Industrial Control System Cyber Security

Size: px
Start display at page:

Download "Industrial Control System Cyber Security"

Transcription

1 2012 Honeywell Users Group Asia Pacific Sustain.Ability. Industrial Control System Cyber Security 1

2 Honeywell Process Solutions Cyber Security Architect Global Architect Team Mike Baldi Responsible for integrating security into HPS Products, security certifications, and compliance Honeywell rep on ISA Security Compliance Institute board DHS interface for HPS 33+ years experience with HPS Lead SE for System Test ( 3 years ) Technical Assistance Center - Server/Client team lead ( 25 years ): 2

3 Industrial Control System Cyber Security cyber security threat landscape for ICS s Honeywell s cyber security initiatives roles / responsibilities for protecting ICS s from cyber attacks responding to cyber attacks against your ICS 3

4 Cyber Security threat landscape for ICS s Industrial Control System Cyber Security 4

5 How did we get here? Security was not a major concern when Legacy ICS systems were developed ICS system lifecycle is typically years ICS products are incorporating COTS technology from the business IT sector (Ethernet, Windows OS, SQL, webservers, etc.) Multi-vendor solutions at most ICS sites Increasing need to share data between the enterprise, corporate, and DCS networks Lack of experienced security personnel working on ICS s History of separate IT and ICS teams 5

6 Business IT vs ICS systems SECURITY TOPIC Antivirus Patch Management Information Technology (IT) Very common: easily deployed and updated Easily defined; enterprise wide remote and automated Control Systems (ICS) Difficult to keep current due to risk imposed to control process Patches require exhaustive testing and qualification prior to installation on ICS s. Install lags release. Technology Support Lifetime 2-3 years; years Change Management Security Compliance Incident Response and Forensics Physical and Environmental Security Secure Systems Development Regular and scheduled; aligned with minimum-use periods Limited regulatory oversight Easily developed and deployed; some regulatory requirements; embedded in technology Poor (office systems) to excellent (critical operations systems) Integral part of development process Strategic scheduling; non trivial process due potential impact to process Specific regulatory guidance (some sectors) Uncommon beyond system resumption activities; no forensics beyond event re-creation Good to Excellent (operations centers; guards, gates, guns) Special Has not been an integral part of ICS systems development 6

7 ICS challenges and security concerns Vulnerability to Denial of Service attacks Backdoors and holes in the network perimeter Devices with little or no security features (modems, legacy control devices, etc.) Common communication protocols designed without security Remote, unmanned sites with challenging physical security Database security vulnerabilities (proprietary and / or 3 rd party ) Lack of encryption and authentication Improper or nonexistent patching of software and firmware 7

8 ICS challenges and security concerns Unsecure coding techniques in product design Non-existent cyber security procedures Lack of control system-specific security protection / mitigation technologies Security researchers with various vulnerability disclosure practices Publicly available hacking tools make hacking easier for novices Increased outside security regulation NERC-CIP, CFATS, Pipeline Guidelines, Increase in cyber attacks against ICS s Stuxnet, Duqu, Flame, 8

9 9 Some typical attack vectors of ICS s

10 Some current headlines U.S. President Barack Obama is urging the Senate to pass the Cybersecurity Act of He believes legislation will help the U.S. fight "the cyber threat to our nation," which he calls "one of the most serious economic and national security challenges we face." July, ZDNet Iran Oil Terminal taken offline by Cyber Attack April, PACE magazine Pacific Northwest National Laboratory Report Reveals Dramatic Increase in Cyber Threats and Sabotage on Critical Infrastructure and Key Resources June 2012 US Dept of Energy 10

11 The Impact of STUXNET Provided proof-of-concept and a blueprint for hackers Exposed corporate executives, regulators and the public to the potential dangers of cyber attacks on critical infrastructure Opened the floodgates for security researchers to identify and exploit ICS vulnerabilities for financial gain 11

12 Project Basecamp Announced at S4 Security Conference in Jan 2012 Project Basecamp involved six researchers looking for vulnerabilities in embedded ICS devices (PLC s, RTU s, substation controllers) The researchers found backdoors, weak credential storage, ability to change ladder logic and firmware, command line interface, buffer overflows, TFTP, etc Posted results publicly releasing Nessus plugins and Metasploit modules enabling anyone to find and exploit these vulnerabilities 12 12

