College of Technology



Similar documents
Data Security and Healthcare

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Small Firm Focus: A Practical Approach to Cybersecurity Friday, May 29 9:00 a.m. 10:15 a.m.

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

GE Measurement & Control. Cyber Security for NEI 08-09

Best Practices for PCI DSS V3.0 Network Security Compliance

Supplier Information Security Addendum for GE Restricted Data

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cybersecurity Health Check At A Glance

Industrial Security for Process Automation

How To Control Vcloud Air From A Microsoft Vcloud (Vcloud)

Enterprise Cybersecurity: Building an Effective Defense

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

This policy shall be reviewed at least annually and updated as needed to reflect changes to business objectives or the risk environment.

Cyber Security for NERC CIP Version 5 Compliance

Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis

NERC CIP VERSION 5 COMPLIANCE

Approved 12/14/11. FIREWALL POLICY INTERNAL USE ONLY Page 2

Keyfort Cloud Services (KCS)

One-Man Shop. How to build a functional security program with limited resources DEF CON 22

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

IT Security and OT Security. Understanding the Challenges

Critical Controls for Cyber Security.

IT INFRASTRUCTURE MANAGEMENT SERVICE ADDING POWER TO YOUR NETWORKS

Security Management. Keeping the IT Security Administrator Busy

Attachment A. Identification of Risks/Cybersecurity Governance

Computer and Network Security Policy

STREAM FRBC

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

DEVELOPING A CYBERSECURITY POLICY ARCHITECTURE

Log Management as an Early Warning System

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

ADM:49 DPS POLICY MANUAL Page 1 of 5

SANS Institute First Five Quick Wins

Firewall Audit Techniques. K.S.Narayanan HCL Technologies Limited

Network Security Policy

Managed Hosting & Datacentre PCI DSS v2.0 Obligations

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Nixu SNS Security White Paper May 2007 Version 1.2

CYBERSECURITY & EXPECTATIONS FOR INDEPENDENT GROCERS

BM482E Introduction to Computer Security

Security Policy for External Customers

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

A Look at the New Converged Data Center

March

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

Cybersecurity Governance Update on New FFIEC Requirements

Tech Titans: Lock it down, securing your Costpoint 7 deployments. Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518

Cyber Essentials Questionnaire

Security Controls for the Autodesk 360 Managed Services

SonicWALL PCI 1.1 Implementation Guide

MySQL Security for Security Audits

Information security controls. Briefing for clients on Experian information security controls

INCIDENT RESPONSE CHECKLIST

Top 20 Critical Security Controls

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Decrease your HMI/SCADA risk

13 Ways Through A Firewall What you don t know will hurt you

The Protection Mission a constant endeavor

Best Practices for DanPac Express Cyber Security

Cyber Security Seminar KTH

Firewall Design Principles Firewall Characteristics Types of Firewalls

Securing Data on Microsoft SQL Server 2012

Credit Cards and Oracle: How to Comply with PCI DSS. Stephen Kost Integrigy Corporation Session #600

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

California State Polytechnic University, Pomona. Desktop Security Standard and Guidelines

DeltaV System Cyber-Security

Attackers are highly skilled, persistent, and very motivated at finding and exploiting new vectors. Microsoft Confidential for internal use only

Policy on Connection to the University Network

University of Illinois at Chicago Health Sciences Colleges Information Technology Group Security Policies Summary

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

13 Ways Through A Firewall

The Cyber OODA Loop: How Your Attacker Should Help You Design Your Defense. Tony Sager The Center for Internet Security

NCS 330. Information Assurance Policies, Ethics and Disaster Recovery. NYC University Polices and Standards 4/15/15.

Cyber- Attacks: The New Frontier for Fraudsters. Daniel Wanjohi, Technology Security Specialist

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

CHIS, Inc. Privacy General Guidelines

Information Security Policy

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

PCI Data Security Standards (DSS)

Defending Against Data Beaches: Internal Controls for Cybersecurity

MS-55096: Securing Data on Microsoft SQL Server 2012

Configuring User Identification via Active Directory

Protect Your IT Infrastructure from Zero-Day Attacks and New Vulnerabilities

Everything You Wanted to Know about DISA STIGs but were Afraid to Ask

CYBER SECURITY. Is your Industrial Control System prepared?

SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP

Semiconductor Equipment Security: Virus and Intellectual Property Protection Guidelines Harvey Wohlwend harvey.wohlwend ismi.sematech.

