Global Industrial Cyber Security Professional GICSP



Similar documents
Global Industrial Cyber Security Professional GICSP

Industrial Security for Process Automation

SCADA Security Training

IT Security and OT Security. Understanding the Challenges

Cyber Security for NERC CIP Version 5 Compliance

GE Measurement & Control. Cyber Security for NERC CIP Compliance

Facilitated Self-Evaluation v1.0

Security + Certification (ITSY 1076) Syllabus

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

ISACA rudens konference

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Symphony Plus Cyber security for the power and water industries

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Designing a security policy to protect your automation solution

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Cyber Security for SCADA/ICS Networks

Critical Controls for Cyber Security.

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

ARC INDUSTRY FORUM 2015

Goals. Understanding security testing

GE Measurement & Control. Cyber Security for NEI 08-09

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Effective Defense in Depth Strategies

Holistic View of Industrial Control Cyber Security

Using ISA/IEC Standards to Improve Control System Security

Secure Networks for Process Control

The Protection Mission a constant endeavor

Bellevue University Cybersecurity Programs & Courses

Innovative Defense Strategies for Securing SCADA & Control Systems

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Industrial Security Solutions

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Safe Network Integration

Supplier Information Security Addendum for GE Restricted Data

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Session 14: Functional Security in a Process Environment

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IoT & SCADA Cyber Security Services

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Ovation Security Center Data Sheet

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Cybersecurity for Energy Delivery Systems 2010 Peer Review. Dale Peterson Digital Bond, Inc. Bandolier and Portaledge

Meeting the Cybersecurity Standards of ANSI/ISA with Data Diodes

The rocky relationship between safety and security

Keeping the Lights On

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Cyber Security Implications of SIS Integration with Control Networks

Interna'onal Standards Ac'vi'es on Cloud Security EVA KUIPER, CISA CISSP HP ENTERPRISE SECURITY SERVICES

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

Fundamentals of Network Security - Theory and Practice-

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Department of Management Services. Request for Information

Security Overview. BlackBerry Corporate Infrastructure

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Industrial Cyber Security 101. Mike Spear

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

Emerson s Smart Wireless and WIB Requirements

This is a preview - click here to buy the full publication

Are you prepared to be next? Invensys Cyber Security

Document ID. Cyber security for substation automation products and systems

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

Cyber Security nei prodotti di automazione

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

How To Secure Your System From Cyber Attacks

SANS Top 20 Critical Controls for Effective Cyber Defense

Security Controls Implementation Plan

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

University of Pittsburgh Security Assessment Questionnaire (v1.5)

CYBER SECURITY. Is your Industrial Control System prepared?

Attachment A. Identification of Risks/Cybersecurity Governance

What IT Auditors Need to Know About Secure Shell. SSH Communications Security

Eleventh Hour Security+

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Seven Strategies to Defend ICSs

NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements

Cyber Security Risk Mitigation Checklist

Rebecca Massello Energetics Incorporated

Assessing the Effectiveness of a Cybersecurity Program

GE Measurement & Control. Cyber Security for Industrial Controls

Ovation Security Center Data Sheet

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Transcription:

Global Industrial Cyber Security Professional GICSP A cer&fica&on for Engineers, ICS Security Professionals, and ICS Technology Specialists www.sans.org/event/north- american- ics- scada- summit- 2014 SANS ICS Resources Control System Poster Webcasts ICS NewsBites STH Training Demo Follow us on TwiPer @SANSICS www.sans.org/industrial- control- systems/resources/

This is not another day in the data center for IT professionals cer<fica<on! This is Industrial Cyber Security Engineers ICS Security Specialists OT Support Specialists Bring your PPEs and let s take cyber security to the plant floor!

What is the GICSP? The GICSP is a new cer&fica&on that focuses on the founda<onal knowledge for professionals securing cri&cal industrial infrastructure assets. The GISCP has been developed for engineers, control system support, and security professionals who work in environments addressed by commonly accepted standards related to control system and automa&on security, including ISA- 99/IEC 62443 and NERC CIP. Holders of the GICSP will demonstrate a globally recognized level of competence that defines the architecture, design, management, risk and controls that assure the security of cri&cal infrastructure. The GICSP is the bridge to bring together IT, engineering and cyber security professionals to achieve security for ICS from design through re&rement.