13 Cyber attacks on critical infrastructure Cyber attacks against US critical infrastructure jumped 383 % in

14 ICS Specific Vulnerabilities Reported Slide 25 from the presentation Documenting the Lost Decade An Empirical Analysis of publicly disclosed ICS vulnerabilities since 2001 by Sean McBride 14 14

15 Why have ICS systems become targets? They re easy targets Security wasn t designed in Running older Operating systems Embedded accounts with default passwords Systems aren t updated with security patches Notoriety / validation within security research community Community watchdogs Hacktivists Competitive advantage Nation State / Political motivation 15

16 Honeywell s cyber security initiatives Industrial Control System Cyber Security 16

17 What is Honeywell s security philosophy? Design in Security is a Key initiative at Honeywell Security designed in the product from the beginning Incorporate people, technology, and process Integrate security into our culture Defense in Depth Security at more than just the perimeter Layered / High Security Network Architecture Process Control System Cyber Electronic Physical Security is a journey - not a destination Cyber Threat landscape is continuously changing Continuous evaluation and improvements required 17

18 Product development process Product development Security is foundational in the product HIP process designs security into all products Security Development Lifecycle Design process is compliant with ISASecure SDSA» Threat modeling and security risk analysis is part of all projects» Static code analysis» Fuzz testing» Use and abuse case testing» Load and performance testing» Independent penetration testing 18

19 Product development process Product development (Continued) Experion Security Model drives security focus Security Security Core Team manages security model Security Steering Committee communication / interactive exchange on security issues impacting HPS systems HPS is investing heavily in tools, testing, and training to improve the security of our products 19

20 Security Training Security Requirements Incorporating Security into the Software Development Lifecycle Security Response Planning and Execution Security Architecture Design Security Validation Testing Security Risk Assessment and Threat Modeling Fuzz testing, Abuse case testing Security Coding Guidelines Security Code Reviews & Static Analysis 20 20

21 Continuous security improvements Short term improvement Qualification of white listing component for Experion Virtual Patching solution Virtualization R410 security improvements System mechanism to disable USB storage interface Role based access control for process data Implements separation of duties at parameter level Decouple DSA security credentials from system credentials Compartmentalizes Experion clusters Allows different mngr passwords in each cluster Remove sysadmin privileges from mngr account Allow use of user specified domain accounts 21

22 Application Whitelisting - overview Objective is to provide additional protection against malware, reduce system maintenance overhead and complexity, and extend the patching cycle Application Whitelisting (AWL) locks down an end node allowing only approved files to run Significantly improves security against many types of malware attacks Can extend patching cycle AWL solution must be tightly integrated into control system by ICS vendor to provide greatest protection with minimum risk AWL on Industrial Control Systems will co-exist with Anti Virus solutions 22

23 Patch management lifecycle Security research - (e.g. ZDI, DVlabs) ICS-CERT - Black hats - Not always a patch available - Patch is not always tested in time - Can we install? - Often reboots required - 23

24 Server / station protection Allow Known Good (Block All Else) Block Known Bad (Allow All Else) Unknown Execution Level Application Control Resource Shielding Behavioral Containment Application Level Application and System Hardening Anti Antivirus Virus Application Inspection Network Level Host Firewall Attack-Facing Network Inspection Vulnerability-Facing Network Inspection Gartner BL Black Listing AWL Application White Listing VP Virtual Patching (Honeywell solution - McAfee / Norton) (Honeywell solution - Bit9) (Honeywell solution - HP Tipping Point) 24

25 Continuous security improvements Virtualization improves operational efficiency Virtualization realizes life cycle extension Virtualization poses new security challenges Virtualization also facilitates security improvements Application virtualization (i.e. eserver) provides sandboxing Full virtualization (VMware vsphere) Improved data recovery mechanisms Improved patching mechanisms Improved virus protection mechanisms Hypervisor / Virtual Machine Monitor has small attack surface Availability of thin clients Virtualization Layer 25

26 External security certifications Wurldtech Achilles certification for C300, SM Achilles practices certified ( WIB ) Honeywell committed to compliance with Achilles practices when it becomes an approved IEC standard ISASecure Embedded Device Security Assessment (EDSA) Safety Manager R145 was first device to achieve EDSA certification (2011) C300 and Foundation Fieldbus Interface Module are EDSA Certified (2012) Internal evaluation of HPS products for compliance with numerous external standards: NERC-CIP, NIST_sp800_x, FERC_order_x, INGAA Cyber guidelines, TSA pipeline guidelines 26

