Cyber Security in a Modern Process Network. Philip Nunn Product Manager - Industrial Networks



Similar documents
OPC & Security Agenda

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Using ISA/IEC Standards to Improve Control System Security

Innovative Defense Strategies for Securing SCADA & Control Systems

a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Using Tofino to control the spread of Stuxnet Malware

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Designing a security policy to protect your automation solution

Security Testing in Critical Systems

IT Security and OT Security. Understanding the Challenges

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Industrial Firewalls Endpoint Security

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Industrial Security for Process Automation

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems

Building A Secure Microsoft Exchange Continuity Appliance

CYBER SECURITY. Is your Industrial Control System prepared?

Session 14: Functional Security in a Process Environment

Deploying Firewalls Throughout Your Organization

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Holistic View of Industrial Control Cyber Security

Overview. Firewall Security. Perimeter Security Devices. Routers

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

ModbusFW Deep Packet Inspection for Industrial Ethernet

Vulnerability Testing of Industrial Network Devices

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Network Security Infrastructure Testing

Effective OPC Security for Control Systems - Solutions you can bank on

DeltaV System Cyber-Security

Chapter 9 Firewalls and Intrusion Prevention Systems

Firewall Introduction Several Types of Firewall. Cisco PIX Firewall

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:

FIREWALLS & CBAC. philip.heimer@hh.se

Dr. György Kálmán

patriotscada Distributed Firewall for SCADA and Industrial Networks

Protecting Organizations from Cyber Attack

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

By David G. Holmberg, Ph.D., Member ASHRAE

13 Ways Through A Firewall

Protecting Critical Infrastructure

CMPT 471 Networking II

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Firewalls. Chapter 3

Industrial Security in the Connected Enterprise

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

PLC Security for Water / Wastewater Systems

13 Ways Through A Firewall What you don t know will hurt you

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

Networking for Caribbean Development

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Verve Security Center

State of the State of Control System Cyber Security

A Decision Maker s Guide to Securing an IT Infrastructure

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Ovation Security Center Data Sheet

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

What is Really Needed to Secure the Internet of Things?

- Introduction to PIX/ASA Firewalls -

Global Partner Management Notice

Network Instruments white paper

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

SCADA/Business Network Separation: Securing an Integrated SCADA System

HoneyBOT User Guide A Windows based honeypot solution

Cyber Security. Smart Grid

INTRODUCTION TO FIREWALL SECURITY

Building Secure Networks for the Industrial World

How Secure is Your SCADA System?

Firewall and UTM Solutions Guide

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Firewalls, Tunnels, and Network Intrusion Detection

Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection

Introduction of Intrusion Detection Systems

Promoting Network Security (A Service Provider Perspective)

Ovation Security Center Data Sheet

VULNERABILITY ASSESSMENT WHITEPAPER INTRODUCTION, IMPLEMENTATION AND TECHNOLOGY DISCUSSION

Firewalls Overview and Best Practices. White Paper

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Best Practices for DanPac Express Cyber Security

Course Title: Penetration Testing: Security Analysis

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Cybersecurity considerations for electrical distribution systems

Transcription:

Cyber Security in a Modern Process Network Philip Nunn Product Manager - Industrial Networks

2

Philip Nunn Philip started work in the wider electrical industry with Crabtree Electrical, now a part of the Electrium Group. After gaining a solid foundation in the disciplines of sales & marketing, Philip moved on to become a Regional Sales Engineer with Craig & Derricott. Responsible primarily for sales of C & D s range of Electrical Switchgear & Control Equipment, Philip also became involved with C & D s range of hazardous area components and from this footing, Philip joined Bartec a specialist manufacturer of hazardous area electrical equipment. As a Regional Account Manager with Bartec, Philip gained a large knowledge of hazardous areas and their associated equipment and approvals. Moving to MTL in 2004, Philip s role as a Regional Account Manager allowed him to increase his knowledge of the Process Market and MTL s range of product solutions. In 2006, Philip s role widened to become Business Development Manager MOST. With a responsibility for sales of the MOST suite of Open Control Components, Philip s focus changed to encompass a greater awareness of the Process Control Market and the solutions within. In 2007, Philip became responsible for sales of the MTL s suite of networking equipment as Business Development Manager (EMEA) Industrial Networks. This portfolio of products includes both wired and wireless network products along with network security solutions. In 2009 this role was expanded to encompass Marketing functionality and Philip is now Product Manager Industrial Networks. 3

