanism, known as Slot Communication Network Management (SCNM) is controlled by a piece of equipment in the network, the Management Node (MN) Protocols and Network Security in ICS Infrastructures 30
31 The rest of the nodes are called Controlled Nodes (CN). CN can use only those transmission intervals assigned by the MN. All the nodes in the network have to be configured in the MN and just one MN is permitted in any given network. Moreover, only the MN may send messages independently, whilst CN send messages only when the MN requests them to do so. CNs send the information requested by the MN in broadcast form, so that it can be received all over the network. Illustration 18 displays this process. Illustration17: Slot Communication Network Management in Ethernet PowerLink Security As in other industrial protocols, mechanisms for checking the authenticity of nodes and messages are missing from this protocol. Whilst it is true that a node can transmit only when the MN requests it and assigns it a time period, there is no mechanism for checking that the information received does come from the node. Thus, it is reasonably simple to alter traffic in the network by faking legitimate nodes or trigger a denial of service (DoS) merely by flooding the network with messages. The use of broadcasting for transmissions also allows an intruder to get hold of all the information sent by CNs. There is no sort of encryption intended to avoid this Security Recommendations The sensitivity of SCNM to delays requires Ethernet PowerLink to be deployed isolated from any other network based on Ethernet. Perimeter security should thus be very strict so as to keep the protocol isolated from the rest of the network and prevent malicious traffic. Protocols and Network Security in ICS Infrastructures 31
32 3.9. OPC Description OPC (OLE for process control) is not an industrial communications protocol, but rather an operational framework for communications in process control systems based on Windows that use object linking and embedding (OLE), which in turn use communication protocols like RPC. Hence, OPC is a set of protocols that jointly allow process control systems to communicate using come of the capacities for communication in Windows. OPC connects Windows systems, normally through TCP/IP. OPC was originally based on DCOM and many OPC systems still use this, even though there is an updated version called OPC Unified Architecture (OPC-UA) that allows the use of SOAP over HTTPS, which is much more secure Security The use of DCOM and RCP makes OPC very susceptible to attacks, apart from which it can be affected by all the vulnerabilities occurring in OLE. Moreover, OPC is executed only on Windows systems, so that it can also be hit by all the weaknesses from which this operating system suffers. As it is inherently difficult to apply patches to industrial control systems, many vulnerabilities that have already been discovered for which there are patches available continue to be exploitable industrial control networks. OPC-UA does, however, possess a model for security which can be found in a white paper [9], bringing greater security to the architecture, so that it is advisable to deploy OPC-UA rather than the classic version of OPC Security Recommendations As far as possible, it is OPC-UA that should be deployed. Apart from this recommendation, OPC servers should be suitably hardened, shutting off all the ports and services that are not necessary. In addition, all those non-opc ports and services initiated by the OPC server should be carefully monitored, as should the appearance of vulnerabilities affecting Windows, OPC, OLE RPC or DCOM. OPC services initiated from unknown OPC servers and authentication failures on OPC servers should also be actively monitored so as to improve security of deployments of OPC. Protocols and Network Security in ICS Infrastructures 32
33 3.10. ETHERCAT Description EtherCAT (Ethernet for Control Automation Technology) is an open-code communications protocol used to incorporate Ethernet into industrial environments. This protocol gelled as a standard in IEC , within the standardization of Fieldbus. EtherCAT is used in automation applications with short updating cycles ( 100µs) and with a jitter 18 1µs. It is thus the fastest system currently available. In this system the Ethernet packet is not received, interpreted and sent (as in the long-standing store and resend approach), but rather is processed on the fly in every slave node (with updating of the relevant information) as it is sent on to the next device. Delays are thus reduced to a mere few nanoseconds. The fabric of EtherCAT is shown in Illustration 18. Illustration 18: The EtherCAT Framework Structure Security As EtherCAT is a protocol derived from Ethernet, it is susceptible to all of the vulnerabilities in Ethernet, and thus at risk to a large range of denial of service attack. EtherCAT services can easily be modified through the insertion of Ethernet packets into the network in such a way that they interfere with synchronization and they are vulnerable to forgery and MITM as a Protocols and Network Security in ICS Infrastructures 33
