Security 4.0 - Security by Separation Making Industrial Control Systems More Secure Author(s): Date: Version Mehmet Özer 19.05.2015 v1.0 SYSGO AG 1
Agenda Security Challenges IoT Architecture for Industrial Automation Industrial Automation Security Separation Kernel Separation Kernel Security Concept Linux Security Security Add-On Secure Boot Policy Management Security Certification Common Criteria EAL-X Summary SYSGO AG 2
Information Flow Industrial Control System (ICS) http://upload.wikimedia.org/wikipedia/commons/ 9/9c/Cylinders_with_Hall_sensors.png http://www.automationworld.com/sites/default/file s/styles/lightbox/public/field/image/1307np_vipa. png?itok=9qyz4-vt http://www.markbourgeois.com/portfolio/moeller usa_net/products/automation/media/plchmi_plc.png magazine.qualys.fr http://static1.1.sqspcdn.com/static/f/614694/139 35925/1314910419277/8GRTD100+PNG.png?t oken=hfpg%2bh6himyy%2bj3gjkhtx4qredq %3D SYSGO AG 3
ICS Security Challenges Handled Risks Office - Devices Confidentiality of Data!!! Confidentiality!! Integrity! Availability ICS - Devices Preserve Safety, Real-Time Execution and availability:!!! Availability!! Integrity! Confidentiality Security Means - Commercial Solutions - Broadly used Updates / Patches / - Update Server - Remote Access - Availability for OS or architecture - Update policy - Do I loose my safety certification? - Is Remote Access a Backdoor? Maintenance - Regularly - 24/7 operation - Availability requires high up-time Product Life-Cycle - 2-4 years - Up to Date Hardware and Software - 10 up to 30 years - Handle Obsolescence SYSGO AG 4
Security State of the by Separation art Network Security Firewall Authentication Cryptography Monitoring Intrusion detection Perimeter Protection Custom Application Custom Application OS-Kernel Hardware SYSGO AG 5
Security by Separation Communication & Security Data Base Control Application System Part. Health Mon. CBIT MILS: Safety and Security HW Obsolescence Linux Linux Soft-PLC Native GPL Isolation Separation Platform Real-Time Hypervisor Hardware Security by separation and controlled information flow SYSGO AG 6
Attack Scenario - SW Level SIL 0 SIL 2 SIL 3 APP APP APP Soft-SPS PikeOS Real-Time Linux or Android BT WIFI USB PikeOS - Microkernel HW Platform Device 1 Device 2 Core 0 Core 1 SYSGO AG 7
Linux Security Network Security ensured by Linux Networking Security Networking Communication Security Updates for Linux Firewall, Cryptography VPN IPSec, SSL, WPA, RADIUS Web Server/Brow ser Wifi... Secure Data... Embedded Linux Real-Time Inter-Process and Partition Communication Separation Kernel Hardware Platform SYSGO AG 8
Secure Boot Attack Scenario Hacking User or Kernel is complicated by Antivirus-SW Replace boot-loader, boot-image, Application image What am I trying to protect? Against unauthorized modification of Firmware and OS image My system from reverse engineering/cloning How Do I Protect my System My SoC provides a Mode to execute Secure-Boot-Code Validate every instance of Software loaded on my System Root of Trust to Validate in Chain of Trust SYSGO AG 9
PikeOS Use-Case - Security Policy Manager Kaspersky Security System for PikeOS Application independent from security means Separate Functionality and Security No limitation by application means Update Application and Security means in dependently System wide security Security Monitor evaluates Application behavior System state and Enforces Security Policy Security Server Security Configuration Security Context Takes Access Decision Linux PikeOS POSIX PikeOS Native (System Part.) libkss libkss libkss Security Server Security Monitor PikeOS Microkernel SYSGO AG 11
PikeOS - Security Certification CSPN evaluation criteria of French Authority French Information Security Agency (ANSSI) Certification de Sécurité de Premier Niveau" (CSPN) Comparable to Common Criteria EAL4+ Common Criteria and IEC 15408 PikeOS Security Target based on EURO-MILS PP Targeting EAL5+/EAL6 Ongoing Certification at BSI: BSI-DSZ-CC-0923 SYSGO AG 12
SYSGO IoT Security Solution - Summary SYSGO Security Concept Secure Boot SYSGO AG 13
Thank you for your attention! More information on www.sysgo.com SYSGO AG 14