Update On Smart Grid Cyber Security



Similar documents
Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Obtaining Enterprise Cybersituational

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Cyber Security for NERC CIP Version 5 Compliance

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Cyber Security and Privacy - Program 183

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

How Much Cyber Security is Enough?

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cisco Security Optimization Service

The IBM Solution Architecture for Energy and Utilities Framework

THE FUTURE OF SMART GRID COMMUNICATIONS

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Advanced Threat Protection with Dell SecureWorks Security Services

How To Protect Your Network From Attack From A Network Security Threat

Dr. György Kálmán

Cyber Security Risk Mitigation Checklist

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Panel Session: Lessons Learned in Smart Grid Cybersecurity

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

TUSKEGEE CYBER SECURITY PATH FORWARD

Requirements When Considering a Next- Generation Firewall

FIVE PRACTICAL STEPS

Enterprise Security Tactical Plan

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Injazat s Managed Services Portfolio

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Managed Security Services for Data

Security Coordination with IF-MAP

Cisco SAFE: A Security Reference Architecture

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Frontiers in Cyber Security: Beyond the OS

SDN and NFV in the WAN

Netzwerkvirtualisierung? Aber mit Sicherheit!

FREQUENTLY ASKED QUESTIONS

CYBER SECURITY. Is your Industrial Control System prepared?

Cisco Network Optimization Service

SANS Top 20 Critical Controls for Effective Cyber Defense

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

IBM QRadar Security Intelligence April 2013

Protecting Your Organisation from Targeted Cyber Intrusion

BlackRidge Technology Transport Access Control: Overview

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Bellevue University Cybersecurity Programs & Courses

Leveraging SDN and NFV in the WAN

Best Practices for Building a Security Operations Center

Risk Analytics for Cyber Security

ADVANCED KILL CHAIN DISRUPTION. Enabling deception networks

Enterprise Cybersecurity: Building an Effective Defense

Redefining MDM for a Smart Grid Enabled

future data and infrastructure

QRadar SIEM 6.3 Datasheet

Advanced Threats: The New World Order

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Cyber Threat Intelligence Move to an intelligencedriven cybersecurity model

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

Prevent cyber attacks. SEE. what you are missing. Netw rk Infrastructure Security Management

IBM Security IBM Corporation IBM Corporation

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Cyber Security Metrics Dashboards & Analytics

Defending Against Data Beaches: Internal Controls for Cybersecurity

PALANTIR CYBER An End-to-End Cyber Intelligence Platform for Analysis & Knowledge Management

CyberArk Privileged Threat Analytics. Solution Brief

Critical Controls for Cyber Security.

Secure Cloud-Ready Data Centers Juniper Networks

Cisco Advanced Services for Network Security

Understanding SCADA System Security Vulnerabilities

I. TODAY S UTILITY INFRASTRUCTURE vs. FUTURE USE CASES...1 II. MARKET & PLATFORM REQUIREMENTS...2

Intelligence Driven Security

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Cyber Watch. Written by Peter Buxbaum

Information Technology Policy

A Model-based Methodology for Developing Secure VoIP Systems

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

Cyber Security Seminar KTH

SECURITY FOR TODAY S PHYSICAL NETWORK AND DATA TRAFFIC

Getting Started with the iscan Online Data Breach Risk Intelligence Platform

Windows Embedded Security and Surveillance Solutions

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

IBM Endpoint Manager Product Introduction and Overview

Benefits. Product Overview. There is nothing more important than our customers. DATASHEET

NitroView. Content Aware SIEM TM. Unified Security and Compliance Unmatched Speed and Scale. Application Data Monitoring. Database Monitoring

Enabling the SmartGrid through Cloud Computing

OPC & Security Agenda

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

Transcription:

Update On Smart Grid Cyber Security Kshamit Dixit Manager IT Security, Toronto Hydro, Ontario, Canada 1

Agenda Cyber Security Overview Security Framework Securing Smart Grid 2

Smart Grid Attack Threats Energy control systems are subject to targeted cyber attacks. Potential adversaries have pursued progressively devious means to exploit flaws in system components, telecommunication methods, and common operating systems found in modern energy systems with the intent to infiltrate and sabotage vulnerable control systems. Sophisticated cyber attack tools require little technical knowledge to use and can be found on the Internet, as can manufacturers technical specifications for popular control system equipment. Source: Roadmap to Secure Control Systems in the Energy Sector, The Department of Homeland Security and US Department of Energy 3

Critical Infrastructure Security Challenges Cyber attacks can change every 30 60 seconds Requires integrated, quick response system. Convergence of traditionally isolated control systems Cyber vulnerabilities introduced to critical systems Mitigation strategies not as easy as regular IT Utilities tend to work internally in silos Prevents rapid exchange of identity information between different departments 4

The Landscape is Changing Around Us "We have information, from multiple regions outside the United States, of cyber intrusions into utilities, followed by extortion demands... We have information that cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. We do not know who executed these attacks or why, but all involved intrusions through the Internet." Central Intelligence Agency, 2008 Did this include any Smart Grid elements??? 5

Cyber Security Drivers Windows, Unix, Proprietary Vulnerable protocols Control systems not designed with security Use of COTS hardware and software Increased Attack Surface Increasing interconnecti on and Integration Performance metrics, peer topeer Larger Code bases Increasingly complex systems Increased Risk to Operations New customer touch points 2 way control systems Time of Use; Billing; AMI; Real time load shedding 6

Access Points: Numerous and Diverse Due to convergence, the number of access points has increased: Access from the Internet Access from corporate users Access into SCADA LAN (keep operators happy) Access from the vendors Access from the upstream providers Metering system connects directly to corporate in many cases Customer care and billing requires maximum integrity Methods for communications is in open source Defense in depth is the only real countermeasure Zones Conduits Layered defense modeling Unified Threat Management and Anomaly Detection 7

