New Era in Cyber Security. Technology Development



Similar documents
Cyber Security Implications of SIS Integration with Control Networks

Meeting the Cybersecurity Standards of ANSI/ISA with Data Diodes

Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015

Network Security Infrastructure Testing

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Verve Security Center

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Designing a security policy to protect your automation solution

How To Manage Security On A Networked Computer System

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

IT Security and OT Security. Understanding the Challenges

The Importance of Cybersecurity Monitoring for Utilities

Waterfall for NERC-CIP Compliance

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Missing the Obvious: Network Security Monitoring for ICS

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Innovative Defense Strategies for Securing SCADA & Control Systems

OPC & Security Agenda

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

CERIAS Tech Report Mapping Water Sector Cyber-Security Vulnerabilities by James H. Graham, Jeffrey L. Hieb and J. Chris Foreman Center for

Industrial Security Solutions

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Seven Strategies to Defend ICSs

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

Protecting Critical Infrastructure

SCADA Security Training

Architecture Overview

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

The SIEM Evaluator s Guide

Network Instruments white paper

13 Ways Through A Firewall

Scalability in Log Management

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

GE Measurement & Control. Cyber Security for NERC CIP Compliance

Securing EtherNet/IP Using DPI Firewall Technology

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

How Secure is Your SCADA System?

Cybersecurity considerations for electrical distribution systems

CPNI VIEWPOINT CYBER SECURITY ASSESSMENTS OF INDUSTRIAL CONTROL SYSTEMS

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Business white paper. Missioncritical. defense. Creating a coordinated response to application security attacks

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Session 14: Functional Security in a Process Environment

Industrial Security for Process Automation

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

SCADA SYSTEMS AND SECURITY WHITEPAPER

Cyber Security and Privacy - Program 183

Using ISA/IEC Standards to Improve Control System Security

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

Secure Networks for Process Control

Cyber Watch. Written by Peter Buxbaum

SANS Top 20 Critical Controls for Effective Cyber Defense

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

An Analysis of the Capabilities Of Cybersecurity Defense

SECURITY CONTROLS AND RISK MANAGEMENT FRAMEWORK

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Recommended IP Telephony Architecture

Holistic View of Industrial Control Cyber Security

Detecting rogue systems

May/June Integrating DCS I/O Embedded vision Multigenerational systems Mobile user interfaces Flow spotlight.

Network/Cyber Security

Keeping the Lights On

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

2012 North Dakota Information Technology Security Audit Vulnerability Assessment and Penetration Testing Summary Report

Network Security Monitoring

Who is Watching You? Video Conferencing Security

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Taxonomy of Intrusion Detection System

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

Critical Controls for Cyber Security.

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

LOGIIC APPROVED FOR PUBLIC DISTRIBUTION

13 Ways Through A Firewall What you don t know will hurt you

Payment Card Industry (PCI) Data Security Standard

What a Vulnerability Assessment Scanner Can t Tell You. Leveraging Network Context to Prioritize Remediation Efforts and Identify Options

Deploying ACLs to Manage Network Security

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

SCADA/Business Network Separation: Securing an Integrated SCADA System

Vendor System Vulnerability Testing Test Plan

Intrusion Detection System (IDS)

Critical Security Controls

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

How To Connect Log Files To A Log File On A Network With A Network Device (Network) On A Computer Or Network (Network Or Network) On Your Network (For A Network)

CYBER SECURITY POLICY For Managers of Drinking Water Systems

How To Protect A Network From Attack From A Hacker (Hbss)

Transcription:

New Era in Cyber New Era in Cyber Security Security Technology Technology Development Development Combining the Power of the Oil and Gas Industry, DHS, and the Vendor Community to Combat Cyber Security Threats Combining the Power of the Oil and Gas Sandia is a multiprogram laboratory operated by Sandia Corporation, a Lockheed Martin Company, for the United States Department of Energy s National Nuclear Security Administration under contract DE-AC04-94AL85000. Industry, DHS, and the Vendor Community to Combat Cyber Security Threats Collaborating to Advance Control System Security

