DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Similar documents
Network Cyber Security. Presented by: Motty Anavi RFL Electronics

Cyber Security for Power Utilities

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Operational Core Network

Innovative Defense Strategies for Securing SCADA & Control Systems

Virtual Privacy vs. Real Security

Secure Networks for Process Control

Campus LAN at NKN Member Institutions

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

DeltaV System Cyber-Security

8. Firewall Design & Implementation

Ovation Security Center Data Sheet

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

IT Security and OT Security. Understanding the Challenges

- Introduction to Firewalls -

Security Toolsets for ISP Defense

Secure Substation Automation for Operations & Maintenance

Network Security Administrator

Deploying Firewalls Throughout Your Organization

Network Instruments white paper

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Local Area Network with OpenFlow

SDN Architecture and Service Trend

What is Firewall? A system designed to prevent unauthorized access to or from a private network.

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

CMPT 471 Networking II

Injazat s Managed Services Portfolio

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Testing Software Defined Network (SDN) For Data Center and Cloud VERYX TECHNOLOGIES

Protecting Critical Infrastructure

SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Ovation Security Center Data Sheet

SDN AND SECURITY: Why Take Over the Hosts When You Can Take Over the Network

On-Premises DDoS Mitigation for the Enterprise

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

CTS2134 Introduction to Networking. Module Network Security

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Network Management System (NMS) FAQ

What would you like to protect?

ethernet services for multi-site connectivity security, performance, ip transparency

Industrial Security Solutions

JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA

Smart Substation Security

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SOFTWARE-DEFINED NETWORKING AND OPENFLOW

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Holistic View of Industrial Control Cyber Security

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Securing EtherNet/IP Using DPI Firewall Technology

IINS Implementing Cisco Network Security 3.0 (IINS)

Database Security, Virtualization and Cloud Computing

Achieving Truly Secure Cloud Communications. How to navigate evolving security threats

RuggedCom Solutions for

Smart Solutions for Network IP Migration

Securing Distribution Automation

Secure networks are crucial for IT systems and their

ETHERNET WAN ENCRYPTION SOLUTIONS COMPARED

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Game changing Technology für Ihre Kunden. Thomas Bürgis System Engineering Manager CEE

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Ethernet-based Software Defined Network (SDN) Cloud Computing Research Center for Mobile Applications (CCMA), ITRI 雲 端 運 算 行 動 應 用 研 究 中 心

John Ragan Director of Product Management. Billy Wise Communications Specialist

_Firewall. Palo Alto. How Logtrust works with Palo Alto Networks

Benefits of Network Level Security at the RTU Level. By: Kevin Finnan and Philippe Willems

Fundamentals of Windows Server 2008 Network and Applications Infrastructure

Symantec Enterprise Firewalls. From the Internet Thomas Jerry Scott

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Introduction of Intrusion Detection Systems

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

Implementing Cisco IOS Network Security

Firewalls & Intrusion Detection

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Building Secure Networks for the Industrial World

Solutions for LAN Protection

Recommended IP Telephony Architecture

Overview. Firewall Security. Perimeter Security Devices. Routers

INTRODUCTION TO FIREWALL SECURITY

74% 96 Action Items. Compliance

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

How Secure is Your SCADA System?

HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT

IP/MPLS. Marios Parperis - Alcatel-Lucent Energy Systems Integration Division. October Alcatel-Lucent 2010 All Rights Reserved

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

WHITE PAPER. The Need for Wireless Intrusion Prevention in Retail Networks

A Mock RFI for a SD-WAN

Transcription:

DNP SCADA to SCADA Over : Standards, Regulations Security and Best Practices Earl Emerson, Director Systems Engineering RAD Data Communications 2014 Utilities Telecom Council of Canada

Motivations for Migration to /Packet Decreasingly available TDM WAN networks Scalability of packet networks Mature packet technology Low cost packet technology Modern RTU/IEDs based on packet Aged equipment 2

Traditional Network Architecture Remote Site A RTUs T1 Line Multiplexer DS-3/OC-3 TDM Network Control Room Multiplexer Remote Site N RTUs T1 Line Multiplexer 3

DNP Migration to /Packet Challenges Incremental vs forklift Costs Network technologies Security concerns 4

Incremental Migration with Terminal Server Remote Site A RTUs T1 Line Multiplexer Terminal Server DS-3/OC-3 TDM Network Control Room Multiplexer Remote Site N RTUs T1 Line Multiplexer 5

