SCADA Security: Challenges and Solutions
|
|
|
- Leon Cobb
- 10 years ago
- Views:
Transcription
1 SCADA Security: Challenges and Solutions June 2011 / White paper by Metin Ozturk, Philip Aubin Make the most of your energy
2 Summary Executive Summary... p 2 Protecting Critical Infrastructure Includes Secure SCADA... p 3 The Growing Vulnerability of Control Systems... p 4 Proactive Cyber Security is Smart Business... p 6 Encryption and Authentication... p 7 Achieving Your Secure SCADA with Schneider Electric... p 8
3 Executive summary This paper presents the case for improving security to SCADA systems. It examines the factors that have contributed to the growing vulnerability of control systems, and presents new standards designed to protect critical infrastructure including the use of encryption and authentication for SCADA systems. White paper on SCADA Security 02
4 Protecting Critical Infrastructure Includes Secure SCADA Supervisory Control and Data Acquisition (SCADA) systems are typically used for monitoring and controlling geographically remote operations. In relative obscurity, these extensive control systems perform behind-the-scenes, collecting sensor measurements and operational data from the field, processing and displaying this information, and relaying control commands to local or remote equipment. Although SCADA systems are employed around the world in numerous industries, the average citizen is unaware of their critical importance. However, this is quickly changing as more information about the cyber vulnerabilities of utility SCADA systems is publicly available. There is good reason why SCADA systems are getting the attention of hostile governments and competitors, terrorist groups, disgruntled employees, and other malicious intruders they offer the huge potential to acquire confidential data and disrupt operations. SCADA systems control some of the most vital infrastructure in industrial and energy sectors, from oil and gas pipelines to nuclear facilities to water treatment plants. Critical infrastructure is defined as the physical and IT assets, networks and services that if disrupted or destroyed would have a serious impact on the health, security, or economic wellbeing of citizens and the efficient functioning of a country s government. 1 One does not have to look far for examples of disruptions that have cost organizations time, resources, and possibly lives. Added to this is the fact that many SCADA systems are vulnerable. It is therefore imperative that system security and risk mitigation be at the forefront of the minds of all SCADA system users. 1 Myriam Dunn, Critical Infrastructures: Vulnerabilities, Threats, Responses, CSS Analyses in Security Policy, Vol. 2, No. 16, June Typically, each country has their own definition of Critical Infrastructure. For more information on the 17 U.S. sectors visit White paper on SCADA Security 03
5 The Growing Vulnerability of Control Systems Historically, security concerns over control systems were limited to physical attacks. SCADA system operators rationalized that if the management consoles were adequately isolated and only authorized personnel had access to the network, the system was intrinsically secure. There was little risk of tampering since few people had technical expertise of the system and the data communication paths remained isolated. SCADA has been hidden behind its cloak of obscurity for the past four decades, with information technology managers convinced that these systems would never be accessed through corporate networks or from remote access points. The modern SCADA system has evolved significantly. Utility companies recognize the lower costs, easier accessibility, and improved efficiency gained through connecting their TCP/IP networks to their SCADA systems. These next generation systems, integrated with corporate networks and the Internet, face many challenges in their quest to becoming secure. Several factors have contributed to the growing vulnerability of control systems, including: 1) The networking of control systems Enterprises have increased connectivity through the integration of their control systems and enterprise networks. Breaches in enterprise security can arise if appropriate security controls are not put in place for both networks. 2) Insecure remote connections Access links such as dial-up modems and wireless communications are used for remote diagnostics, maintenance, and examination of system status. If encryption or authentication mechanisms are not utilized, the integrity of the transmitted information is vulnerable. 3) Standardized technologies Organizations are transitioning to standardized technologies, such as Microsoft s Windows, in order to reduce costs and improve system scalability and performance. The result is more people armed with the knowledge and tools able to attack a system, and an increase in the number of systems vulnerable to an attack. 4) Availability of technical information Public information about infrastructures and control systems is readily available to potential hackers and intruders. Design and maintenance documents and technical standards for a critical system can all be found on the internet, greatly jeopardizing overall security. 2 With so much riding on SCADA systems, it should come as no surprise that shortly after September 11, 2001, government officials found evidence of terrorist groups visiting websites that offer software and programming instructions for the digital equipment that run power, water, transport and communications grids. Furthermore, it has since been proven that the inner controls of critical infrastructure systems have been the target of cyber attacks. For example, in 2006 a water filtration plant near Harrisburg, Pennsylvania had its security system hacked. Malicious software that had the capability of disrupting the water treatment operations was planted from an outside source into the computer system. 3 2 United States General Accounting Office, Critical Infrastructure Protection, Challenges and Efforts to Secure Control Systems, GAO , March Philip Leggiere, Infrastructure Security, Securing SCADA, HSToday, September White paper on SCADA Security 04