27 ISA99 / IEC Structure Systems Devices 27 27

28 Embedded Device Security Assurance Certification Integrated Threat Analysis (ITA) Software Development Security Assurance (SDSA) Functional Security Assessment (FSA) Communications Robustness Testing (CRT) Provides a common perspective on how threat scenarios can be sufficiently covered Documents the expected resistance of the system to potential threat agents and threat scenarios Clearly documents expected user measures versus inherent product protection measures Detects and Avoids systematic design faults The vendor s software development and maintenance processes are audited Ensures the organization follows a robust, secure software development process Detects Implementation Errors / Omissions A component s security functionality is audited against its derived requirements for its target security level Ensures the product has properly implemented the security functional requirements Identifies vulnerabilities in networks and devices A component s communication robustness is tested against communication robustness requirements Tests for vulnerabilities in the 4 layers of OSI Reference Model 28 28

29 Benefits of ISASecure Certification Structured, auditable, repeatable approach to evaluating the security of an ICS product and the development practices of the manufacturer against an established benchmark End-user Supplier Easy to specify Build security requirement into RFP Reduced time in FAT/SAT Know security level out of the box Evaluated once Recognition for effort Build in security Product differentiator Reduce support costs Enhance credibility Assurance that automation products, systems and suppliers meet an industry recognized baseline for cyber security 29 29

30 Honeywell s Industrial IT Solutions Assess against industry standards, regulatory requirements and best practices Remediate focuses on the actions needed to address issues identified in the Assess phase Assure addresses methods to assure your Industrial IT solutions are functioning as designed Manage refers to the management of your Industrial IT investment, including network security 30 Evolving services and solutions for a changing Industrial IT environment

31 Honeywell s Industrial IT Solutions Continuous improvement of standard build Consistent security configuration Extended remote service portfolio Tested AV signature files - daily Patch analysis and consolidated patching Security incident handling, perimeter management Introduction of global service management Uniform service delivery Compliance management Full Whitelisting management and support Assure Assess Remediate Manage 31

32 Partnering with our customers Documenting system security configuration Includes risks that need external mitigations Rapid qualification of security updates Microsoft Adobe Network and security design services Assessment services ISA99 / CSET security audits / assessments Services offering for system security management Patch, virus protection, and data recovery management Security perimeter management Continued investment in building security skills Design consultants, project and service engineers 32

33 33 Security Program Dashboard

34 Security from design to daily operation Honeywell Process Solutions. builds Security features into our standard products, and is continuously evaluating and improving our security is committed to ISA99 and IEC standards for industrial control system security works closely with external agencies including Department of Homeland Security to improve ICS security documents secure system best practices and configurations provides timely communication of security issues to customers offers optional security features to customers who are want additional protection 34

35 roles / responsibilities for protecting ICS s from cyber attacks Industrial Control System Cyber Security 35

36 Stakeholders per phase in securing ICS s - ICS control system manufacturers / Vendors - ICS automation solution providers - System integrators and implementers - Owner/operators or end users - Local Governments Phases and Participants in a Typical ICS Project From ICSJWG Cross Vendor Position Paper 36

37 Layers of Responsibility End User (Security management system) System Integrator (System engineering practices, Qualified Personnel) Automation Supplier (Software Development, Vendor Practices) Automation Products (Security features, Testing) 37

38 Vendor / automation supplier responsibilities Execute security testing during development cycle Integrate security into development lifecycle (SDLC) Scan systems for security vulnerabilities before deployment Document secure implementation of system Manage secure custody chain of assets Attain applicable 3rd party security certifications Provide timely qualification of security fixes Open and timely communication on product security issues Be positioned to respond to vulnerability disclosures or cyber incidents against deployed systems 38

39 Integrator / installer responsibilities Install system per vendors recommended security practices Segment the Control System Network Ensure all software revisions are current during installation Scan systems and network for security vulnerabilities before final commissioning Baseline and document the system security before final commissioning 39