Agenda Section 1: The current scenario Section 2: The four myths of network security Section 3: How control system security differs from IT security Section 4: Firewall Technology Section 5: The Bastion Model Section 6: Defence in Depth network security Section 7: Where and what to protect 4

The Current Scenario 5

Water Industry Salt River Project SCADA Hack Maroochy Shire Sewage Spill Software Flaw Makes MA Water Undrinkable Trojan/Keylogger on Ontario SCADA System Viruses Found on Aussie SCADA Laptops Audit/Blaster Causes Water SCADA Crash DoS attack on water system via Korean telecom Penetration of California irrigation district wastewater treatment plant SCADA SCADA system tagged with message, "I enter in your server like you in Iraq" 6

Petroleum Industry Electronic Sabotage of Venezuela Oil Operations CIA Trojan Causes Siberian Gas Pipeline Explosion Anti-Virus Software Prevents Boiler Safety Shutdown Slammer Infected Laptop Shuts Down DCS Electronic Sabotage of Gas Processing Plant Slammer Impacts Offshore Platforms SQL Slammer Impacts Drill Site Code Red Worm Defaces Automation Web Pages Penetration Test Locks-Up Gas SCADA System Contractor Laptop Infects Control System 7

Chemical Industry IP Address Change Shuts Down Chemical Plant Hacker Changes Chemical Plant Set Points via Modem Nachi Worm on Advanced Process Control Servers SCADA Attack on Plant of Chemical Company Contractor Accidentally Connects to Remote PLC Sasser Causes Loss of View in Chemical Plant Infected New HMI Infects Chemical Plant DCS Blaster Worm Infects Chemical Plant 8

Power Industry Slammer Infects Control Central LAN via VPN Slammer Causes Loss of Comms to Substations Slammer Infects Ohio Nuclear Plant SPDS Iranian Hackers Attempt to Disrupt Israel Power System Utility SCADA System Attacked Virus Attacks a European Utility Facility Cyber Attacks Reported by Asian Utility E-Tag Forgery Incident in Power PSE Power Plant Security Details Leaked on Internet 9

How do we track these incidents? The Repository for Industrial Security Incidents (RISI) tracks network cyber incidents that directly impact industrial and SCADA operations World s largest collection of control system security incidents (over 150) Both malicious and accidental incidents are tracked Others SCSIE (EuroSCSIE) 10

Four Myths of Industrial Network Security 11

Myth 1 Nothing much has changed 12

Reported Incidents 1994-2005 13

Incident Drivers Before Q4/2001 Incidents are primarily internally driven: Inappropriate employee activity Accidental events External 27% Accidental 58% Internal 15% 14

Incident Drivers After Q4/2001 Most incidents are externally driven: Virus/Trojan/Worm System Penetration Audit or Other 5% Denial of Service Accidental 32% External 61% Internal 2% 15

Possibilities of Shift Widespread industrial adoption of Ethernet Increased interconnection of SCADA systems Public awareness of SCADA and Control Protocols become more mainstream Skill set demands on staff 16

Myth 2 - Control Systems aren t vulnerable to hackers or viruses 17

Incident Types 2002-2006 Malware accounts for 2/3 of the external incidents on control systems Appears to match IT trends Malware 68% DoS 6% System Penetration 13% Sabotage 13% % of Incident Types 2002 to Sept. 2005 18

What Really Hurts? Malware incidents are the most common but aren t the most costly Control systems are highly susceptible to simple network issues Malware 68% Accidental 79% Other 8% Sabotage 4% Hacker 8% Impact < 50,000 Accidental 12% Impact > 50,000 Sabotage 21% 19

An accidental Security Incident August 19, 2006: - Operators at Browns Ferry Nuclear plant had to scram the reactor due to a potentially dangerous high power, low flow condition. Both redundant drives controlling the recirculating water system had failed. Cause was determined to be excessive traffic" on the control systems network according to the NRC. Traffic between two different vendors control products was the likely cause Unintentional, non-directed incident 20

Myth 3 We don t connect to the Internet 21

External entry Viewing the data another way 56% of incidents stated remote as their point of entry into the control system Remote 56% Local 27% Physical 2% Other or None 15% 22