What is the GICSP? This cer&fica&on establishes a base level of knowledge and understanding for the diverse set of professionals who engineer, operate, secure, or support control systems and share responsibility for the security of these environments. This cer&fica&on is applicable to control system owner/operators across all sectors, ICS vendors, integrators, and support organiza&ons, and professionals that have access to produc&on industrial control systems from nuclear power plant systems to building automa&on. The GICSP is expected to be adopted on a global basis as a gateway cer&fica&on for cri&cal infrastructure- industrial control system professionals.

Who Would Not Want to be GICSP Cer<fied? A general IT security professional, corporate IT system analyst or resources, or an engineer that is not responsible for the administra&on and management of your infrastructure/plant's control system(s). If you possessed this cer&fica&on you would not use it to represent an ability to perform any specific ICS security func&on, procedure, or role nor does it reflect an ability to perform work on a specific ICS technology/implementa&on.

GICSP Examina<on Highlights Examina&on 115 items (100 scored/15 non- scored beta ques&ons); &me limit of three hours Test delivery is computer based and proctored by Pearson VUE at over 4000 global tes&ng centers Cer&fica&on is valid for 4 years; con&nuing professional educa&on requirements are consistent with GIAC standards see www.giac.org/renewal Cer&fica&on Examina&on is available November 21, 2013

GICSP Development Process Feasibility Study Industry collabora&on & Steering CommiPee Iden<fy Objec<ves SME mee&ngs JTA Survey Write Items Item wri&ng training & SME mee&ngs Assemble Exam Industry collabora&on & Steering CommiPee Administer BETA SME mee&ngs Review Exam BETA Psychometric analysis SME review Item Analysis Psychometric review Threshold Study SME determina&on Final Exam Config Steering CommiPee & GIAC The GIAC program is accredited under the IEC/ISO/ANSI 17024 quality standard for cer&fying bodies and we are seeking approval for the GICSP.

GICSP & Industrial Automa<on and Control Systems Cyber Security Cer<fica<ons GICSP Standards Focused Cer<fica<ons Automa<on Cer<fica<ons (ISA- 99) Func<onal cer<fica<on aligned with performing industrial cyber security complimen&ng exis&ng important and valuable cer&fica&on efforts

Hybrid Skill- set Needed Engineering & IACS (Security) Industrial domain architecture Plant automa&on systems Industrial Cyber Security Risk management (with a focus on IACS) Process & Equipment Safety & Security FAT/SAT IT & OT Support Network infrastructures Opera&ng Systems IT infrastructure design Systems Security Lifecycle Informa&on Assurance ICS Security Professionals Cyber Security Cyber Security on a conceptual level Cyber Security Standards Computer Network Defense Incident Response and Handling Root Cause Analysis Industry, company and professional standards Sector Standards & Prac&ces Most common regula&ons Most common risk management methodologies

Job Competence Profile IT / Cyber Security Engineering IT Architecture IT Audit and Compliance Incident / Threat / Vulnerability Management Business Risk Management IACS Integrity & Security SIS & Safeguarding Process Automa&on Systems Engineering

GICSP = Global Collabora<on The GICSP is being developed and guided by a Steering Commicee of leaders from major industrial companies, advisors, and suppliers from around the world. It includes members from the following companies/organiza&ons: BP, Chevron, Pacific Gas & Electric, Shell, Saudi Aramco, ABB, Emerson, Invensys, Rockwell Automa&on, NIPSCO, KPMG, WurldTech, ERNCIP(JRC), TNO, SANS Ins&tute, GIAC SME group (next to ones above): Yokogawa, Schneider Electric (Telvent), Cima&on, Cigital, Red Tiger Security, Honeywell The consor&um of companies established collabora&vely an open body of knowledge for the topic of ICS Security from which a cer&fica&on framework and associated competency training programs could be established.