6 Most recently to shake the cyber security world was the Stuxnet malware, discovered in June On Nov 29, 2010, Iran s president Mahmound Ahmadinejad publicly disclosed that the Stuxnet cyber-threat had affected his country s uranium enrichment efforts. It is believed that the code was designed to sabotage nuclear plants, specifically targeting an individual company s configuration software and control devices. This intelligent worm was primarily spread via USB sticks but was found to also infect systems through network shares and SQL databases. According to Symantec, the worm would search for specific models of frequency converter drives made by two firms. Once the worm found the right configuration, it sabotaged operations by introducing subtle changes to the speed of the frequency drives over several weeks, while displaying normal readings to maintain its stealth. The Stuxnet malware began infecting systems in January 2009 and reports indicate that more than 100,000 computer systems have been infected worldwide. Historic data from the early days of the attack showed that 58.85% of infections occurred in Iran, 18.22% occurred in Indonesia, and 8.31% occurred in India. 4 Although no serious damage was caused to any utility sectors, this sophisticated malware highlights the risks modern SCADA systems face with respect to connectivity, insecure remote connections, standardized technologies, and readily available technical information. Cyber security is a topic for utility experts and manufacturers that can no longer be ignored. 5 4 Jarrad Shearer, W32.Stuxnet, Symantec, September 17, For control system security program information and incident reporting, visit Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) at White paper on SCADA Security 05
7 Proactive Cyber Security is Smart Business Ensuring cyber security in control systems may at first seem like a daunting task as it requires a commitment from the entire organization. Upper management needs to recognize the numerous benefits of a secure SCADA system. These advantages include ensuring system uptime, reliability and availability. Implementing good cyber security is smart business because a secure system is a trusted system, and customer retention and loyalty is built around trust. Vendors, system integrators, IT and control engineers all share in the responsibility. There are many resources available now to help critical infrastructure SCADA systems enhance their security. For example, the standard ISA99 - Industrial Automation and Control Systems Security, establishes best practices, technical reports, and related information to define procedures for implementing and assessing electronically secure systems. Compliance with this standard can improve manufacturing and control system electronic security, help identify and address vulnerabilities, and reduce the risk of compromised confidential information and system degradation. 6 Government regulations also exist and continue to evolve with the goal of securing critical infrastructure industries. The most ambitious for influencing government policy is the non-profit North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) standard. Known as NERC-CIP, this standard has its roots in the Electricity Modernization Act which is part of the US Energy Policy Act of Within the Energy Policy Act of 2005, there is a section which dictates that the NERC-CIP standard requires all power plants and electric utility facilities to develop new cyber security systems and procedures in accordance with a 3-year implementation plan. There are eight different CIP standards covering everything from Security Management Control and Critical Cyber Assets, to Incident Reporting and Recovery Plans. Each one of the eight standards defines a series of specific requirements. The standards are: CIP-002-1: Critical Cyber Asset Identification CIP-003-1: Security Management Controls CIP-004-1: Personnel and Training CIP-005-1: Electronic Security Perimeter CIP-006-1: Physical Security of Critical Cyber Assets CIP-007-1: Systems Security Management CIP-008-1: Incident Reporting and Response Planning CIP-009-1: Recovery Plans for Critical Cyber Assets Now that we re seeing congressional action and government penalties for non-compliance, SCADA cyber security is being taken more seriously. 7 6 The International Society of Automation, ISA99, Industrial Automation and Control System Security, 7 Philip Leggiere, Infrastructure Security, Securing SCADA, HSToday, September White paper on SCADA Security 06