Emerging Issues Current Smart Grid/Meter solution is prescriptive for only oneway control traffic But what about meters deployed with kill switch enabled? California PCT program can provide a tremendous foundation Future will migrate to 802.x communications How will THAT be secured? 802.15.4 proven to vulnerable to jamming (Jan 2009) How much more vulnerable will the system be? What can the vendor do to ensure security of Grid operation Proof of concept to get security keys from chipset (Feb 2009) Mobile worm can impact firmware in all meters in mesh grid (because it is smart ) What can the utility do to protect metering? More than simple IDS deployed to the meter level must include defining operational envelope Security Information and Event Monitoring (SIEM) must be cost effective, scalable, AND non intrusive to collection operations 8

Question How is Security Being Done? Has anyone looked into the cyber security issues of the Smart Meter system and Smart Grid? Yes, and it is not pretty How do we protect the control of the meters, our grid and the customer data? Delicate balance required How can cyber security be a value add to the customer? Meters and SG must communicate reliably AND securely to central location. But how do we enforce the mechanisms? (cell, analog, 802.x, BPL) 9

Current and Future Scenario 20 th Century Grid Electromechanical One way communication (if any) Built for centralized generation Radial topology Few sensors Blind Manual restoration Prone to failures and blackouts Check equipment manually Emergency decisions by committee and phone Limited control over power flows Limited price information Few customer choices 21 st Century Smart Grid Digital Two way communication Accommodates distributed generation Network topology Monitors and sensors throughout Self monitoring Semi automated restoration, and eventually self healing Adaptive protection and islanding Monitor equipment remotely Decision support systems, predictive reliability Pervasive control systems Full price information Many customer choices Source: The Emerging Smart Grid

Current Issues in Smart Grid Cyber Security Need to protect Time of Use (TOU) data and access from nonauthorized users Need to protect meters from being abused as control channel into grid operations Need to protect future two way communications for meter activity Need to ensure future control capability is secure 11

Smart Grid Characteristics,Technology & Security Self healing Empowers and incorporates Services and Applications Using the data in new ways the consumer Resilient to physical and cyber attacks Provides power quality needed by 21 st century Business Integration Integrating the data with the rest of the business Centralized Control Using the data for visualization and control Physical and Logical Security users Accommodates a wide First Level Integration Collecting the data variety of generation options Fully enables maturing electricity markets Optimizes assets Field Communication Moving the data through the build of networks Sensors Monitoring and detecting the data 12

Smart Grid Security Components Cyber security policy and procedures Security policy Standard operating procedures (OPSEC) Guidelines Smart Grid Security Cyber security Planning Strategic planning Tactical planning Security Measurements Architecture and technology Network segmentation Tightly controlled communication Identity and access management Threat management Vulnerability management Policy Planning Management & Technology Services Services Certification and Accreditation Cyber Security Framework Risk and Security Measurements Security KPI and KRI Real time Security Dashboard 13

Smart Grid Security Strategy Enterprise Defence in Depth Depth Strategy Security Assessments Asset Management Network & Application security Education and Awareness Program 14

Identity and Access Management Remote Access SCADA Resources U N I V E R S I T Y Business Applications User Strong Authentication Identity & Access Management Physical Access Provisioning HR Approval BU Approval Entry into ERP Generate Global UID Business HR/Purchasing Worker Requisition Form Provisioning Request Worker Requisition Form De Provisioning + Provisioning Request Worker Termination De Provisioning Request On boarding Role change Off boarding / termination Employees/Contractors/ Temps /Students/Third Parties/Vendors Identity Business Processes 15

Measuring Security Events Sources OS SCADA Database Firewall/AV//IPS/ IDS/Web Security Smart Grid VPN Applications IAM Mitigation Security Policy & Procedure Refinement KRI Prevent Respond Correct Security Dashboard KVI KPX KPI Measurements Card NBS Measure 16

Measuring Security : Components OS Risk Dashboard SCADA Security Dashboard Database Incident Analysis Compliance Automation Firewall Respond Linux VPN Forensics Correct Mitigation Centralized Event Management Real time visualization Ops/ Security Command Centre Applications Prevent Reporting & Analytics Compliance IAM Detect Card Events Normalization Aggregation Correlation Network Scanner 17

Building Security In by Defence in Depth Customer/Field Communication Office Equipment Intelligence Data Advanced Communications Data Intelligent Processes and Applications Advanced Power Flow Control Information Distributed Energy CYBER SECURITY People Customer Energy Management Knowledge Grid Intelligence Intelligence Intelligent Business Decisions GRID SECURITY INTEGRATION 18

Expected Gaps and Solution Paths SECURITY GAPS Poor protection of critical data Inadequate reliability of collection mechanism Inadequate security of transmission data Poor redundancy of Storage Protection Insufficient device security Non scalable Security Solutions Insufficient security for Customer Presentation Insufficient security for Convergence with SCADA and Corporate POSSIBLE SOLUTION PATHS Local encryption; access controls; access management Communication authentication and access control Message digests, point of origin validation, intrusion detection, proprietary encryption Secure network topology Monitors, tamper proof devices, integrity checking, self healing networks Standards, regulatory efforts, vendor groups Lifecycle integrity, secure web access, server protection, firewalls, IDS Adaptive protection, zones/conduits, multi tier security, deep packet inspection Commercial solutions can be leveraged to support budget and time constraints but assessments provide tactical understanding!

Q & A Contact: Kshamit Dixit Toronto Hydro kdixit@torontohydro.com 416 42 3343 20