34 consequence of the lack of authentication, so that it is advisable to separate the EtherCAT network from any other Ethernet systems Security Recommendations As has already been mentioned, EtherCAT must be deployed in isolation from any other Ethernet networks. It is also advisable to carry out passive monitoring of the network in order to ensure its integrity, checking that EtherCAT traffic originates exclusively from those devices that are explicitly authorized for it. Protocols and Network Security in ICS Infrastructures 34
35 APPENDIX I: COMPARATIVE TABLE OF ICS PROTOCOLS Common Industrial Protocol (CIP) MODBUS PROTOCOL ENCRYPTION AUTHENTICATION IP / TRANSPORT LEVEL APPLICATION LEVEL SECURITY AND RECOMMENDATIONS DNP3 DeviceNet NO NO ControlNet NO NO CompoNet NO NO Proprietary protocol DeviceNet TM Proprietary protocol ControlNet TM Proprietary protocol CompoNet TM Ethernet/IP NO NO TCP/IP Serial Modbus Modbus- TCP NO NO NOT APPLICABLE (serial transmission) CIP Modbus (not secure) NO NO TCP/IP Modbus (not secure) Only Secure DNP Only Secure DNP Profibus NO NO CIP has the application level technology CIP Safety TM. It is advisable to complement this with general measures for segmentation and isolation of control networks If possible, use encryption (SSL, VPN) or traffic inspection measures like (Snort), IPS (Tofino), or similar. Secure DNP Secure DNP Implementation of secure DNP is advisable. NOT APPLICABLE (serial transmission) Profinet NO NO TCP/IP UDP/IP Has no security measures of its own Has no security measures of its own The general recommendations for segmentation, traffic inspection and encryption should be adopted. Profinet Security Guide PowerLink Ethernet NO NO Incorporates no measures of its own Incorporates no measures of its own PowerLink is a protocol based on Ethernet and directed towards real-time control. Segmentation measures are recommended for the architecture. OPC OPC UA OPC UA Base TCP/IP OPC UA OPC UA Implementation of OPC UA EtherCAT NO NO Incorporates no measures of its own Incorporates no measures of its own Measures for segmentation and perimeter security are recommended.
36 APPENDIX II: GENERAL SECURITY RECOMMENDATIONS I. GENERAL RECOMMENDATIONS FOR FIREWALLS. As a complement to the recommendations put forward for network architectures that are described in Section 2.2, the following rules of a general nature may also be applied: The basic rule set should be a blanket refusal, followed by allowing communications or services in response to definite needs (with whitelists). Ports and services between the control network environment and the corporate network should be enabled and specifically permitted on a case by case basis only when there is a clear need for them. There should be documented justification with a risk analysis and an individual should be responsible for every inward or outward flow of data that is allowed. All rules allowing access should be set with an IP address and a specific TCP/UDP port with checks on its state. All rules should be defined in such a way as to restrict traffic to one single IP address or a clearly specified range of addresses. Direct traffic from the control network to the corporate network should be barred. All control traffic should end in the DMZ. Every protocol permitted between the control network and the DMZ should not be explicitly allowed between the DMZ and corporate networks (and vice versa). Any outward traffic from the control network to the corporate network should be strictly limited by source and destination, and also by service and port. Packets going outwards from the control network or the DMZ should only be authorized if they have a correct IP address as origin that is assigned to the control network or devices in the DMZ network. No access should be permitted to Internet devices in the control network. Control networks should not be connected directly to the Internet, even if they are protected by a firewall. Any firewall administration traffic should take place through one of the following: a separate network, secure management (for example, outside normal bandwidth), or an encrypted network with authentication of multiple factors. Traffic should also be restricted by IP address to specific management stations. All firewall policies should be periodically checked. All firewalls should be backed up immediately before start-up.
