The Electronic Arms Race of Cyber Security 4.2 Lecture 7



Similar documents
Adobe Systems Incorporated

How to complete the Secure Internet Site Declaration (SISD) form

Where every interaction matters.

05.0 Application Development

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

Development. Resilient Software. Secure and. Mark S. Merkow Lakshmikanth Raghavan. CRC Press. Taylor& Francis Croup. Taylor St Francis Group,

Magento Security and Vulnerabilities. Roman Stepanov

OWASP Top Ten Tools and Tactics

SAST, DAST and Vulnerability Assessments, = 4

Industrial Security for Process Automation

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Overview of the Penetration Test Implementation and Service. Peter Kanters

Attack Vector Detail Report Atlassian

Computer System Security Updates

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

Columbia University Web Security Standards and Practices. Objective and Scope

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Vulnerability Analysis of Energy Delivery Control Systems

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

SQuAD: Application Security Testing

WEB SECURITY CONCERNS THAT WEB VULNERABILITY SCANNING CAN IDENTIFY

FINAL DoIT v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

The Top Web Application Attacks: Are you vulnerable?

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

WHITE PAPER FORTIWEB WEB APPLICATION FIREWALL. Ensuring Compliance for PCI DSS 6.5 and 6.6

OWASP and OWASP Top 10 (2007 Update) OWASP. The OWASP Foundation. Dave Wichers. The OWASP Foundation. OWASP Conferences Chair

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Securing Your Web Application against security vulnerabilities. Ong Khai Wei, IT Specialist, Development Tools (Rational) IBM Software Group

Web Application Report

WHITE PAPER. FortiWeb Web Application Firewall Ensuring Compliance for PCI DSS 6.5 and 6.6

SOFTARE SECURTY OF WEB APPLICATION AND WEB ATTACKS

Reducing Application Vulnerabilities by Security Engineering

Table of Contents. Page 2/13

Data Breaches and Web Servers: The Giant Sucking Sound

SERENA SOFTWARE Serena Service Manager Security

Web Application Report

How To Fix A Web Application Security Vulnerability

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

Passing PCI Compliance How to Address the Application Security Mandates

ABB s approach concerning IS Security for Automation Systems

Web Application Vulnerability Testing with Nessus

Cloud Security Framework (CSF): Gap Analysis & Roadmap

BAE Systems PCI Essentail. PCI Requirements Coverage Summary Table

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Using Free Tools To Test Web Application Security

Industrial Security Solutions

Essential IT Security Testing

Web applications. Web security: web basics. HTTP requests. URLs. GET request. Myrto Arapinis School of Informatics University of Edinburgh

Sitefinity Security and Best Practices

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Best Practices for DanPac Express Cyber Security

Web App Security Audit Services

Rational AppScan & Ounce Products

An Analysis of the Capabilities Of Cybersecurity Defense

Web Plus Security Features and Recommendations

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Web application security

1.3 Prohibit Direct Public Access - Prohibit direct public access between the Internet and any system component in the cardholder data environment.

Six Essential Elements of Web Application Security. Cost Effective Strategies for Defending Your Business

Development Processes (Lecture outline)

Protecting Your Organisation from Targeted Cyber Intrusion

elearning for Secure Application Development

Common Cybersecurity Vulnerabilities in Industrial Control Systems. May 2011

Patch management and security. updates SIMATIC. Process Control System PCS 7 Patch management and security updates. Preface 1

GE Measurement & Control. Cyber Security for Industrial Controls

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Web Application Security

Cloud Security Framework (CSF): Gap Analysis & Roadmap

Security Assessment through Google Tools -Focusing on the Korea University Website

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

IT Security Conference Romandie - Barracuda Securely Publishing Web Application a field dedicated to expert only?

SCADA SYSTEMS AND SECURITY WHITEPAPER

External Supplier Control Requirements

DeltaV System Cyber-Security

NUS InfoComm Security Landscape

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

Cloud Security:Threats & Mitgations

What is Really Needed to Secure the Internet of Things?