GICSP Subject MaPer Experts Team including experts from ICS vendors, integrators, end- users and researchers: (job &tles involved) Process control engineer Process control network cyber security engineer PCD IT security engineer Principal security architect Security architect ICS/SCADA security manager Regional technical authority Senior ICS/SCADA security consultant Head of process control security Director of reliability & security Senior security engineer Director of technology

Collaborators

Managing cyber risk is an issue effec1ng the en1re energy industry ecosystem and in order to effec1vely implement and sustain security controls on industrial infrastructure, we re all reliant on a complex ecosystem of people (system vendors, project engineering contractors, process operators, IT service providers and maintenance/support personnel) who require a blended set of IT/Engineering/Cyber Security competencies - a skill- pool which is unique and scarce in today s marketplace. Developing and maintaining this workforce can be a challenge for any one organiza1on and that is why we support this collabora1ve effort to establish a community developed body of knowledge and cer1fica1on program for industrial cyber security. Tyler Williams Manager, PCD IT Security Solu<ons at Shell and Chair of the industry consor<um

"Protec1ng industrial control and automa1on systems from constantly evolving cyber security threats is a very challenging task shared by all involved stakeholders. The founda1on for any successful program is the people involved in developing, designing, opera1ng and maintaining these systems. We are therefore proud to be part of the crea1on of the first professional cer1fica1on program for industrial control system cyber security. The effort did not only result in a cer1fica1on program that will advance workforce development but it is also an industry commitment to improve the security of our cri1cal infrastructure." Markus Braendle Group Head of Cyber Security ABB, Zurich, Switzerland

Industrial Cyber Security Domains GICSP Cer<fica<on Objec<ves: A. ICS Architecture B. ICS Security Assessments C. ICS Security Monitoring D. Configura<on/Change Management E. Disaster Recovery and Business Con<nuity F. Incident Management G. ICS Security Governance and Risk Management H. Physical Security I. Industrial Control & Automa<on Systems J. ICS Modules and Elements Hardening K. Cyber Security Essen<als for ICS L. Access Management

GICSP Objec<ves Knowledge & Applica<on of the following: A. ICS Architecture 1. Field device architecture (e.g., relays, PLC, switch, process unit) 2. Defense in depth (e.g., layered defense, IDS sensor placement, security system architecture, virtualization) 3. External network communications (e.g., access points into SCADA/ICS systems, VPNs, vendor/third party access points, mobile devices, secure remote access, RDP, PC Anywhere, jump servers) 4. Network protocols (e.g., DNS, DHCP, TCP/IP) 5. Network segmentation (e.g., partitioning, segregation, zones and conduits, reference architectures, network devices and services, data diodes, DMZs, test and development environments) 6. Wireless security (e.g., WIFI, wireless sensors, wireless gateways, controllers) 7. Communication medium (e.g., VSAT, RF, cell, microwave) 8. Industrial protocols (e.g., modbus, modbus TCP, DNP3, Ethernet/IP, OPC) B. ICS Security Assessments 1. Security assessment (e.g., risk, criticality, vulnerability, attack surface analysis, supply chain) 2. Penetration testing and exploitation 3. Security testing tools (e.g., packet sniffer, port scanner, vulnerability scanner) 4. Device testing (e.g., communication robustness, fuzzing) C. ICS Security Monitoring 1. Security monitoring and logging 2. Event monitoring and logging 3. Network monitoring and logging 4. Archiving D. Configura<on/Change Management 1. Change management, baselines, equipment connections, and configuration auditing 2. Patches (preparation, approval, scheduling, remediation, mitigation) 3. Software reloads and firmware management