8 Encryption and Authentication In order to meet CIP and CIP standards, encryption and authentication are critical elements in a comprehensive cyber security solution. Typical SCADA security measures consist of physically securing the hardware and transmission media, and employing common cyber security defenses such as password protection and anti-virus utilities. Communication security measures are harder to enforce since modern day hackers can easily identify confidential phone numbers, decode proprietary protocols, and bypass firewalls and gateways. Encryption and authentication are highly effective methods to reduce some of these cyber threats to SCADA communications. There are two open standards for SCADA communications available on the market today that were developed to provide security through encryption and authentication: IEEE6189 suite Also known as AGA 12 incorporated in IEEE 1711, these standards secure SCADA equipment communication. Like many forms of physical or electronic security, encryption uses a key. This type of key is a secret sequence of data that determines how the information being sent between devices is obscured (encrypted). Keeping this key secure is a fundamental part of SCADA security. It is therefore important to reiterate that employing a diverse range of security measures will always prove more effective. The other layers of security, like physical locks, operating procedures, and separately secured corporate and SCADA networks are necessary to protect encryption keys, and the system as a whole. Authentication is the process by which one part of a SCADA system proves its identity to another. A SCADA device receiving a critical message, such as a command to perform controls or respond with data, can challenge the sending device s identity. The sending device must then provide the challenge response. If the receiving device is satisfied with the challenge response then it will act on the original command. IEC62351 suite Secure Authentication for DNP3 communication is based on this standard. Encryption is the act of manipulating information until it appears almost meaningless to the casual observer. Decryption is the process that takes place to restore an encrypted message back to its previous readable state. In a typical SCADA system, messages are sent using a given protocol format, such as MODBUS or DNP3. Anyone who can see the messages being transmitted can decode them and see what information is being transferred from device to device. On an encrypted SCADA communication system, messages are transformed into a seemingly garbled sequence of bytes. Short messages are stuffed with extra random data to make it difficult to estimate the size or type of the messages being transmitted. A casual observer can determine little more than the fact that a message has been sent from one device to another. Encryption makes spying on and tampering with SCADA networks much more difficult. Like encryption, authentication requires the communicating SCADA devices to have a mutually know secret key. Whereas encryption uses its key to transform entire messages into an encrypted data stream, authentication challenges and challenge responses use their key to create special digital signatures. The mathematics used in authentication is similar to that of encryption, but a smaller amount of data needs to be manipulated. This means that authentication is computationally far cheaper than encryption and typically uses the structure of the original SCADA protocol for better communication efficiency. Authentication prevents malicious parties from controlling a secured SCADA device, but it will not stop them from intercepting messages and reading their content. White paper on SCADA Security 07
9 Achieving Your Secure SCADA with Schneider Electric As described above, government is mandating the deployment of security technology for SCADA systems in some utility sectors, while for the moment leaving others free to choose whether they deploy security or not. With the growing vulnerabilities of control systems and the potential for harm and civil disruption in a breached critical infrastructure system, SCADA users are advised to formulate and deploy a security plan that meets their individual and immediate needs. Even within a security mandate there is scope for choice about how to implement the security system: authentication or encryption, or both. Schneider Electric s SCADAPack E controllers provide both IEEE6189 message encryption and DNP3 secure authentication. As well, the E controllers now provide DNP3 communications to the latest DNP standard. A new user-friendly security administrator is available for managing DNP3 secure authentication and AGA12 encryption security and is multigroup aware so it can be used to manage security configurations for multiple controllers in a system. The SCADAPack E Configurator software further enhances system security as it cooperates with the E controllers to authorize configuration software installation, authorize users, and prevent system manipulation. This technology addresses the vulnerable security gap that commonly exists between control devices and their management software. This powerful line of programmable logic controllers with remote terminal unit functionality is designed specifically for telemetry and remote SCADA water and wastewater applications. With improving overall system visibility and security at its core, E controllers maintain no holes in data even when communication links go down and allow end users peace of mind in their system data s integrity for billable applications or critical operations. In 2011, we will see utilities take a more proactive approach to protecting their SCADA infrastructure with the adoption of encryption and authentication technologies to meet compliance standards and avoid the monetary fines and reputational damage that a security breach can cause. SCADA Master Station Configuration Software Secure Communication Network Secure SCADAPack E Controllers White paper on SCADA Security 08
10 Schneider Electric Telemetry & Remote SCADA Solutions 48 Steacie Drive, Kanata, Ontario K2K 2A9 Canada Direct Worldwide: 1 (613) Fax: 1 (613) Toll Free within North America: 1 (888) Document Number TBULM This document has been printed on recycled paper April 2011 tk 2011 Schneider Electric. All rights reserved.