Incremental Migration with Terminal Server Remote Site A RTUs TDM PSN Network Terminal Server Remote Site B RTUs Terminal Server Control Room DS-3/OC-3 TDM Network T1 Line Remote Site N RTUs Multiplexer Multiplexer 6

Risks Introduced by Migrating to Packet As DNP3 is used at critical infrastructure areas, handling real time processes, designated cyber security measures should be taken to protect from tampering with the process flow The protocol itself has no security measures like encryption or authentication The SCADA networks at which DNP3 is key in, are no longer maintained in closed LAN environments but are large inter-site networks, sometimes using public clouds as the medium. 7

The Potential Impact of Successful Cyber Attacks Change in a system, operating system, or application configuration Change in programmable logic in PLCs, Outstations, or other controllers Misinformation reported to operators Tampering with safety systems Information theft Information alteration 8

Malicious Cyber Attack A hacker might retrieve the Outstation address and make configuration changes on it,corrupting its readings The effect on grid management system is critical. 9

Network Selection DOES Matter Some packet protocols are easier than others to breach Attacks can be initiated on both the control and data planes Especially susceptible are packet protocols who do not provide source authentication, have the ability to provide dynamic routing and those removing source information these include and MPLS More static rigid networks that require NMS authentication for routing and provide a universal address space with source authentication are more resistant these include SONET and Ethernet 10

Examples of Attacks to /MPLS Control plane attacks: DoS attack on the control plane: could cause nodes to reboot and network reconvergance Control Plane Corruption: Feeding erroneous/malicious information to control plane causing snooping, packets falling of the edge or network loops Data plane attacks: Plane vanilla DoS attacks Snooping of network resources Masquerading 11

Defense In Depth Layered Protection Standard Firewall, L2-L4 Filters and Encryption Selecting a security robust network technology (e.g. Ethernet) Distributed Application Aware Firewall Malware Protection Perimeter Network Protection 12

Carrier Ethernet Network Security Impervious to Control/Signaling attacks No signaling/control plane Provides Source Authentication Universal Address Space (MACs) 802.1X standard for source authentication Resistant to Snooping/Scouting L2 filtering Host granular at a universal level 13

Distributed Firewall Distributed firewall concept, allowing per port activation Minimum addition to network latency In-depth packet inspection DNP3 DNP3 SCADA Outstation Control Center Sub station 14

Distributed Firewall Detailed set of rules between the SCADA and an Outstation L2 filtering to allow traffic only between the SCADA and Server MAC addresses L3 filtering to allow traffic only between the SCADA and Server addresses Validation of MAC addresses Validation of addresses DNP3 DNP3 Violation Legit SCADA Packet drop (optional) Log Alert Packet allowed SCADA MAC MAC 15

Distributed Firewall Detailed set of rules between the SCADA and an Outstation L4 filtering to validate session flow between the SCADA and Server addresses Validation of TCP Port direction Dst port 20000 DNP3 Violation Legit DNP3 Src port 20000 SCADA Packet drop (optional) Log Alert Packet allowed Outstation MAC MAC 16

Distributed Firewall Detailed set of rules between the SCADA and an Outstation Link Addresses LA validation, verifying the allowed Outstation is addressed Validation of Outstation ASDU Src link address Dst link address DNP3 Violation Legit DNP3 Src link address Dst link address SCADA Packet drop (optional) Log Alert Packet allowed Outstation MAC MAC 17

Distributed Firewall Detailed set of rules between the SCADA and an Outstation Function code validation Group ID validation Objects validation Validation of function code & group id Function code messages DNP3 Violation Legit DNP3 Reply to allowed function codes SCADA Packet drop (optional) Log Alert Packet allowed Outstation MAC MAC 18

Firewall Modes of Operation Controlled integration of firewall system is important to avoid unnecessary down time to the live process Firewall Simulation mode Traffic is inspected but not blocked Violations are logged and presented visually 19

Firewall Modes of Operation Packet drop mode for ad hoc blocking Firewall Protect mode. Traffic is inspected and either allowed or blocked. Violations are logged and presented visually Traps are sent to northbound management system Email notifications 20

Firewall Modes of Operation Ease of integration of firewall system is important to reduce customer effort Learning mode Traffic is learned and a tentative firewall rules is suggested 21

22

23

Summary Packet Networks are the future Migration Solutions exist Packet Networks Raise Security Questions Not All Network Technologies Equal Use of distributed application aware firewalls can further enhance security Technology is available today to defend against the multitude of threats 24