40 Owner / operator responsibilities Apply security fixes as soon as they re qualified Keep Anti Virus and related protection technologies current Document security configuration, Policies & Procedures Provide security Training for operators & Contractors Control Access to the Control System Harden the Components of the System apply defense in depth Constantly monitor the security of the system Periodic full re-assessment of system security Work closely with vendor and integrators to adopt to new security threats and vulnerabilities 40

41 ICS Security responsibilities summary Owner / operators have the ultimate responsibility for the security and safety of their systems ICS security must include technology, people, and processes ICS security spans the lifecycle of an automation system requires a partnership between all stakeholders All the security technology and controls in the world will not protect an ICS if not properly applied and continuously managed 41

42 responding to cyber attacks against your ICS Industrial Control System Cyber Security 42

43 Cyber Incident Response Plan Cyber security can no longer be an afterthought Question is not IF your site will be attacked, but WHEN be prepared Security can be measured by how quickly you detect, contain, and recover from a security incident. Develop a cyber incident response plan, and actively manage it 43

44 Cyber Incident Response Plan Create a cyber incident response plan Priority is to isolate any suspect component, maintain safe operation, and preserve forensics where possible Operators must be trained on how to respond to a cyber incident Appoint a cyber security focal point and watchdog with backup Include all levels of defense in depth in creating response plan Practice the plan ( test it ) Re-evaluate and update the cyber incident response plan periodically 44

45 45 Effective Security Plan

46 How can ICS s prepare for cyber attacks? Do a security assessment of your site, remediate any gaps identified, and repeat assessments periodically Partner with your ICS vendor and specific support programs / organizations keep defense plan current Consider what your vendor or a security consultant can provide: 24 x 7 support center Security Operations Center Access to specialty security skill sets Develop and maintain a dashboard or HMI for security manager Actively monitor security trends ( ie: security watchdog ) 46

47 How can ICS s prepare for cyber attacks? Review your vendor s security documentation Network and Security Planning Guide Domain and Workgroup Implementation Guide Maintain current security protection technologies on your system Anti-Virus, Application Whitelisting, IPS, Firewalls, Keep security current timely application of qualified security updates Proactively / continuously monitor site for cyber incidents 47

48 Be prepared for cyber attacks Integrate security into your culture at site An effective security program addresses people, processes, and technology Work with your vendor to create a cyber incident response plan, and Manage that plan Ensure everyone knows the key players, and who to call Security protections and incident response plans are only effective if properly managed 48

49 Q&A Questions? 49 49

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

ISA Security Compliance Institute

ISA Security Compliance Institute ISA Security Compliance Institute Johan Nye Chairman ISCI Governing Board 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99 Standards 2013 ISCI

More information

Effective Defense in Depth Strategies

Effective Defense in Depth Strategies Honeywell.com 2014 Honeywell Users Group Asia Pacific Effective Defense in Depth Strategies for Industrial Systems 1 Document control number Honeywell Proprietary Honeywell.com Chee Ban, Ngai About the

More information

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff

More information

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions 1 Agenda What is Application Whitelisting (AWL) Protection provided by Application

More information

Industrial Security for Process Automation

Industrial Security for Process Automation Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical

More information

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Best Practices in ICS Security for System Operators. A Wurldtech White Paper Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Cyber Security for NERC CIP Version 5 Compliance

Cyber Security for NERC CIP Version 5 Compliance GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...

More information

ISA Security Compliance Institute

ISA Security Compliance Institute ISA Security Compliance Institute Andre Ristaino, Managing Director, ISCI 28 May 2013 CSSC 1 ISA Security Compliance Institute agenda topics About ISA Security Compliance Institute (ISCI) About ISA 99

More information

Are you prepared to be next? Invensys Cyber Security

Are you prepared to be next? Invensys Cyber Security Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber

More information

1 ISA Security Compliance Institute

1 ISA Security Compliance Institute 1 ISA Security Compliance Institute Internationally Accredited Conformance Scheme ISASecure certification programs are accredited as an ISO/ IEC Guide 65 conformance scheme and ISO/IEC 17025 lab operations

More information

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation

More information

Document ID. Cyber security for substation automation products and systems

Document ID. Cyber security for substation automation products and systems Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Seven Strategies to Defend ICSs

Seven Strategies to Defend ICSs INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take

More information

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing Introduction ManTech Project Manager Mark Shaw, Senior Executive Director Cyber Security Solutions Division