37 II. GENERAL RECOMMENDATIONS FOR SERVICES As an add-on to the general rules described in the previous section, the following general firewall rules are proposed in accordance with the service or protocol in question: SERVICE RECOMMENDATION DNS Use should be made of a local internal DNS server restricted to the control network. In cases where there are few elements, local host files may be employed. HTTP FTP and TFTP The protocol used to access the web with browsers is very useful and convenient. Nonetheless, if the version in use is not HTTPS, which has encrypted transmissions, it should be barred between the corporate or public network and the control network. In addition: Whitelists should be used to filter IP addresses for web access by services in the control or physical network. There should be access control both for origins and for destinations. Authorization at application level should be implemented. The number of technologies supported should be restricted so as to decrease the range of vulnerabilities. Both actual use and attempts at use of access to services should be recorded and monitored. These two file transmission protocols are widely used in ICSs. However, the absence of any encryption renders them vulnerable to the theft of credentials and information. They should be avoided as far as possible and replaced with encrypted versions like SCP or SFTP. In cases where it is strictly necessary to use them, they should be limited to transmissions that are not critical or employed with tunnel encryption. TELNET This access and communication protocol has no encryption, which makes its use inadvisable. In case of need a private network or virtual private network (VPN) should be used to protect transmissions. DHCP This protocol was designed for automatic configuration of networks of devices and is very useful, but brings with it security risks, as it can be used for MITM attacks and for intercepting traffic. As far as possible its use should be avoided, but if it is necessary traffic inspection rules should be implemented, so as to defend against rogue DHCP servers, along with measures against the spoofing of ARPs and IPs. SSH A proper use of SSH should be seen as an effective measure for establishing secure communications between segments or elements of Protocols and Network Security in ICS Infrastructures 37
38 networks that have sensitive traffic. It should be permitted and can replace FTP, TELNET, RCP and other unsafe protocols. SOAP The simple object access protocol (SOAP) uses XML syntax to exchange messages. It is a mechanism without any control over states and thus is rather vulnerable to falsification and interception. Hence, traffic inspection rules at application level are advisable to check the content of messages. SMTP This protocol, which is used for s, should be barred in the control network. SMTP traffic outward from the control network to the corporate network may be permitted to allow the sending of alerts as s. SNMP SNMP is the protocol used for control and monitoring of network elements and is very useful. However, in Versions 1 and 2 it uses non-encrypted communications and generic passwords. SNMP Version 3 solves these problems, but is not always compatible with all devices. If versions before V3 have to be used, it is advisable to separate SNMP traffic off into a management network. DCOM The distributed component object model (DCOM) is the protocol on which OPC (OLE for Process Control) is based. It uses a remote procedure call (RPC) service, which should be appropriately patched, as it otherwise has multiple vulnerabilities. Moreover, OPC through DCOM makes use of dynamic ports (running from 1024 to 65535), which increases the difficulty of establishing solid rules for firewalls. Traffic under this protocol should be permitted only between control networks and the DMZ. In addition, it is advisable to apply DCOM configurations for devices that reduce the range of dynamic ports available. Protocols and Network Security in ICS Infrastructures 38
39 REFERENCES [1] ISA-95. [on line]. Available from: [2] D. G. Maryna Krotofil, Industrial Control Systems Security: What is happening?. [3] Homeland Security U.S., Improving Industrial Control with Defense in Depth Strategies, [4] IEEE, IEEE Standard for Electric Power Systems Communications - Distributed Network Protocol (DNP3), [5] PJM, Jetstream Guide DNP SCADA over Internet with TLS Security, [6] P. -. Profinet, Profinet Security Guidelines. Guidelines for PROFINET, [7] DNP3 Quick Reference Guide, [8] E. P. S. Group, Ethernet POWERLINK Communication Profile Specification, [9] P. H. Randy Amstrong, The OPC UA Security Model for Administrators, [10] Rockwell Automation, Reference Architectures for Manufacturing, [11] E. D. Knapp, Industrial Network Security, [12] L. A. a. C. M. P. Hollman, Compromising Industrial Facilities from 40 Miles Away, [13] University of Leon, Department of Computer Engineering and Computer Science, Security Considerations in SCADA Communication Protocols, [14] S. C. C. Agency, Guide to Increased Security in Industrial Control Systems, [15] ISA, ISA-99 Industrial Automation and Control Systems Security. Protocols and Network Security in ICS Infrastructures 39