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

DFW INTERNATIONAL AIRPORT STANDARD OPERATING PROCEDURE (SOP)

MANAGED SECURITY TESTING

IT Networking and Security

Innovative Defense Strategies for Securing SCADA & Control Systems

Penetration Test Report

Remote Services. Managing Open Systems with Remote Services

Keyword: Cloud computing, service model, deployment model, network layer security.

Cracking the Perimeter via Web Application Hacking. Zach Grace, CISSP, CEH January 17, Mega Conference

Transcription:

The Electronic Arms Race of Cyber Security 4.2 Lecture 7 ISIMA Clermont-Ferrand / 04-February 2011 Copyright 2011 Dr. Juergen Hirte

List of Content Why Process Automation Security? Security Awareness Issues Stuxnet & Co. How to Protect Industrial Environments Risk Mitigation Concepts Defense-in-Depth Strategy DHS 2010 Recommendations ISA-99 Specifications Industrial Security Configurations Examples Top Software Development Issues Tools, Process etc. Process Automation Security Initiatives & Organizations ENISA, CERT, INL-Lab Conclusions

(Cyber-) Security Awareness Concerns (some reasons) Plant Management and Operators set highest priorities on production and plant safety and less on system-protection measures Vendors are primarily focusing on system features, development roadmaps and plant services Security problems usually are not visible during normal operation and testing Lack of expertise : system administrators and developers are not sensitive and not skilled enough in security technologies The high complexity of the subject (concept/design, implementation, validation, operation procedures & logistics)

Stuxnet & Co. video Reuters : BOSTON 19-July 2010

Microsoft Protection Center Virus Tracking Report

US-CERT 2010-07-15 This is the US-CERT stuxnet alert report! III. Solution Apply an update. This issue is addressed in Microsoft Security Bulletin MS10-046. Also consider the following workarounds:

US-CERT is charged with providing response support and defense against cyber attacks for the Federal Civil Executive Branch (.gov) US-CERT is charged with information sharing and collaboration with state and local government, industry and international partners. US-CERT interacts with federal agencies, industry, the research community, state and local governments, and others to disseminate reasoned and actionable cyber security information to the public. Information is available from the US-CERT web site, mailing lists, and RSS channels.

How to Cyber-Protect an Industrial Plant?

Defense In-Depth-Strategy (IDS) : Key Elements (I/II) PC Network Management Virus Scanning Software on all PCs (periodically, remotely) Central Release Management & Deployment of Security Patches and Software Updates Traffic control (load monitoring, pattern matching, statistical methods) User Account Management Role-based access-control (admin, operator, maintenance, ) Login-monitoring Potential Threat Control System

Defense In-Depth-Strategy (IDS) : Key Elements (II/II) Secure Architectures Firewalls to control communication into and out of security zones Demilitarized Zones (DMZs) to isolate Network-Servers against external network VPN Communication (secure communication across a non-secure network (Internet) Corporate Security Policies and Procedures (Training, Assessments) Physical Security (building access control) Potential Threat

Traditional Isolation of Corporate and Control Domains More or less physically isolated Vulnerable data transmission paths Internal risks between office workstations and high-sensitive data servers

Prepared by Idaho National Laboratory : External Report # INL/EXT-06-11478 (2006) US-CERT : Control Systems Security Program (CSSP) Secure Architecture Design ( IDS-Concept ) Firewall protection Firewall plus dedicated protection server isolation plus through isolation DMZ-sub-net through DMZsub-net Control System LAN & Corporate LAN now connected!