More information

Secure Web Applications. The front line defense

Secure Web Applications. The front line defense Secure Web Applications The front line defense Agenda Web Application Security Threat Overview Exploiting Web Applications Common Attacks & Preventative techniques Developing Secure Web Applications -Security

More information

Process Solutions. Mitigating Cyber Security Risks in Legacy Process Control Systems. White Paper

Process Solutions. Mitigating Cyber Security Risks in Legacy Process Control Systems. White Paper Process Solutions White Paper Mitigating Cyber Security Risks in Legacy Process Control Executive Summary The term legacy process control system has different connotations for different people. To many,

More information

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample

More information

DeltaV System Cyber-Security

DeltaV System Cyber-Security January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...

More information

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to

More information

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric Challenges What challenges are there for Cyber Security in Industrial

More information

Protecting productivity with Plant Security Services

Protecting productivity with Plant Security Services Protecting productivity with Plant Security Services Identify vulnerabilities and threats at an early stage. Take proactive measures. Achieve optimal long-term plant protection. siemens.com/plant-security-services

More information

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities Industrial Cyber Security Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities WE HEAR ABOUT CYBER INCIDENTS EVERY DAY IN THE NEWS, BUT JUST HOW RELEVANT ARE THESE

More information

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security

More information

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services Cyber Risk Mitigation via Security Monitoring Enhanced by Managed Services Focus: Up to But Not Including Corporate and 3 rd Party Networks Level 4 Corporate and 3 rd Party/Vendor/Contractor/Maintenance

More information

Industrial Security Solutions

Industrial Security Solutions Industrial Security Solutions Building More Secure Environments From Enterprise to End Devices You have assets to protect. Control systems, networks and software can all help defend against security threats

More information

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security

More information

Goals. Understanding security testing

Goals. Understanding security testing Getting The Most Value From Your Next Network Penetration Test Jerald Dawkins, Ph.D. True Digital Security p. o. b o x 3 5 6 2 3 t u l s a, O K 7 4 1 5 3 p. 8 6 6. 4 3 0. 2 5 9 5 f. 8 7 7. 7 2 0. 4 0 3

More information

Industrial Cyber Security 101. Mike Spear

Industrial Cyber Security 101. Mike Spear Industrial Cyber Security 101 Mike Spear Introduction Mike Spear Duluth, GA USA Global Operations Manager, Industrial Cyber Security [email protected] Responsible for the Global Delivery of Honeywell

More information

13 Ways Through A Firewall What you don t know will hurt you

13 Ways Through A Firewall What you don t know will hurt you Scientech 2013 Symposium: Managing Fleet Assets and Performance 13 Ways Through A Firewall What you don t know will hurt you Andrew Ginter VP Industrial Security Waterfall Security Solutions andrew. ginter

More information

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013 CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control

More information

The rocky relationship between safety and security

The rocky relationship between safety and security The rocky relationship between safety and security Best practices for avoiding common cause failure and preventing cyber security attacks in Safety Systems Abstract: An industry practice reflected in the

More information

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer

More information

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808 cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808

More information

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT December 3, 2013 slide 1 A global leader in power and

More information

How To Secure Your System From Cyber Attacks

How To Secure Your System From Cyber Attacks TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital

More information

13 Ways Through A Firewall

13 Ways Through A Firewall Industrial Control Systems Joint Working Group 2012 Fall Meeting 13 Ways Through A Firewall Andrew Ginter Director of Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright

More information

2012 Honeywell Users Group Americas. Sustain.Ability. Rick Kaun - Honeywell. Cyber Security

2012 Honeywell Users Group Americas. Sustain.Ability. Rick Kaun - Honeywell. Cyber Security 2012 Honeywell Users Group Americas Sustain.Ability. Rick Kaun - Honeywell Cyber Security 1 Industrial IT: Security Concerns Industrial facilities must run safely, reliably and predictably Process Control

More information

N-Dimension Solutions Cyber Security for Utilities

N-Dimension Solutions Cyber Security for Utilities AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential

More information

SCADA Cyber Security

SCADA Cyber Security SCADA Cyber Security Information on Securing SCADA systems Version: 1.0 Erik Daalder, Business Development Manager Yokogawa Electric Corporation Global SCADA Center T: +31 88 4641 360 E: [email protected]