Best Practices in ICS Security for System Operators. A Wurldtech White Paper
Best Practices in ICS Security for System Operators A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Energy Cybersecurity Regulatory Brief
Energy Understand the regulations that impact the energy industry and accelerate information security initiatives. Contents Overview 3 A Highly Vulnerable Energy Industry 4 Key Regulations to Consider
SCADA Systems. Make the most of your energy. March 2012 / White paper. by Schneider Electric Telemetry & Remote SCADA Solutions
SCADA Systems March 2012 / White paper by Schneider Electric Telemetry & Remote SCADA Solutions Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 Field Instrumentation...
Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions
Kevin Staggs, Honeywell Process Solutions Table of Contents Introduction...3 Nerc Standards and Implications...3 How to Meet the New Requirements...4 Protecting Your System...4 Cyber Security...5 A Sample
DeltaV System Cyber-Security
January 2013 Page 1 This paper describes the system philosophy and guidelines for keeping your DeltaV System secure from Cyber attacks. www.deltav.com January 2013 Page 2 Table of Contents Introduction...
SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards
SCADA Compliance Tools For NERC-CIP The Right Tools for Bringing Your Organization in Line with the Latest Standards OVERVIEW Electrical utilities are responsible for defining critical cyber assets which
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs
for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs EXECUTIVE SUMMARY Supervisory Control and Data Acquisition (SCADA) systems are used for remote
SCADA SYSTEMS AND SECURITY WHITEPAPER
SCADA SYSTEMS AND SECURITY WHITEPAPER Abstract: This paper discusses some of the options available to companies concerned with the threat of cyber attack on their critical infrastructure, who as part of
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager
A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks Alex Leemon, Sr. Manager 1 The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached
Document ID. Cyber security for substation automation products and systems
Document ID Cyber security for substation automation products and systems 2 Cyber security for substation automation systems by ABB ABB addresses all aspects of cyber security The electric power grid has
Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment
The Advantages of an Integrated Factory Acceptance Test in an ICS Environment By Jerome Farquharson, Critical Infrastructure and Compliance Practice Manager, and Alexandra Wiesehan, Cyber Security Analyst,
A 360 degree approach to security
June 2012, issue 1-1 SCADA communications A 360 degree approach to security Contents 1. The need for 360 degree security 2 2. Considerations in a 360 degree approach 3 3. Implementing a 360 degree approach
Keeping the Lights On
Keeping the Lights On Fundamentals of Industrial Control Risks, Vulnerabilities, Mitigating Controls, and Regulatory Compliance Learning Goals o Understanding definition of industrial controls o Understanding
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring
Considerations for Hybrid Communications Network Technology for Pipeline Monitoring Craig Held White Paper April 2012 Abstract The concept of automation (and its corresponding technologies) is a primary
What is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs [email protected] The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
North American Electric Reliability Corporation (NERC) Cyber Security Standard
North American Electric Reliability Corporation (NERC) Cyber Security Standard Symantec Managed Security Services Support for CIP Compliance Overviewview The North American Electric Reliability Corporation
future data and infrastructure
White Paper Smart Grid Security: Preparing for the Standards-Based Future without Neglecting the Needs of Today Are you prepared for future data and infrastructure security challenges? Steve Chasko Principal
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations
EEI Business Continuity. Threat Scenario Project (TSP) April 4, 2012. EEI Threat Scenario Project