People who develop June 2010 Catalog of Standards Control! System Security (I/II)

June 2010 Catalog of Control System Security (II/II)

ISA-99 : Industrial Automation and Control System Security (I/II)

ISA-99 : Industrial Automation and Control System Security (II/II)

Process Control System PCS7 Industrial Security Scalance S, X, W

Source : Siemens Scalance Manual Scalance : Secure Network Configuration (Example) Security Configuration Tools Integrated firewall, authentication, data encryption,

SIMATIC S7 Communication The most secure communication is obviously via peer-topeer and without any peripheral network S7 MPI Interface But. how about the integrity of your PC??? B-S-K Industrievertretungen

Automation System Communication Standards Open Communication is common State-of-the-Art S7-mEC embedded controller S7-1200 Industrial Ethernet

SANS TOP 25 Report 2010 Software Error Category: Insecure Interaction Between Components Information Security Training, Certification & Research Institute [1] CWE-79: Failure to Preserve Web Page Structure ('Cross-site Scripting') Cross-site scripting (XSS) is one of the most prevalent, obstinate, and dangerous vulnerabilities in web applications...if you're not careful, attackers can... [2] CWE-89: Failure to Preserve SQL Query Structure (aka 'SQL Injection') If attackers can influence the SQL that you use to communicate with your database, then they can [4] CWE-352: Cross-Site Request Forgery (CSRF) With cross-site request forgery, the attacker gets the victim to activate a request that goes to your site. Thanks to scripting and the way the web works in general, the victim...more >> [8] CWE-434: Unrestricted Upload of File with Dangerous Type You may think you're allowing uploads of innocent images...more >> [9] CWE-78: Failure to Preserve OS Command Structure (aka 'OS Command Injection') When you invoke another program on the operating system, but you allow untrusted inputs to be fed into the command string that you generate for executing the program, then you are inviting attackers...more >> [17] CWE-209: Information Exposure Through an Error Message If you use chatty error messages, then they could disclose secrets to any attacker who dares to misuse your software. The secrets could cover a wide range of valuable data...more >> [23] CWE-601: URL Redirection to Untrusted Site ('Open Redirect') While much of the power of the World Wide Web is in sharing and following links between web sites, typically there is...more >>

http://www.owasp.org Top 10 Critical Web Application Security Risks A1 Injection A2 Cross Site Scripting (XSS) A3 Broken Authentication and Session Management A4 Insecure Direct Object References A5 Cross Site Request Forgery (CSRF) A6 Security Misconfiguration (NEW) A7 Failure to Restrict URL Access A8 Invalidated Redirects and Forwards (NEW) A9 Insecure Cryptographic Storage A10 - Insufficient Transport Layer Protection

Industrial Cyber-Security Development Process, Assessments and Code Analysis (Examples) http://www.isasecure.org http://www.microsoft.com/security/sdl/learn/default.aspx http:// www.fortify.com http://www.wurldtech.com

INL : External Report # INL/EXT-06-11478 Here you can learn about some constraints to your possible software security IT versus Process Control Security : Different solutions! views

2005-2010 by the European Network and information Security Agency (ENISA) Organizations (Europe) : ENISA ENISA -the European Network and Information Security Agency ENISA is helping the European Commission, the Member States and the business community to address, respond and especially to prevent Network and Information Security problems. ENISA is as a body of expertise, set up by the EU to carry out very specific technical, scientific tasks in the field of Information Security. The Agency also assists the European Commission in the technical preparatory work for updating and developing Community legislation in the field of Network and Information Security. http://www.enisa.europa.eu

CERT Coordination Center (CERT/CC) The CERT Coordination Center (CERT/CC), arguably the most widely known group within the CERT Program, addresses risks at the software and system level. CERT focus. Identifying and addressing existing and potential threats Incidentally notifying system administrators and other technical personnel of these threats Coordinating with vendors and incident response teams world wide to address the threats. Security Assessments, Workshops, Audits, Prevention programs

Idaho National Laboratory (INL)

INL@Work

Conclusions Security must be mandatory part of the Software- and Hardware- Engineering Education at Universities and Engineering Schools Industry (operations and vendors) must establish adequate organization and procedures, e.g. Establish appropriate roles & procedures in your Product Lifecycle Management Process (most relevant for vendors of industrial components) Establish appropriate policies Have own specialists for requirements, implementation, testing etc. Continuous management support Work together with Standard Organizations & external consultants Frequent Assessments (internal, external audits) ; Certification Training & Education

Je vous remercie de votre attention!