Presenters Ben Cook Sandia National Labs Tom Aubuchon Advanced Software Engineering Bryan Richardson Sandia National Labs Leeanna Demers ArcSight http://www.logiic.org NOTE: This is a condensed version of the presentations given at the DHS LOGIIC Cyber Security Project Presentation. 2

Topics Tom Aubuchon Government Industry Partnership: LOGIIC LOGIIC Correlation Project (LOGIIC-1) Overview Project Model PCS/PCN Lab Environment Bryan Richardson Attack Detection In Control Systems Deploying Defense in Depth Attack Scenarios Tom Aubuchon Accomplishments Successes Example Correlation Results Impact Leeanna Demers LOGIIC 1 Correlation Demo 3

Defined Linking the Oil and Gas Industry to Improve Cyber Security Forward looking opportunity to reduce vulnerabilities of oil and gas process control environments. Create a working model to leverage the collective resources of the Oil & Gas Industry, government agencies, and national laboratories for future cybersecurity projects 4

LOGIIC-1: 12-month Technology Integration & Demonstration 1 st Attempt to address an Oil & Gas Critical R&D need Jointly Supported By Industry Partners And The U.S. DHS Industry Contributes Correlation Project An Implementation of the Partnership Model Requirements and operational expertise Project management Product vendor channels DHS Science &Technology Contributes National Security Perspective on threats Access to long term security research Independent researchers with technical security expertise Testing facilities 5

Addressing A Critical Need PCN Monitoring: An Overwhelming Task 1 Firewall; 1 Intrusion Detection device; 1 month 2 URGENT THREATS 55 LEGITIMATE SECURITY RISKS 620 SECURITY EVENTS IDENTIFIED 9,500,000 LOG ENTRIES AND ALERTS 6

Overview Opportunity Statement Reduce vulnerabilities of O&G PCS environments by correlating and analyzing abnormal events to identify and prevent cyber security threats Goals Produce solution for use in industry operations Defense in depth analysis of abnormal events Ability to correlate abnormal events from Business network PCN interfaces PCN directly What it is not 7

Model Correlation Project Gov. Alert Level 8 Disconnect Web Network Monitoring Modify Firewall ACL Intrusion Detection Data Respond to Threats Monitoring Escalate to Staff Problem Tracking Site Security Alarms IDS of PCN Remove PCN from Corp. Switch To Alt. SCADA Staff Observations Operate Manually Operator Actions SCADA Alarms

Challenges Technical Identify what abnormal PCS/PCN events are How to detect abnormal events within PCS/PCN Temporal 12 Months to complete both R & D Organizational Correlation Project Multiple Industry Partners Multiple Gov interfaces (DHS; Lab; Researchers) Disparate Vendor community 9

Milestones Correlation Project Identify typical O&G PCS/PCN environments Create typical O&G PCS/PCNs within Lab Constraints Develop attack scenarios for PCS/PCN environments Select security sensors for use in PCS/PCN Integrate a best-in-class correlation engine Implement all components in test bed Simulate attacks from corp., public, partner, and PCS/PCN 10

Approach Divide and conquer: Three sub teams created PCS Security Sub Team Identify data sources available in PCS environment Define security events that can be detected from the data Define Attack Scenarios IDS Sub Team Identify security sensors That can be deployed into the PCN environment Correlation Sub Team Identify correlation engine solutions that support: Correlate data from various sources Identify signatures Identify anomalous events 11

No Such Thing as Typical 12

Baseline O&G PCS/PCN Lab Environment 802.11 Corp. Laptop Corporate Network Historian ` Client Firewall Internet Domain Controller DCS Historian DMZ Network Eng. WrkStn ` DCS PCN PCN Access HMI ` Extranet HMI Historian ` SCADA PCN 802.11 DCS Historian 802.11 DCS DCS Controller DCS PLANT PCN Segment OPC Flow Computer Field Site Concentrator Gateway PLC Serial Field Site 1 Simulated Field Telemetry SCADA Field Site 2 13