More information

IT Security and OT Security. Understanding the Challenges

IT Security and OT Security. Understanding the Challenges IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control

More information

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications

Technology Blueprint. Protect Your Email Servers. Guard the data and availability that enable business-critical communications Technology Blueprint Protect Your Email Servers Guard the data and availability that enable business-critical communications LEVEL 1 2 3 4 5 SECURITY CONNECTED REFERENCE ARCHITECTURE LEVEL 1 2 4 5 3 Security

More information

ISA Security Compliance Institute ISASecure IACS Certification Programs

ISA Security Compliance Institute ISASecure IACS Certification Programs ISA Security Compliance Institute ISASecure IACS Certification Programs This paper describes how international industrial cybersecurity standards and complementary conformance certification programs should

More information

Security Testing in Critical Systems

Security Testing in Critical Systems Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base

More information

ISACA rudens konference

ISACA rudens konference ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial

More information

Developing Secure Software in the Age of Advanced Persistent Threats

Developing Secure Software in the Age of Advanced Persistent Threats Developing Secure Software in the Age of Advanced Persistent Threats ERIC BAIZE EMC Corporation DAVE MARTIN EMC Corporation Session ID: ASEC-201 Session Classification: Intermediate Our Job: Keep our Employer

More information

LOGIIC APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Virtualization Project February 2015 Final Public Report Document Title LOGIIC Virtualization Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC

More information

NERC CIP VERSION 5 COMPLIANCE

NERC CIP VERSION 5 COMPLIANCE BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087, Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 4, 60 Edward St, Brisbane, QLD 4000 T: 1300 744 028 Email: [email protected]

More information

GE Measurement & Control. Cyber Security for Industrial Controls

GE Measurement & Control. Cyber Security for Industrial Controls GE Measurement & Control Cyber Security for Industrial Controls Contents Overview...3 Cyber Asset Protection (CAP) Software Update Subscription....4 SecurityST Solution Options...5 Centralized Account

More information

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems Building Security into Your Industrial Internet Phillip Allison Tempered Networks Discussion topics Threats to network security TCP/IP

More information

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection The State of Industrial Control Systems Security and National Critical Infrastructure Protection Emerging Threats Tinuade Adesina, Lulea University of Technology Sweden IT Security for the Next Generation

More information

Cyber Security for SCADA/ICS Networks

Cyber Security for SCADA/ICS Networks Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And

More information

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems GE Measurement & Control Top 10 Cyber Vulnerabilities for Control Systems GE Proprietary Information: This document contains proprietary information of the General Electric Company and may not be used

More information

Facilitated Self-Evaluation v1.0

Facilitated Self-Evaluation v1.0 Electricity Subsector Cybersecurity Capability Maturity Model (ES-C2M2) Patricia Hoffman Facilitated Self-Evaluation v1.0 Assistant Secretary Office of Electricity Delivery and Energy Reliability U.S.

More information

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process Complete Web Application Security Phase1-Building Web Application Security into Your Development Process Table of Contents Introduction 3 Thinking of security as a process 4 The Development Life Cycle

More information

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements

More information

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323

More information

Verve Security Center

Verve Security Center Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

Protecting Organizations from Cyber Attack

Protecting Organizations from Cyber Attack Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics

More information

Designing a security policy to protect your automation solution

Designing a security policy to protect your automation solution Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...

More information

External Supplier Control Requirements

External Supplier Control Requirements External Supplier Control s Cyber Security For Suppliers Categorised as Low Cyber Risk 1. Asset Protection and System Configuration Barclays Data and the assets or systems storing or processing it must

More information

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things. AGENDA Current State of Information Security Data Breach Statics Data Breach Case Studies Why current

More information

Ovation Security Center Data Sheet

Ovation Security Center Data Sheet Features Scans for vulnerabilities Discovers assets Deploys security patches transparently Allows only white-listed applications to run in workstations Provides virus protection for Ovation Windows workstations

More information

Sygate Secure Enterprise and Alcatel

Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise and Alcatel Sygate Secure Enterprise eliminates the damage or loss of information, cost of recovery, and regulatory violation due to rogue corporate computers, applications, and

More information

McAfee Server Security

McAfee Server Security Security Secure server workloads with low performance impact and integrated management efficiency. Suppose you had to choose between securing all the servers in your data center physical and virtual or