EEI Business Continuity Conference Threat Scenario (TSP) April 4, 2012 EEI Threat Scenario 1 Background EEI, working with a group of CIOs and Subject Matter Experts, conducted a survey with member companies
Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper
Best Practices in ICS Security for Device Manufacturers A Wurldtech White Paper No part of this document may be distributed, reproduced or posted without the express written permission of Wurldtech Security
Verve Security Center
Verve Security Center Product Features Supports multiple control systems. Most competing products only support a single vendor, forcing the end user to purchase multiple security systems Single solution
Cyber Security for SCADA/ICS Networks
Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com Increasing Cyber Attacks on SCADA / ICS Systems 2 What is SCADA Supervisory Control And
Internet threats: steps to security for your small business
Internet threats: 7 steps to security for your small business Proactive solutions for small businesses A restaurant offers free WiFi to its patrons. The controller of an accounting firm receives a confidential
Beyond the Hype: Advanced Persistent Threats
Advanced Persistent Threats and Real-Time Threat Management The Essentials Series Beyond the Hype: Advanced Persistent Threats sponsored by Dan Sullivan Introduction to Realtime Publishers by Don Jones,
The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance
Date: 07/19/2011 The 12 Essentials of PCI Compliance How it Differs from HIPPA Compliance Understand & Implement Effective PCI Data Security Standard Compliance PCI and HIPAA Compliance Defined Understand
Cyber Security for NERC CIP Version 5 Compliance
GE Measurement & Control Cyber Security for NERC CIP Version 5 Compliance imagination at work Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security Management Controls...
Improving SCADA Operations Using Wireless Instrumentation
Improving SCADA Operations Using Wireless Instrumentation April 2010 / White paper by Hany Fouda Make the most of your energy Summary Executive Summary... p 2 Introduction... p 3 The Evolution of Wireless...
White Paper. April 2006. Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks
White Paper April 2006 Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks According to a recent Harris Interactive survey, the country s leading business executives consider
Lifecycle Solutions & Services. Managed Industrial Cyber Security Services
Lifecycle Solutions & Services Managed Industrial Cyber Security Services Around the world, industrial firms and critical infrastructure operators partner with Honeywell to address the unique requirements
Cyber security and critical national infrastructure
120 Dr Richard Piggin Manager Defence, Aerospace & Communications Atkins Cyber security and critical national infrastructure Abstract Cyber security is an all-embracing term, meaning different things to
Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements
, pp.144-148 http://dx.doi.org/10.14257/astl.2015.95.27 Industrial Control Systems Vulnerabilities and Security Issues and Future Enhancements Hongseok Chae 1, AAmir Shahzad 1, Muhammad Irfan 2, HyangRan
Innovative Defense Strategies for Securing SCADA & Control Systems
1201 Louisiana Street Suite 400 Houston, Texas 77002 Phone: 877.302.DATA Fax: 800.864.6249 Email: [email protected] Innovative Defense Strategies for Securing SCADA & Control Systems By: Jonathan Pollet
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION
Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION ALBERTO AL HERNANDEZ, ARMY RESERVE OFFICER, SOFTWARE ENGINEER PH.D. CANDIDATE, SYSTEMS ENGINEERING PRESENTATION
Security Testing in Critical Systems
Security Testing in Critical Systems An Ethical Hacker s View Peter Wood Chief Executive Officer First Base Technologies Who is Peter Wood? Worked in computers & electronics since 1969 Founded First Base
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com
KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global
Designing a security policy to protect your automation solution
Designing a security policy to protect your automation solution September 2009 / White paper by Dan DesRuisseaux 1 Contents Executive Summary... p 3 Introduction... p 4 Security Guidelines... p 7 Conclusion...