Hypothetical Attack Scenario Creation Formulated in a collaborative effort LOGIIC Team security SMEs Oil and Gas Industry Participants. Realistic but Hypothetical Vulnerabilities explicitly added to Lab 14

Topics Tom Aubuchon Government Industry Partnership: LOGIIC LOGIIC Correlation Project (LOGIIC-1) Overview Project Model PCS/PCN Lab Environment Bryan Richardson Attack Detection In Control Systems Deploying Defense in Depth Attack Scenarios Tom Aubuchon Accomplishments Successes Example Correlation Results Impact Leeanna Demers LOGIIC 1 Correlation Demo 15

Attack Detection in Control Systems Without detection, security response is blind Solutions exist for IT environments Prior to the LOGIIC Project, very little work on attack detection and correlation specifically tailored for control systems Technical challenge: Take existing solutions for IT and make them work in a realistic control system environment 16

What Do We Want to Detect? Lindqvist, U., On The Fundamentals of Analysis and Detection of Computer Misuse, Ph.D. Thesis, 1999 17

Standard IT Defenses Network Segment Firewalls (in reporting mode, not blocking) Host Firewalls (in reporting mode, not blocking) Network Intrusion Detection Systems (IDS) Network Devices (switches, routers, wireless devices) Correlation Project Scoping Event Sources Control System Event Sources Standard IT network IDS using signatures for a control system protocol (Modbus) Alarms from SCADA and DCS systems Alarms from a flow computer 18

Rogue Systems All systems within PCS are assumed to be known Port Scans This type of reconnaissance activity should not occur on PCS Modbus Exceptions Modbus requests and responses should only originate from known masters and devices in PCS Configuration Changes Correlation Project Indicative PCS Disruption Events PCS networks are typically static networks Ethernet configurations of devices in PCS should rarely change 19

Vulnerability of Trust 802.11 Corp. Laptop Corporate Network Historian ` Client Firewall Internet Domain Controller DCS Historian DMZ Network Eng. WrkStn ` DCS PCN PCN Access HMI ` Extranet HMI Historian ` SCADA PCN 802.11 DCS Historian 802.11 DCS DCS Controller DCS PLANT PCN Segment OPC Flow Computer Field Site Concentrator Gateway PLC Serial Field Site 1 Simulated Field Telemetry SCADA Field Site 2 20

Potential Attack Vector Selection Internet Attack 21

Deploying Defense In Depth IDS IDS IDS 22

How does correlation work? Many event sources lead to information overload Analysts need the big picture - Situational Awareness Event correlation Discovers relationships between events Infers the significance of those relationships Builds a big picture of the network s health from many small data points A Correlation Engine Works by Collecting all relevant event data Normalizing the events Categorizing events and prioritizing them Filtering extraneous events Aggregating similar events All of which lead to correlated events and situational awareness 23

Defense in Depth Correlation Inputs 24

Attack Scenarios Correlation Project External Attack Scenario Trust between business and internet Trust between DMZ and business Trust between control network and DMZ Remote Site Attack Scenario Trust between field equipment and control servers Trust between control network and DMZ 25

External Attacker Scenario EFW Policy EFW Policy DCS Historian E 802.11 DMZ Network DCS PCN 802.11 802.11 Correlation System IDS E E E E E Eng. WrkStn E DCS Historian Corp. Laptop PCN Access HMI ` DCS Corporate Network IDS E DCS Controller IDS DCS PLANT PCN Segment E OPC E EFW Policy IDS-AV-FW Flow Computer Historian ` Client E Firewall Domain Controller IDS Internet Extranet Field Site Concentrator Gateway PLC Serial HMI Field Site 1 ` SCADA PCN Historian E E E E E Simulated Field Telemetry EFW Policy SCADA Field Site 2 26