More information

Data Security Concerns for the Electric Grid

Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid Data Security Concerns for the Electric Grid The U.S. power grid infrastructure is a vital component of modern society and commerce, and represents a critical

More information

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

LOGIIC Remote Access. Final Public Report. June 2015 1 LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION LOGIIC Remote Access June 2015 Final Public Report Document Title LOGIIC Remote Monitoring Project Public Report Version Version 1.0 Primary Author A. McIntyre (SRI) Distribution Category LOGIIC Approved

More information

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark The self-defending network a resilient network By Steen Pedersen Ementor, Denmark The self-defending network - a resilient network What is required of our internal networks? Available, robust, fast and

More information

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security? Agenda Threats Risk Assessment Implementation Validation Advanced Security Implementation Strategy

More information

CYBER SECURITY. Is your Industrial Control System prepared?

CYBER SECURITY. Is your Industrial Control System prepared? CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect Operation & Optimization Software Activity Schneider-Electric Challenges What challenges are there

More information

Cyber Security nei prodotti di automazione

Cyber Security nei prodotti di automazione Cyber Security nei prodotti di automazione Marco Biancardi, ABB SpA, Power System Division 11 dicembre 2013, Roma Why is it an issue? Isolated devices Point to point interfaces Proprietary networks Standard

More information

Innovative Defense Strategies for Securing SCADA & Control Systems

Innovative Defense Strategies for Securing SCADA & Control Systems 1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet

More information

HACKING RELOADED. Hacken IS simple! Christian H. Gresser [email protected]

HACKING RELOADED. Hacken IS simple! Christian H. Gresser cgresser@nesec.de HACKING RELOADED Hacken IS simple! Christian H. Gresser [email protected] Agenda About NESEC IT-Security and control Systems Hacking is easy A short example where we currently are Possible solutions IT-security

More information

How To Test A Control System With A Network Security Tool Like Nesus

How To Test A Control System With A Network Security Tool Like Nesus Using the Nessus Vulnerability Scanner on Control Systems By Dale Peterson All too often we hear stories about the IT Department or some consultant running a vulnerability scan that takes down a key control

More information

Cyber Security Seminar KTH 2011-04-14

Cyber Security Seminar KTH 2011-04-14 Cyber Security Seminar KTH 2011-04-14 Defending the Smart Grid [email protected] Appropriate Footer Information Here Table of content Business Drivers Compliance APT; Stuxnet and Night Dragon

More information

Cyber R &D Research Roundtable

Cyber R &D Research Roundtable Cyber R &D Research Roundtable 2 May 2013 N A T I O N A L S E C U R I T Y E N E R G Y & E N V I R O N M E N T H E A L T H C Y B E R S E C U R I T Y Changing Environment Rapidly Evolving Threat Changes

More information

Symphony Plus Cyber security for the power and water industries

Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber security for the power and water industries Symphony Plus Cyber Security_3BUS095402_(Oct12)US Letter.indd 1 01/10/12 10:15 Symphony Plus Cyber security for the power and water industries

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Waterfall for NERC-CIP Compliance

Waterfall for NERC-CIP Compliance Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall

More information

Session 14: Functional Security in a Process Environment

Session 14: Functional Security in a Process Environment Abstract Session 14: Functional Security in a Process Environment Kurt Forster Industrial IT Solutions Specialist, Autopro Automation Consultants In an ideal industrial production security scenario, the

More information

OPC & Security Agenda

OPC & Security Agenda OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information

More information

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe 2/1/2012 Assessor: J. Doe Disclaimer This report is provided as is for informational purposes only. The Department of Homeland Security (DHS) does not provide any warranties of any kind regarding any information

More information

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT Telecom Testing and Security Certification A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT 1 Need for Security Testing and Certification Telecom is a vital infrastructure

More information

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Energy Research and Development Division FINAL PROJECT REPORT CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT Prepared for: Prepared by: California Energy Commission KEMA, Inc. MAY 2014 CEC

More information

Dr. György Kálmán [email protected]

Dr. György Kálmán gyorgy@mnemonic.no COMMUNICATION AND SECURITY IN CURRENT INDUSTRIAL AUTOMATION Dr. György Kálmán [email protected] Agenda Connected systems historical overview Current trends, concepts, pre and post Stuxnet Risks and threats

More information