Securing Distribution Automation
Securing Distribution Automation Jacques Benoit, Cooper Power Systems Serge Gagnon, Hydro-Québec Luc Tétreault, Hydro-Québec Western Power Delivery Automation Conference Spokane, Washington April 2010
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
How To Secure Your System From Cyber Attacks
TM DeltaV Cyber Security Solutions A Guide to Securing Your Process A long history of cyber security In pioneering the use of commercial off-the-shelf technology in process control, the DeltaV digital
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors
March 25-27, 2014 Steven A. Kunsman i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors ABB Inc. March 26, 2015 Slide 1 Cyber Security for Substation
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards
A Concise Model to Evaluate Security of SCADA Systems based on Security Standards Nasser Aghajanzadeh School of Electrical and Computer Engineering, Shiraz University, Shiraz, Iran Alireza Keshavarz-Haddad
This is a preview - click here to buy the full publication
TECHNICAL REPORT IEC/TR 62443-3-1 Edition 1.0 2009-07 colour inside Industrial communication networks Network and system security Part 3 1: Security technologies for industrial automation and control systems
AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005
AUDITOR GENERAL S REPORT Protection of Critical Infrastructure Control Systems Report 5 August 2005 Serving the Public Interest Serving the Public Interest THE SPEAKER LEGISLATIVE ASSEMBLY THE PRESIDENT
SCADA/Business Network Separation: Securing an Integrated SCADA System
SCADA/Business Network Separation: Securing an Integrated SCADA System This white paper is based on a utility example but applies to any SCADA installation from power generation and distribution to water/wastewater
The State-of-the-State of Control System Cyber Security
The State-of-the-State of Control System Cyber Security Prepared for HTCIA September 19, 2012 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] Summary Control systems are
WHITE PAPER PROTECTING OUR CRITICAL UTILITIES WITH INTEGRATED CONTROL SYSTEMS PROTECTING OUR CRITICAL UTILITIES WITH INTEGRATED CONTROL SYSTEMS
PROTECTING OUR CRITICAL UTILITIES WITH INTEGRATED CONTROL SYSTEMS Critical Infrastructure Security The wellbeing and security of all nations depends on the availability of critical infrastructure, such
Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
4 0 0 T o t t e n P o n d R o a d W a l t h a m, M A 0 2 4 5 1 7 8 1. 8 1 0. 4 3 2 0 w w w. v i e w f i n i t y. c o m Utilizing Pervasive Application Monitoring and File Origin Tracking in IT Security
GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance
GE Oil & Gas Cyber Security for NERC CIP Versions 5 & 6 Compliance Cyber Security for NERC CIP Versions 5 & 6 Compliance 2 Contents Cyber Security for NERC CIP Compliance... 5 Sabotage Reporting... 6 Security
The Importance of Cybersecurity Monitoring for Utilities
The Importance of Cybersecurity Monitoring for Utilities www.n-dimension.com Cybersecurity threats against energy companies, including utilities, have been increasing at an alarming rate. A comprehensive
a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.
SCADA and CIP Security in a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng. CTO, Byres Security Inc. What is Stuxnet? The Stuxnet Worm July, 2010: Stuxnet worm was
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL WHAT IS CDM? The continuous stream of high profile cybersecurity breaches demonstrates the need to move beyond purely periodic, compliance-based approaches to
Protecting Organizations from Cyber Attack
Protecting Organizations from Cyber Attack Cliff Glantz and Guy Landine Pacific Northwest National Laboratory (PNNL) PO Box 999 Richland, WA 99352 [email protected] [email protected] 1 Key Topics
How Secure is Your SCADA System?