Myth 4 Hackers don t understand SCADA 23

How Safe is a Glass of Water? Brum2600 Blackhat Conference: Things started to get a little more interesting The talk was entitled How safe is a glass of water. It was a detailed breakdown of the RF systems that are used by water management authorities in the UK and how these systems can be abused, interfered with and generally messed. Source: The Register 24

The Hackers are Waking Up Talk No.16: SCADA Exposed Cyber-attacks on these systems and subsystems can be targeted from remote locations to multiple locations simultaneously This talk focuses on the assessment of the SCADA infrastructure and attack analysis of the more common SCADA protocols in use today. Source: Toorcon TOORCON 7 25

How Control Systems Security differs from IT Security 26

Misapplication of IT Security Assumptions There are important differences between Information Technology (IT) networks and Industrial Automation and Control Systems (IACS) networks Problems occur because assumptions that are valid in the IT world may not be on the plant floor 27

The IT Approach to Vulnerability Management In the IT world we can scan for vulnerabilities on the network Then we patch 28

Let s Scan for Vulnerabilities A gas utility hired a security company to conduct penetration testing on their corporate IT network Consultant ventured into the SCADA network Penetration tool locked up the SCADA system Gas utility was not able to send gas through its pipelines for four hours Penetration tools now include exploits specifically for control systems. 29

And Then We Patch PLC/DCS/RTU patching can be done but Controllers often run for years without shutdown (long intervals between patches) Patching is dependent on vendor s patch policy. Am I vulnerable? How do I know? Does it require return to vendor? Patching may require re-certification of the entire system (firmware upgrade to Safety System?) 30

Solutions DON T throw out all IT security technologies and practices and start from scratch DON T ignore the whole cyber security problem and hope it goes away DO borrow IT security technologies and practices but modify them and learn how to use them properly in our world DO develop clear understanding how industrial assumptions and needs differ from that of the IT world 31

Firewall Technology Types of Firewalls and how they work Challenges of Traditional IT Firewalls Firewall Rule Basics 32

Types of Firewalls Three general classes of Firewall: Packet Filter Stateful Inspection Application Proxy 33

Firewall Policy Access Control Lists (rules) typically permit or deny data packets based on: Source and destination IP address, Source and destination TCP or UDP port numbers, State of the TCP "ack" bit, Direction of packet flow (i.e.. A- >B or B->A) Building a good filter requires a good understanding of the type of protocols that will be filtered A firewall is only as good as its rules! 34

Firewall Rules Here is a typical ACL for a Cisco IOS: interface Serial0 ;WAN side configuration ip access-group 201 in ip access-group 202 out ;ID for inbound filters ;ID for outbound filters These 4 ACLs allow all outgoing Web (HTTP) connections and allow incoming Web connections only to the server at 10.20.30.3. acl 201 permit tcp any gt 1023 host 10.20.30.3 eq 80 acl 201 permit tcp any eq 80 10.20.30.0 0.0.0.255 gt 1023 established acl 202 permit tcp host 10.20.30.3 eq 80 any gt 1023 established acl 202 permit tcp 10.20.30.0 0.0.0.255 gt 1023 any eq 80 acl deny 35

The Bastion Model Why Security Solutions Fail 36

The Bastion Model of Security A popular solution for industrial security is to install a single firewall between business and the control system Known as the Bastion Model since it depends on a single point of security Other examples of the bastion model: The Great Wall of China The Maginot Line 37

The Bastion Model Doesn't Work The Slammer Worm infiltrated a: Nuclear plant via a contractor s T1 line; Power utility SCADA system via a VPN; Petroleum control system via laptop; Paper machine HMI via dial-up modem Firewalls existed in at least three of these cases * Industrial Security Incident Database June 2006 38

Pathways into the Control Network Office LAN Mis-Configured Firewalls Plant Network Internet Infected Laptops Unauthorized Connections Infected Remote Support Modems HIS Control LAN FCS RS-232 Links External PLC Networks 39

A Perimeter Defence is Not Enough We can t just install a control system firewall and forget about security System will eventually be compromised So we must harden the SCADA system We need Defence in Depth Inadequately designed control system networks that lack sufficient defense-in-depth mechanisms NERC No.2 of Top 10 Vulnerabilities of Control Systems 2007 40