TOP 10 CHALLENGES. With suggested solutions

ICANWK406A Install, configure and test network security

MUSC Information Security Policy Compliance Checklist for System Owners Instructions

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Transcription:

College of Technology

A recipe for success Securing Control Systems Must utilize security principles Must recognize system constraints Must understand system components

Recent Paths Ad Hoc Insert specific magic pixie dust here Reuse IT guidance It is an IT system after all (NOT) Tie to NIST or 20 top controls Combinations A little of each of the above

What is wrong with? Securing Control Systems A structured approach, like we have used for all preceding efforts tailored to Control Systems Hard Requires cooperation between control systems and IT security Only real path to success

Why IT best practices don t work out of the box Top 20 security controls Designed on premise of elements available in IT Authentication Access Control Automation Designed for modern IT, not legacy anything

Basic Approach Securing Control Systems Not a new method, we have done this before Basis for all solid original solutions Avoids the church of appliancology Built on security and system fundamentals Solution is one you control

Steps Systems Network Data flows Processes, People and Technology Management

Security Security is defined by objectives, not rules Rules are used to achieve objectives

Threat Modeling Securing Control Systems Structured assessments of all threats Communication tool to evaluate all threats and mitigations Utilizing Data Flows...

Data Flows What data goes where Network architectures do that

A beginning Who needs to talk to whom? HMI Historian OPC PLCs Engineering Workstation Corporate data needs

News Flash In today s world we don t get to control who is on the network

Network Ins and Outs Securing Control Systems Define what should come in Define what should go out Use firewalls designed for control systems Block everything else (explicit deny) Use an IDS to detect any variations

Quiz Network Architectures Network architectures exist to: A. Provide something for network architects to do

Quiz Network Architectures Network architectures exist to: A. Provide something for network architects to do B. Enable hyperconnectivity allow everything to talk to everything

Quiz Network Architectures Network architectures exist to: A. Provide something for network architects to do B. Enable hyperconnectivity allow everything to talk to everything C. Enforce security objective related communications

Quiz Network Architectures Network architectures exist to: A. Provide something for network architects to do B. Enable hyperconnectivity allow everything to talk to everything C. Enforce security objective related communications D. Give meaning to all the wires connecting things

Quiz Network Architectures Network architectures exist to: A. Provide something for network architects to do B. Enable hyperconnectivity allow everything to talk to everything C. Enforce security objective related communications D. Give meaning to all the wires connecting things

Network Architectures Think locally, not globally Securing Control Systems Global addressing is an unacceptable risk Define zones and conduits Define who needs to talk with whom Must have accurate network map of all connections Physical security Audit for correctness/rogue connections

Controlling Ins and Outs Mediate all ins and outs Securing Control Systems Firewalls (must be control system cognizant) Unidirectional gateways (when high security matters) IDS (employ to see who is actually talking) Monitor and audit Loss Prevention How do we know if data is leaving the system Accounts are not a panacea Should the CFO be able to perform critical transactions from the lobby?

Devices Inventory of all devices Only authorized code runs Software and versions (dependencies) White listing Configuration Control No default passwords Services and ports

Devices (continued) Securing Control Systems Access control define even if you can t enforce Admin privilege control Harden everything Anti virus USBs power only Physical access control Backups Logs collect and review

Systems Configuration Control Updates and patching No default passwords No un necessary services, ports or apps Only authorized code runs Software and versions (dependencies) White listing Auditing

Systems Access control define even if you can t enforce Admin privilege control Harden everything Anti virus USBs power only Physical access control Backups Logs collect and review

Why software matters Securing Control Systems Know all systems and dependencies Heartbleed Bash

Policies, Procedures and People These govern: IT Control systems All work for that matter They should differ between IT and Control System security functions Details matter here

Specific policies and Procedures Configuration management Specific to control systems, not IT systems Updates and patches No defaults Incident Response posture DRP/BCP for the control system Training Audits/pen tests

People Controls system people are from Mars IT security people are from Venus Would a sysadmin do X on a critical system? Would a control system engineer even know?

Management Support risk based security Controls system resources Control system cybersecurity operations Culture is everything Think Target, Home Depot And not enough JP Morgan Chase Plans for when fail comes to your doorstep

Recap Your system, you defined it as critical Understand it Understand its implications Own it, control it Details matter

What matters Network Devices Systems Policies and procedures Management This is how we have been securing systems since day 1

Questions Contact Art Conklin College of Technology waconklin@uh.edu

We are Technology