How Secure is Your SCADA System? Charles Drobny GlobaLogix, Inc. Houston, TX, USA Our Industry is a Target 40% of cyber attacks on Critical Infrastructure targets are aimed at the Energy Industry The potential
Remote Services. Managing Open Systems with Remote Services
Remote Services Managing Open Systems with Remote Services Reduce costs and mitigate risk with secure remote services As control systems move from proprietary technology to open systems, there is greater
What Risk Managers need to know about ICS Cyber Security
What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 [email protected] ICSs What are they
Down the SCADA (security) Rabbit Hole. Alberto Volpatto
Down the SCADA (security) Rabbit Hole Alberto Volpatto Alberto Volpatto Security Engineer & Team Leader @ Secure Network Computer Engineer Application Security Specialist What is SCADA? Supervisory operators,
ISACA rudens konference
ISACA rudens konference 8 Novembris 2012 Procesa kontroles sistēmu drošība Andris Lauciņš Ievads Kāpēc tēma par procesa kontroles sistēmām? Statistics on incidents Reality of the environment of industrial
SCADA System Security, Complexity, and Security Proof
SCADA System Security, Complexity, and Security Proof Reda Shbib, Shikun Zhou, Khalil Alkadhimi School of Engineering, University of Portsmouth, Portsmouth, UK {reda.shbib,shikun.zhou,khalil.alkadhimi}@port.ac.uk
Protection from cyber threats
52 ABB review 4 12 Protection from cyber threats Can utilities and industries afford a cyber security breach? PATRIK BOO The intensity of cyber attacks on IT systems increases with every passing day. Worryingly,
Using ISA/IEC 62443 Standards to Improve Control System Security
Tofino Security White Paper Version 1.2 Published May 2014 Using ISA/IEC 62443 Standards to Improve Control System Security Contents 1. Executive Summary... 1 2. What s New in this Version... 1 3. Why
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE
AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE THE CHALLENGE: SECURE THE OPEN AIR Wirelesss communication lets you take your business wherever your customers,
Seven Strategies to Defend ICSs
INTRODUCTION Cyber intrusions into US Critical Infrastructure systems are happening with increased frequency. For many industrial control systems (ICSs), it s not a matter of if an intrusion will take
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
OPC & Security Agenda
OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1 Introduction CYBER SECURITY TODAY The Need for Reliable Information
Are you prepared to be next? Invensys Cyber Security
Defense In Depth Are you prepared to be next? Invensys Cyber Security Sven Grone Critical Controls Solutions Consultant Presenting on behalf of Glen Bounds Global Modernization Consultant Agenda Cyber
SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005
SCADA System Security ECE 478 Network Security Oregon State University March 7, 2005 David Goeke Hai Nguyen Abstract Modern public infrastructure systems
ITAR Compliance Best Practices Guide
ITAR Compliance Best Practices Guide 1 Table of Contents Executive Summary & Overview 3 Data Security Best Practices 4 About Aurora 10 2 Executive Summary & Overview: International Traffic in Arms Regulations
Update On Smart Grid Cyber Security
Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1 Agenda Cyber Security Overview Security Framework Securing Smart Grid 2 Smart Grid Attack Threats
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord
Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, 28.09.2015 CASE: Implementation of Cyber Security for Yara Glomfjord Implementation of Cyber Security for Yara Glomfjord Speaker profile Olav Mo ABB
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps
Agenda Introduction to SCADA Importance of SCADA security Recommended steps SCADA systems are usually highly complex and SCADA systems are used to control complex industries Yet.SCADA systems are actually
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
GE Intelligent Platforms. Understanding and Minimizing Your HMI/SCADA System Security Gaps
GE Intelligent Platforms Understanding and Minimizing Your HMI/SCADA System Security Gaps Understanding and Minimizing Your HMI/SCADA System Security Gaps Being at the heart of an operation s data visualization,
What is Cyber Liability