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Holistic View of Industrial Control Cyber Security
Holistic View of Industrial Control Cyber Security A Deep Dive into Fundamentals of Industrial Control Cyber Security Learning Goals o Understanding security implications involving industrial control systems
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
From Fieldbus to toreal Time Ethernet
Process Automation From Fieldbus to toreal Time Ethernet Safety, reliability IEC61158-2 as the physical layer too slow for Ethernet/IP frames Unsafe cables towards wireless solutions Factory automation
Secure Networks for Process Control
Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
Securing EtherNet/IP Using DPI Firewall Technology
Securing EtherNet/IP Using DPI Firewall Technology www.odva.org Technical Track About Us Erik Schweigert Leads device firmware development at Tofino Security BSc in Computer Science from VIU Michael Thomas
EVALUATING INDUSTRIAL ETHERNET
EVALUATING INDUSTRIAL ETHERNET WHAT IS STANDARD? Written by: Shuo Zhang Networks Marketing Rockwell Automation As industrial automation systems evolve, industrial Ethernet is becoming increasingly popular
Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security
Security+ Guide to Network Security Fundamentals, Fourth Edition Chapter 6 Network Security Objectives List the different types of network security devices and explain how they can be used Define network
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
IPv6 SECURITY. May 2011. The Government of the Hong Kong Special Administrative Region
IPv6 SECURITY May 2011 The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be reproduced in whole or in part without the express
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1
Industrial Network Security for SCADA, Automation, Process Control and PLC Systems Contents 1 An Introduction to Industrial Network Security 1 1.1 Course overview 1 1.2 The evolution of networking 1 1.3
1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network
WP 1004HE Part 5 1. Cyber Security White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network Table of Contents 1. Cyber Security... 1 1.1 What
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES
PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES Shirley Radack, Editor Computer Security Division Information Technology Laboratory National Institute
8. Firewall Design & Implementation
DMZ Networks The most common firewall environment implementation is known as a DMZ, or DeMilitarized Zone network. A DMZ network is created out of a network connecting two firewalls; i.e., when two or
LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION
LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB
REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB Conducted: 29 th March 5 th April 2007 Prepared By: Pankaj Kohli (200607011) Chandan Kumar (200607003) Aamil Farooq (200505001) Network Audit Table of
Firewall Security. Presented by: Daminda Perera
Firewall Security Presented by: Daminda Perera 1 Firewalls Improve network security Cannot completely eliminate threats and a=acks Responsible for screening traffic entering and/or leaving a computer network
Industrial Communication Whitepaper. Principles of EtherNet/IP Communication
Industrial Communication Whitepaper Principles of EtherNet/IP Communication 1 Contents Introduction...3 Producer/Consumer Model...4 EtherNet/IP Messaging Types...7 Real Time Data Exchanges...9 Typical
CMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
COMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.
Company Co. Inc. LLC Multiple Minds, Singular Results LAN Domain Network Security Best Practices An integrated approach to securing Company Co. Inc. LLC s network Written and Approved By: Geoff Lacy, Tim
1 hours, 30 minutes, 38 seconds Heavy scan. All scanned network resources. Copyright 2001, FTP access obtained
home Network Vulnerabilities Detail Report Grouped by Vulnerability Report Generated by: Symantec NetRecon 3.5 Licensed to: X Serial Number: 0182037567 Machine Scanned from: ZEUS (192.168.1.100) Scan Date:
Avaya TM G700 Media Gateway Security. White Paper
Avaya TM G700 Media Gateway Security White Paper March 2002 G700 Media Gateway Security Summary With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional
Protection profile of an industrial firewall
Version 1.0 short-term GTCSI July 13, 2015 Preface In the whole document, the acronym ToE (Target of Evaluation) designates the component being evaluated. Text in red differs from the mid-term version
IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...
