Critical Infrastructure Security: The Emerging Smart Grid. Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn



Similar documents
An Evaluation of Security Posture Assessment Tools on a SCADA Environment

Standard CIP 007 3a Cyber Security Systems Security Management

Standard CIP Cyber Security Systems Security Management

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

BMC Client Management - SCAP Implementation Statement. Version 12.0

Cyber Security Compliance (NERC CIP V5)

D. Best Practices D.2. Administration The 6 th A

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

TRIPWIRE NERC SOLUTION SUITE

Summary of CIP Version 5 Standards

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

LogRhythm and NERC CIP Compliance

SCAP for VoIP Automating Configuration Compliance. 6 th Annual IT Security Automation Conference

CIP Cyber Security Electronic Security Perimeter(s)

A Very Incomplete Diagram of Network Attacks

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

NERC CIP VERSION 5 COMPLIANCE

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

A S B

How To Use A Policy Auditor (Macafee) To Check For Security Issues

Reclamation Manual Directives and Standards

Security Testing in Critical Systems

Vulnerability Testing of Industrial Network Devices

CTS2134 Introduction to Networking. Module Network Security

CS5008: Internet Computing

Secure Substation Automation for Operations & Maintenance

8. Firewall Design & Implementation

CIP Cyber Security Security Management Controls

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

The Importance of Cybersecurity Monitoring for Utilities

CS 356 Lecture 16 Denial of Service. Spring 2013

Penetration Testing with Kali Linux

Vulnerability Assessment and Penetration Testing

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

NERC Cyber Security Standards

Patching & Malicious Software Prevention CIP-007 R3 & R4

Description: Objective: Attending students will learn:

NERC CIP Compliance with Security Professional Services

Payment Card Industry (PCI) Executive Report 08/04/2014

INTRUSION DETECTION SYSTEMS and Network Security

CS2107 Introduction to Information and System Security (Slid. (Slide set 8)

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

CDM Vulnerability Management (VUL) Capability

Ovation Security Center Data Sheet

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Learn Ethical Hacking, Become a Pentester

Payment Card Industry (PCI) Data Security Standard

Information Shield Solution Matrix for CIP Security Standards

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Global Partner Management Notice

Nessus. A short review of the Nessus computer network vulnerability analysing tool. Authors: Henrik Andersson Johannes Gumbel Martin Andersson

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

Document ID. Cyber security for substation automation products and systems

IDS / IPS. James E. Thiel S.W.A.T.

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

Designing a security policy to protect your automation solution

How I Learned to Stop Worrying and Love Compliance Ron Gula, CEO Tenable Network Security

Installing and Configuring Nessus by Nitesh Dhanjani

FISMA / NIST REVISION 3 COMPLIANCE

Firewalls. Chapter 3

Protecting Critical Infrastructure

Payment Card Industry (PCI) Executive Report 10/27/2015

GE Measurement & Control. Cyber Security for NERC CIP Compliance

STATE OF NEW JERSEY IT CIRCULAR

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

Port Scanning and Vulnerability Assessment. ECE4893 Internetwork Security Georgia Institute of Technology

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

State of Minnesota. Office of Enterprise Technology (OET) Enterprise Vulnerability Management Security Standard

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

REDSEAL NETWORKS SOLUTION BRIEF. Proactive Network Intelligence Solutions For PCI DSS Compliance

Ovation Security Center Data Sheet

ensuring security the way how we do it

Introduction to Cyber Security / Information Security

Firewalls. Ingress Filtering. Ingress Filtering. Network Security. Firewalls. Access lists Ingress filtering. Egress filtering NAT

Sample Report. Security Test Plan. Prepared by Security Innovation

Implementing Firewalls for Modern Substation Cybersecurity

General Network Security

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Vulnerability Scan. January 6, 2015

Running a Default Vulnerability Scan SAINTcorporation.com

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

FortiGate IPS Guide. Intrusion Prevention System Guide. Version November

Cyber Security. Smart Grid

1 Scope of Assessment

Transcription:

Critical Infrastructure Security: The Emerging Smart Grid Cyber Security Lecture 5: Assurance, Evaluation, and Compliance Carl Hauser & Adam Hahn

Overview Assurance & Evaluation Security Testing Approaches Software Testing Standards and Compliance NERC CIP

Overview Assurance & Evaluation Security Testing Approaches Software Testing Standards and Compliance NERC CIP

Terminology Why Assurance and Evaluation? Need to ensure system security mechanisms operating as designed Assurance our estimate of the likelihood that a system will fail in a particular way Anderson Evaluation the process of assembling evidence that a system meets, or fails to meet, a prescribed assurance target Anderson

Overview Assurance & Evaluation Security Testing Approaches Software Testing Standards and Compliance NERC CIP

Security Testing Goals Network Discovery Techniques Port Scanning Network Monitoring Network Policy Analysis System Vulnerabilities Software Security Vulnerability Scanning Continuous Monitoring Static Analysis Dynamic Analysis Fuzz Testing Most security tools are dual purpose Attackers also use these techniques to find & exploit weaknesses

Network Monitoring 2) Sniff traffic to collect packets (Wireshark) Attacker 1) Access physical network (e.g., WiFi) 3) Search for useful information -software banners(products/versions) -authentication data (users, passwords, etc) -other sensitive information (email, http traffic) Target Network/Systems

System/Port Scanning System Scanning -search for all systems on a network -Ping sweep 4) Attacker List of systems on network 1) 3)...... Target Network 1.1.1.X 2) If system exists: -send ICMP Echo Response Else -send ICMP Dst. Host Unreachable Port Scanning -search system for open ports (services) -TCP Syn Scan -UDP Scan 3) 1)... Target System 2) If TCP port listening: -send TCP Syn/Ack Else -send TCP Reset 4) Attacker List of open ports And system properties (e.g., operating system)... 1.1.1.2

Vulnerability Scanning 2) 1) Attacker Vulnerability Scanner -database of vulnerability indictors, including: - Configurations (e.g., TLS) - Software versions - Vulnerabilities 3)... Target System 4) List of vulnerabilities, Example: -SSL v2 -Apache 2.2 -Shellshock

Security Assessment Concerns Many of the assessment techniques may cause issues when run on real system Consume network bandwidth Create connections to running services Examples: Ping sweep of SCADA systems in integrated circuits plant caused robotic arm to swing 180 degrees and destroy $50,000 of wafers Security test of natural gas utility caused lockup of SCADA system, shutting down pipeline for 4 hours Need non-intrusive security testing methods for online systems Source: NIST 800-82. Guide to Industrial Control Systems (ICS) Security.