What is Cyber Liability Ubiquitous Warfare Espionage Media Operational Data Security and Privacy Tech 1 Data Security and Privacy Data Breach Response Costs Privacy Regulatory Action Civil Litigation INSURABLE
SECURITY CONSIDERATIONS FOR LAW FIRMS
SECURITY CONSIDERATIONS FOR LAW FIRMS Enterprise Risk Management Professional consulting firm that specializes in cyber security Founded in 1998 in Miami, Florida Serves more than 150 clients, locally,
UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments
UNIDIRECTIONAL SECURITY GATEWAYS Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments 2010 Introducing: Waterfall Security Solutions Ltd Located in Rosh-Ha ayin,
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
cover_comp_01 9/9/02 5:01 PM Page 1 For further information, please contact: The President s Critical Infrastructure Protection Board Office of Energy Assurance U.S. Department of Energy 202/ 287-1808
INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT
Utilities WHITE PAPER May 2013 INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT Table of Contents Introduction...3 Problem Statement...4 Solution Requirements...5 Components of an Integrated
Industrial Security for Process Automation
Industrial Security for Process Automation SPACe 2012 Siemens Process Automation Conference Why is Industrial Security so important? Industrial security is all about protecting automation systems and critical
Waterfall for NERC-CIP Compliance
Waterfall for NERC-CIP Compliance Using Waterfall s Unidirectional Security Solution to Achieve True Security & NERC-CIP Compliance Date: Jul. 2009 The material in this document is proprietary to Waterfall
Preparing for the HIPAA Security Rule
A White Paper for Health Care Professionals Preparing for the HIPAA Security Rule Introduction The Health Insurance Portability and Accountability Act (HIPAA) comprises three sets of standards transactions
Security Policy JUNE 1, 2012. SalesNOW. Security Policy v.1.4 2012-06-01. v.1.4 2012-06-01 1
JUNE 1, 2012 SalesNOW Security Policy v.1.4 2012-06-01 v.1.4 2012-06-01 1 Overview Interchange Solutions Inc. (Interchange) is the proud maker of SalesNOW. Interchange understands that your trust in us
Security & SMEs. An Introduction by Jan Gessin. Introduction to the problem
Security & SMEs An Introduction by Jan Gessin Introduction to the problem SMEs convinced it will never happen to them. In many ways SMEs are more of a target than big business. Harsh realities of the online
TRIPWIRE NERC SOLUTION SUITE
CONFIDENCE: SECURED SOLUTION BRIEF TRIPWIRE NERC SOLUTION SUITE TAILORED SUITE OF PRODUCTS AND SERVICES TO AUTOMATE NERC CIP COMPLIANCE u u We ve been able to stay focused on our mission of delivering
The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA
The Weakest Link: Mitigating Web Application Vulnerabilities webscurity White Paper webscurity Inc. Minneapolis, Minnesota USA January 25, 2007 Contents Executive Summary...3 Introduction...4 Target Audience...4
PCI Data Security Standards (DSS)
ENTERPRISE APPLICATION WHITELISTING SOLUTION Achieving PCI Compliance at the Point of Sale Using Bit9 Parity TM to Protect Cardholder Data PCI: Protecting Cardholder Data As the technology used by merchants
HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS
Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HIGH-RISK SECURITY VULNERABILITIES IDENTIFIED DURING REVIEWS OF INFORMATION TECHNOLOGY GENERAL CONTROLS AT STATE MEDICAID AGENCIES Inquiries
Achieving Truly Secure Cloud Communications. How to navigate evolving security threats
Achieving Truly Secure Cloud Communications How to navigate evolving security threats Security is quickly becoming the primary concern of many businesses, and protecting VoIP vulnerabilities is critical.
Protecting Your Organisation from Targeted Cyber Intrusion
Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology
Network Cyber Security. Presented by: Motty Anavi RFL Electronics
Network Cyber Security Presented by: Motty Anavi RFL Electronics Agenda Cyber Security Threats Defense Strategy & Consequences Next Generation Networking ICS Vulnerabilities Liabilities Next Gen Networking
N-Dimension Solutions Cyber Security for Utilities
AGENDA ITEM NO.: 3.A. MEETING DATE; 08/18/2014 N-Dimension Solutions Cyber Security for Utilities Cyber Security Protection for Critical Infrastructure Assets The cyber threat is escalating - Confidential