Defence In Depth Network Security 41

Defence-in-Depth Strategy By Defence-in-depth strategy, we mean the protection measures composed of more than one security control to protect the property. By the use of this kind of multi-layer measures, another layer will protect the property even if one layer is destroyed, so the property is protected more firmly. Yokogawa Security Standard of System TI 33Y01B30-01E 42

The Solution in the IT World Your desktop PC has flaws so you add security software: Patches Personal Firewalls (like ZoneAlarm) Anti-Virus Software Encryption (VPN Client or PGP) But you can t add software to your PLC or RTU 43

Distributed Security Appliances Add hardware instead - a security appliance designed to be placed in front of individual control devices (such as PLC, DCS, RTU etc) Protects the control device from any unauthorized contact, probing, commands, etc 44

Distributed Security Appliances Infected Business PC Internet Internet Firewall Internet Attacks Layer 5 Defence (Enterprise) DMZ Business Network Business/Control System Firewall Layers 3/4 Defence (Control System) Distributed FW Layers 1/2 Defence (Device) Cluster of PLCs SCADA RTU Infected HMI DCS Controllers Distributed FW 45

What is Needed in Industrial Security? Extensive research at BCIT showed that a successful industrial security appliance requires: Industrial form factor and robustness Electrician-friendly deployment Control tech-friendly remote configuration and monitoring Global management capability Control system functionality Extensibility beyond just packet filtering 46

Industrial Form Factor Zone 2 Mounting Extended Temperature Range Redundant Industrial PSU Inputs (24VDC) DIN Rail Mounting Serial & Ethernet Ports 47

Electrician Friendly Deployment No IT knowledge required upon deployment Zero-configuration in field Attach the firewall to the DIN Rail Attach instrument power Plug in network cables Walk away Device should allow all traffic on startup Simple Override for troubleshooting 48

Remote Configuration & Global Management Ability to configure & manage devices centrally Scalable from one to thousands as plant expands Simple Plant expansion should not mean network security is compromised Intuitive Environment operator s are familiar with Alarm handling, pass off to SCADA 49

Control System Functionality Need to filter by control protocols, not numbers: acl 201 permit tcp any eq 80 10.20.30.0 0.0.0.255 gt 1023 established (Cisco PIX) $IPT -A PCN_DMZ -p tcp --dport! $DH_PORT -j LOG_PCN_DMZ (Linux iptables) MODBUS/TCP Ethernet/IP GE-Fanuc Siemens Honeywell Yokogawa Emerson Mitsubishi DNP PI Etc 50

More than a firewall? Flexibility as the network changes, so does network security Protect from known vulnerabilities Firewall today, encryption tomorrow New requirements specific to Controls Industry (Deep Packet Inspection) Future-proof investment 51

Where & What to Protect? 52

Network Boundary Security Large IT-style firewalls on major access points Industrial firewalls on secondary access Internet Office LAN Plant Network HIS Control LAN FC S External PLC Networks 53 RS-232 Links

Internal Network Security Industrial firewalls between sub-systems (ISA 99 Zoning) Internet Office LAN Plant Network Control LAN FCS 54

Protection from Wireless Systems Specific stateful filtering of wireless traffic Internet Office LAN Wireless Access Point Plant Network Control LAN Firewall LSM filters wireless traffic 56

Protection of OPC Traffic Now Restricts OPC port range to 100 ports Future tunnels OPC to single port and filters all OPC traffic Plant Network OPC LSM filters traffic Control LAN 57

Protection for Unpatchable Systems Servers with old operating systems (like NT4) that cannot be patched Office LAN Plant Network NT4 Based Server Control LAN Firewall LSM filters bad traffic 58

Protection of Safety Systems Read-only MODBUS/TCP connections to safety systems Office LAN Plant Network HIS Control LAN MODBUS/TCP LSM only allows MODBUS Read commands FCS Safety System 59

Protection from Insecure Networks Connection to control systems over insecure networks (Firewall and VPN LSM) Office LAN Plant Network Firewall LSM filters and VPN LSM encrypts traffic HIS Control LAN Off-Site PLC Networks FCS Insecure Network 60

Honeywell Modbus TCP 61

Honeywell One Wireless 62

Yokogawa - Tofino 63

64 iopener

Thank you for listening Any questions? 65