Remote Site Attacker EFW Policy EFW Policy DCS Historian E 802.11 DMZ Network DCS PCN 802.11 802.11 Correlation System IDS E E E E E Eng. WrkStn E DCS Historian Corp. Laptop PCN Access HMI ` DCS Corporate Network IDS E DCS Controller IDS DCS PLANT PCN Segment E OPC E EFW Policy IDS-AV-FW Flow Computer Historian ` Client E Firewall Domain Controller IDS Internet Extranet Field Site Concentrator Gateway PLC Serial HMI Field Site 1 ` SCADA PCN Historian E E E E E Simulated Field Telemetry EFW Policy SCADA Field Site 2 27

Topics Tom Aubuchon Government Industry Partnership: LOGIIC LOGIIC Correlation Project (LOGIIC-1) Overview Project Model PCS/PCN Lab Environment Bryan Richardson Attack Detection In Control Systems Deploying Defense in Depth Attack Scenarios Tom Aubuchon Accomplishments Successes Example Correlation Results Impact Leeanna Demers LOGIIC 1 Correlation Demo 28

12 Months of Accomplishments Implemented a pipeline SCADA system Implemented a refinery DCS Integrated two PCNs with business network Identified potential PCN risks, modeled attack scenarios Identified Security sensors for use in PCN Implemented EFWs & Policy s on PCN Integrated Correlation Engine with PCS environments Developed 6 new connectors for collecting events Identified and developed correlation rules Implemented PCN policy rule enforcements Developed, tested, and implemented 4 attack scenarios 29

Successes Events For Correlation Multiple subnets Both IT and PCN devices PCS applications Modbus signatures PCS Security Data Dictionary All sources over time Rule Enforcement of common PCN policies Nodes added on PCN Reconnaissance on PCN Modbus exceptions Ethernet configuration changes to PCS devices 30

Example Correlation Results External Attack Results 130 HIGH PRIORITY EVENTS 960 CORRELATED EVENTS 7,060,000 RAW SOURCE EVENTS 31

Results Successfully developed, implemented and tested 4 attack scenarios Attack scenarios model new threats to PCS brought by standardization and interconnectivity Implemented PCS Security Data Dictionary Identified, correlated, and alerted the compromises to environment at & across all levels. Provided enhanced situational awareness Completed by deadline Built a defense in depth solution for industry deployment 32

Summary PCS detect events and report to the correlation engine Attacks can be observed from many different sources Attacks were detected with different methods Without attack detection, control systems may not be aware of attempted or successful attacks Integrated IT security solutions into the PCS world for the first time LOGIIC-1 was a completed successfully LOGIIC Team members showed strong dedication & talent 33

Synergy In Energy 34

Synergy In Energy The whole is greater than the sum of its parts 35

Topics Tom Aubuchon Government Industry Partnership: LOGIIC LOGIIC Correlation Project (LOGIIC-1) Overview Project Model PCS/PCN Lab Environment Bryan Richardson Attack Detection In Control Systems Deploying Defense in Depth Attack Scenarios Tom Aubuchon Accomplishments Successes Example Correlation Results Impact Leeanna Demers LOGIIC 1 Correlation Demo 36

References Linking Oil & Gas Industry to Improve Cyber Security (LOGIIC) partnership with the Homeland Security Advanced Research Projects Agency, Department of Homeland Security (DHS): Project Framing Document for DHS LOGI2C Project, paper developed by the project team, Jul. 2005. Lindqvist, U., On the Fundamentals of Analysis and Detection of Computer Misuse, Ph.D. Thesis, 1999. Paul, D.: Partnership for Cyber Security presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 Jackson, R.: LOGIIC Partnership: Continuous Opportunity for Growth presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 Susanto, I.: Risk and Important of PCN Security presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 Aubuchon,T.: LOGIIC Correlation Project presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 Parks,R.C.: Threats, Vulnerabilities, Attacks presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 Lindqvist, U.: Technologies for Defense in Depth presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 Herzer, J.: Correlation Technology and Result presented at DHS LOGIIC Cyber Security Project Presentation, Houston, Sept.11, 2006 37