Continuous Monitoring Need to frequently monitor the security of systems & networks Many previously discussed tools based on Provide incomplete information Maybe intrusive when used to real networks SCAP Security Content Automation Protocol suite of specifications that standardize the format and nomenclature by which security software products communicate security content, particularly software flaw and security configuration information Core Technologies OVAL Open Vulnerability and Assessment Language XML based language to communicate CVE Common Vulnerabilities and Exposures CVSS Common Vulnerability Scoring System CPE, CCE, XCCDF Major initiative in Federal Govt System 1 Analysis Tool Switch SCAP Agent Assessment Protocol System n http://csrc.nist.gov/publications/nistpubs/800-126-rev1/sp800-126r1.pdf

Network Policy Review Network security policy is enforced many many firewalls and routers Each has own ruleset and access control list Need to identify potential policy violations, misconfigurations. Analysis techniques Offline review of firewall rulesets Online probing of network to infer configurations Tools: NetAPT, Firemon FW Rules Security Policy Analysis Tool Packets Network

Overview Assurance & Evaluation Security Testing Approaches Software Testing Standards and Compliance NERC CIP

Static vs Dynamic Analysis Static Analysis Analyzes source code for vulnerabilities without actually executing More complete than sound Evaluates/analyzes many possible execution paths High false-positive rates Tools: Fortify, Coverity, Splint Dynamic Analysis Analyzes code by monitoring its execution Can identify errors at runtime More sound than complete Actually executes each path Low false positive rates Tools: Valgrind, Purify

Fuzz Testing Randomized fault injection Repeatedly inject invalid/random data into program to find fault Crash of the program usually signifies some sort of memory error (e.g., buffer overflow) Don t perform on live/operational system Inputs crossing trust boundary Network Packets File formats Shared memory Weaknesses: Usually poor code coverage Tools: JBroFuzz, SPIKE Some commercial tools for smart grid protocols (e.g., DNP3, IEC 61850)

Common Criteria Protection profiles Security requirements for the system operating systems, access control systems, boundary control devices, intrusion detection systems, smartcards, key management systems, VPN client Evaluation Assurance Levels (EALs) The extent to which testing was performed: EAL1 Functionally Tested EAL4 Methodically Designed, Tested, and Reviewed Red Hat Enterprise Linux, Windows 7, Windows Server 2008 http://www.commoncriteriaportal.org/files/epfiles/st_vid10390-st.pdf EAL6 Semiformally Verified Design and Tested Green Hills OS EAL7 Formally Verified Design and Tested

Overview Assurance & Evaluation Security Testing Approaches Software Testing Standards and Compliance NERC CIP

NERC CIP Standards CIP Critical Infrastructure Protection Compliance requirements for electric power grid Specifically the Bulk Electric System (BES) Proposed by NERC, signed by Federal Energy Regulatory Commission (FERC) NERC can issue fine of $1 million/day for non-compliant Based on periodic assessments of a utility s security Versions v3 Current v5 - Effective 4/1/16

BES Cyber Asset Classification What systems does NERC CIP apply to? v3 standards applied to Critical Cyber Assets Generating units (and control centers) above 1500MW Transmissions facilities (and control centers) operated over 500kV 300kV and interconnected with 3 or more other substations FACTS systems, if identified as critical by Interconnection Reliability Operating Limits (IROLs) Special Protection Systems (SPS), if identified as critical by Interconnection Reliability Operating Limits (IROLs) v5 - Bright Line Criteria to classify cyber assets based on violation risk factor (VRF) High Most control centers for reliability coordinators, balancing authorities, generator operator Medium Transmissions facilities over 500kV, or 200-499kV with interconnection with >2 lines,. SPS Low all other control systems 300MW UFLS, UVLS

NERC CIP: Key Requirements From v3 CIP-003-3 Security Management Controls R5.2 at least annually the access privileges to protected information to confirm that access privileges are correct CIP-005-2a Electronic Security Perimeters R2.1 use an access control model that denies access by default R2.2 enable only ports and services required for operations and for monitoring Cyber Assets within the Electronic R2.3 maintain a procedure for securing dial-up access to the Electronic Security Perimeter(s) CIP-007-2a System Security Management R1.1 create, implement, and maintain cyber security test procedures R2 implement process to ensure that only those ports and services required for normal emergency operations are enabled R3.1 assessment of security patches and security upgrades for applicability within thirty calendar days of availability R4.2 implement a process for the update of anti-virus and malware prevention signatures. The process must address testing and installing the signatures. R5 establish, implement, and document technical and procedural controls that enforce access authentication of, and accountability for, all user activity R5.1.3 review, at least annually, user accounts to verify access privileges R5.3 require and user passwords, subject to the following, six characters, combination of alpha, numeric and special characters and changed at least annually R6.3 maintain logs of system events related to cyber security R6.4 retain all logs specified in Requirement R6 for ninety calendar days R8.3 review of controls for default accounts