GICSP Objec<ves Knowledge & Applica<on of the following: E. Disaster Recovery and Business Con<nuity 1. System backup (e.g., security, data sanitization, disposal, redeploying, testing backups, operational procedures) 2. Site redundancy (e.g., hotsite, off-site backup) 3. System restoration (e.g., full, partial, procedures, spares) F. Incident Management 1. Incident response (e.g., recording/reporting, forensic log analysis, containment, incident response team, root cause analysis, eradication/quarantine) 2. Incident recognition and triage (e.g., log analysis/event correlation, anomalous behavior, intrusion detection, egress monitoring, IPS) 3. Incident remediation/recovery G. ICS Security Governance and Risk Management 1. Security policies and procedures development (e.g., exceptions, exemptions, requirements, standards) 2. Risk management (e.g., PHA/hazop usage, risk acceptance, risk/mitigation plan, operational impact assessments) 3. Global security standards, practices, and regulations (i.e., IEC/ISA 62443, NIST 800-82, ISO 2700xx, compliance gap analysis) 4. Security life cycle management (e.g., acquisition and divestiture, procurement, commissioning [e.g., secure deployments], maintain, decommission) H. Physical Security 1. Physical security (e.g., locked cabinets, locked switches, barbed wire, facility access control, surveillance, physical individual)

GICSP Objec<ves Knowledge & applica<on of the following: I. Industrial Control Systems 1. Basic process control systems (e.g., RTU, PLC, DCS, SCADA, metering/telemetry, ethernet I/O, buses, Purdue (ISA 95)) 2. Safety and protection systems (e.g., SIS, EMS, leak detection, FGS, BMS, vibration monitoring) 3. Critical infrastructure sector and ICS applications (e.g., chemical, waste water, water, electricity, oil and gas, manufacturing, transportation) J. ICS Modules and Elements Hardening 1. Antimalware implementation, updating, monitoring, and sanitization 2. End point protection including user workstations and mobile devices (e.g., anti-virus, white listing) 3. Network security/hardening (e.g., switchport security) 4. Application security (e.g., database security) 5. Removable media (e.g., USB device security, optical media, external drives) 6. OS security (unix/linux, windows, least privilege security, virtualization) 7. Embedded devices (e.g., PLCs, controllers, RTU, analyzers, meters, aggregators, security issues, default configurations, firmware) K. Cybersecurity Essen<als for ICS 1. Attacks and incidents (e.g., man in the middle, spoofing, social engineering, denial of service, denial of view, data manipulation, session hijacking, foreign software, unauthorized access) 2. Security tenets (e.g., CIA, non-repudiation, least privilege, separation of duties) 3. Threats (e.g., nation states, general criminals, inside and outside malicious attackers, hacktivists, inside non-malicious) 4. Availability (e.g., health and safety, environmental, productivity) 5. Security awareness programs (e.g., employees/management, sensitive data identification, protecting information) 6. Cryptography (e.g., encryption, digital signatures, certificate management, PKI, public versus private key, hashing, key management, resource constraints)

GICSP Objec<ves Knowledge & applica<on of the following: L. Access Management 1. User access management (e.g., user accounts, service accounts, temporary accounts, default accounts, guest accounts, account expiration, access control list, access reconciliation) 2. Directory services (e.g., active directory, LDAP) 3. Access control models (e.g., MAC, DAC, role-based)

GICSP Web Page hpp://www.giac.org/cer&fica&on/global- industrial- cyber- security- professional- gicsp

Training for GICSP SANS ICS410 Security Essen&als maps to the GISCP Offered in a live instructor led class or on- line, computer based training (On- site group training will be subject to instructor availability) Training includes lab simula&ons which support real- life applica&on of tools and techniques to support concepts tested by the GICSP

Curriculum Road Map Advanced & Role- based ICS Training & Future Cer&fica&ons: HOSTED SCADA Security ICSTBD Future SANS ICS focused class TBD Founda&onal Training & Cer&fica&on: Security awareness & learning: STH End User These 25 modules cover the broadest set of users and a wide range of cybersecurity awareness topics STH U<lity These 7 modules focus on cybersecurity awareness and NERC CIP training program needs for por&ons of the electricity industry in North America STH Engineer These 14 modules focus on individuals who support engineer, or interact with automa&on and control systems

What Students are Saying about ICS410 This is a great course that dis1nguishes the challenges and integra1on points for ICS and Tradi1onal IT security posture. The instructors provide in- depth real world knowledge and experience to the material to make it ac1onable within the arendees corporate environment. Rob Oates GDIT Provides good baseline info for both IT and OT SME s. Daryl Haegley DOD This is a great intro course for anyone taking security seriously in an ICS environment. Shaun Curry SMSD

See you in the control room!