IP Link Best Practices for Network Integration and Security Table of Contents Introduction...2 Passwords...4 ACL...5 VLAN...6 Protocols...6 Conclusion...9 Abstract Extron IP Link technology enables A/V
NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9
NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document
Logical & Physical Security
Building a Secure Ethernet Environment By Frank Prendergast Manager, Network Certification Services Schneider Electric s Automation Business North Andover, MA The trend toward using Ethernet as the sole
Exam Questions SY0-401
Exam Questions SY0-401 CompTIA Security+ Certification http://www.2passeasy.com/dumps/sy0-401/ 1. A company has implemented PPTP as a VPN solution. Which of the following ports would need to be opened
Building A Secure Microsoft Exchange Continuity Appliance
Building A Secure Microsoft Exchange Continuity Appliance Teneros, Inc. 215 Castro Street, 3rd Floor Mountain View, California 94041-1203 USA p 650.641.7400 f 650.641.7401 ON AVAILABLE ACCESSIBLE Building
Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems
By: Kevin Finnan and Philippe Willems Introduction New security capabilities at the remote terminal unit (RTU) level are substantially easing implementation of cyber security measures in SCADA systems.
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
SonicWALL PCI 1.1 Implementation Guide
Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard
Domain 6.0: Network Security
ExamForce.com CompTIA Network+ N10-004 Study Guide 1 Domain 6.0: Network Security Chapter 6 6.1 Explain the function of hardware and software security devices Network based firewall, Host based firewall
Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media
IT 4823 Information Security Concepts and Administration March 17 Network Threats Notice: This session is being recorded. Happy 50 th, Vanguard II March 17, 1958 R.I.P. John Backus March 17, 2007 Copyright
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack
DHS 4300A Sensitive Systems Handbook Attachment Q5 To Handbook v. 11.0 Voice over Internet Protocol (VoIP) Version 11.0 December 22, 2014 Protecting the Information that Secures the Homeland This page
Security Issues with Integrated Smart Buildings
Security Issues with Integrated Smart Buildings Jim Sinopoli, Managing Principal Smart Buildings, LLC The building automation industry is now at a point where we have legitimate and reasonable concern
Architecture Overview
Architecture Overview Design Fundamentals The networks discussed in this paper have some common design fundamentals, including segmentation into modules, which enables network traffic to be isolated and
Developing Network Security Strategies
NETE-4635 Computer Network Analysis and Design Developing Network Security Strategies NETE4635 - Computer Network Analysis and Design Slide 1 Network Security Design The 12 Step Program 1. Identify network
ProCurve Networking. Hardening ProCurve Switches. Technical White Paper
ProCurve Networking Hardening ProCurve Switches Technical White Paper Executive Summary and Purpose... 3 Insecure Protocols and Secure Alternatives... 3 Telnet vs. Secure Shell... 3 HTTP vs. HTTPS... 3
IBM. Vulnerability scanning and best practices
IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes
Category Question Name Question Text C 1.1 Do all users and administrators have a unique ID and password? C 1.1.1 Passwords are required to have ( # of ) characters: 5 or less 6-7 8-9 Answer 10 or more
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
FIREWALLS & CBAC. [email protected]
FIREWALLS & CBAC [email protected] Implementing a Firewall Personal software firewall a software that is installed on a single PC to protect only that PC All-in-one firewall can be a single device that
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Protecting and controlling Virtual LANs by Linux router-firewall
Protecting and controlling Virtual LANs by Linux router-firewall Tihomir Katić Mile Šikić Krešimir Šikić Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
GE Measurement & Control. Cyber Security for NEI 08-09
GE Measurement & Control Cyber Security for NEI 08-09 Contents Cyber Security for NEI 08-09...3 Cyber Security Solution Support for NEI 08-09...3 1.0 Access Contols...4 2.0 Audit And Accountability...4
Cyber Security Implications of SIS Integration with Control Networks
Cyber Security Implications of SIS Integration with Control Networks The LOGIIC SIS Project Standards Certification Education & Training Publishing Conferences & Exhibits Presenter Zach Tudor is a Program
General Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist
CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11
Security for. Industrial. Automation. Considering the PROFINET Security Guideline
Security for Industrial Considering the PROFINET Security Guideline Automation Industrial IT Security 2 Plant Security Physical Security Physical access to facilities and equipment Policies & Procedures
REFERENCE ARCHITECTURES FOR MANUFACTURING
Synopsis Industry adoption of EtherNet/IP TM for control and information resulted in the wide deployment of standard Ethernet in manufacturing. This deployment acts as the technology enabler for the convergence
How To Protect Your Network From Attack From Outside From Inside And Outside
IT 4823 Information Security Administration Firewalls and Intrusion Prevention October 7 Notice: This session is being recorded. Lecture slides prepared by Dr Lawrie Brown for Computer Security: Principles
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM
INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM Okumoku-Evroro Oniovosa Lecturer, Department of Computer Science Delta State University, Abraka, Nigeria Email: [email protected] ABSTRACT Internet security
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
RuggedCom Solutions for
RuggedCom Solutions for NERC CIP Compliance Rev 20080401 Copyright RuggedCom Inc. 1 RuggedCom Solutions Hardware Ethernet Switches Routers Serial Server Media Converters Wireless Embedded Software Application
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.
Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet
Network Security Infrastructure Testing
Network Security Infrastructure Testing Version 1.2 October 12, 2005 Prepared by: Sandia National Laboratories Center for SCADA Security Project Lead Ray Parks Technical Lead Jason Hills Technical Support
Secure SCADA Network Technology and Methods
Secure SCADA Network Technology and Methods FARKHOD ALSIHEROV, TAIHOON KIM Dept. Multimedia Engineering Hannam University Daejeon, South Korea [email protected], [email protected] Abstract: The overall
Firewalls and VPNs. Principles of Information Security, 5th Edition 1
Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches
Configuring an APOGEE System on an IT Infrastructure White Paper
Configuring an APOGEE System on an IT Infrastructure White Paper 149-1006 Building Technologies 149-1006, Rev. DA Copyright Notice Copyright Notice Notice Document information is subject to change without
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Securing The Connected Enterprise
Securing The Connected Enterprise Pack Expo 2015 Las Vegas Chelsea An Business Development Lead, Network & Security PUBLIC Copyright 2015 Rockwell Automation, Inc. All Rights Reserved. 8 Connected Enterprise
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Firewalls. Chapter 3
Firewalls Chapter 3 1 Border Firewall Passed Packet (Ingress) Passed Packet (Egress) Attack Packet Hardened Client PC Internet (Not Trusted) Hardened Server Dropped Packet (Ingress) Log File Internet Border
Network Security Topologies. Chapter 11
Network Security Topologies Chapter 11 Learning Objectives Explain network perimeter s importance to an organization s security policies Identify place and role of the demilitarized zone in the network
Nuclear Plant Information Security A Management Overview
Nuclear Plant Information Security A Management Overview The diagram above is a typical (simplified) Infosec Architecture Model for a nuclear power plant. The fully-developed model would, for example,
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity
SSL-VPN Combined With Network Security Introducing A popular feature of the SonicWALL Aventail SSL VPN appliances is called End Point Control (EPC). This allows the administrator to define specific criteria
Firewalls, Tunnels, and Network Intrusion Detection
Firewalls, Tunnels, and Network Intrusion Detection 1 Part 1: Firewall as a Technique to create a virtual security wall separating your organization from the wild west of the public internet 2 1 Firewalls
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation www.lumeta.
Why Leaks Matter Leak Detection and Mitigation as a Critical Element of Network Assurance A publication of Lumeta Corporation www.lumeta.com Table of Contents Executive Summary Defining a Leak How Leaks
Cybersecurity considerations for electrical distribution systems
White Paper WP152002EN Supersedes January 2014 electrical distribution systems Authors Max Wandera, Brent Jonasson, Jacques Benoit, James Formea, Tim Thompson, Zwicks Tang, Dennis Grinberg, Andrew Sowada,
DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices
DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada Motivations for
Network System Design Lesson Objectives
Network System Design Lesson Unit 1: INTRODUCTION TO NETWORK DESIGN Assignment Customer Needs and Goals Identify the purpose and parts of a good customer needs report. Gather information to identify network
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
