Special SCADA Overview (aka SCADA-Bowl )



Similar documents
Network Security - ISA 656 Review

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

13 Ways Through A Firewall

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Firewalls, Tunnels, and Network Intrusion Detection

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CS5008: Internet Computing

Secure SCADA Network Technology and Methods

13 Ways Through A Firewall What you don t know will hurt you

Secure Networks for Process Control

Recommended IP Telephony Architecture

Network Concepts. IT 4823 Information Security Concepts and Administration. The Network Environment. Resilience. Network Topology. Transmission Media

Where every interaction matters.

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Chapter 1 The Principles of Auditing 1

Holistic View of Industrial Control Cyber Security

ISACA rudens konference

RuggedCom Solutions for

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

How To Protect Your Network From Attack From A Hacker (For A Fee)

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Network Security Administrator

Malicious Network Traffic Analysis

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

Villains and Voice Over IP

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Detailed Description about course module wise:

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Local Area Networks. LAN Security and local attacks. TDC 363 Winter 2008 John Kristoff - DePaul University 1

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

SCADA Security Training

Implementing Cisco IOS Network Security

Joe Andrews, MsIA, CISSP-ISSEP, ISSAP, ISSMP, CISA, PSP Sr. Compliance Auditor Cyber Security

Own your LAN with Arp Poison Routing

Securing end devices

Security Technology White Paper

Defending Against Data Beaches: Internal Controls for Cybersecurity

CMPT 471 Networking II

SCADA/Business Network Separation: Securing an Integrated SCADA System

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Potential Targets - Field Devices

How To Secure A Voice Over Internet Protocol (Voip) From A Cyber Attack

A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals

Cybersecurity in a Mobile IP World

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security: A Practical Approach. Jan L. Harrington

Threats to be considered (1) ERSTE GROUP

Malicious Software Prevention for NERC CIP-007 Compliance: Protective Controls for Operating Systems and Supporting Applications

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

ITL BULLETIN FOR JANUARY 2011

Designing a security policy to protect your automation solution

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

TECHNICAL NOTE 01/02 PROTECTING YOUR COMPUTER NETWORK

VLANs. Application Note

IP Link Best Practices for Network Integration and Security. Introduction...2. Passwords...4 ACL...5 VLAN...6. Protocols...6. Conclusion...

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Configuring DHCP Snooping

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

Management Software. Web Browser User s Guide AT-S106. For the AT-GS950/48 Gigabit Ethernet Smart Switch. Version Rev.

IINS Implementing Cisco Network Security 3.0 (IINS)

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Exploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

What is a Firewall? A choke point of control and monitoring Interconnects networks with differing trust Imposes restrictions on network services

Safe Network Integration

Industrial Security for Process Automation

A Reality Check on Security in VoIP

Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Secure Substation Automation for Operations & Maintenance

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Securing DNS Infrastructure Using DNSSEC

Microsoft Office Communicator Web Access Security Guide

CompTIA Network+ (Exam N10-005)

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Hypervisor Security - A Major Concern

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

Mira Zafirovic-Vukotic, Roger Moore, Michael Leslie, Rene Midence, Marzio Pozzuoli, RuggedCom Inc.

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

AI Engine Rules June 2014

Innovative Defense Strategies for Securing SCADA & Control Systems

Lecture slides by Lawrie Brown for Cryptography and Network Security, 5/e, by William Stallings, Chapter 22 Firewalls.

TELE 301 Network Management. Lecture 18: Network Security

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Transcription:

Special SCADA Overview (aka SCADA-Bowl ) Matthew E. Luallen, Encari mluallen@encari.com

Game Plan Understanding the Risk (Known Examples of Vulnerabilities & Countermeasures) Critical Infrastructure Protection (Example Regulations) Simple Principles to Reflect Upon Risk, Key Takeaways, Q&A 2

What are the plays of the game? Vulnerabilities and Countermeasures

Man-in-the-Middle Attacks* (1 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer What can happen? Incorrect information is conveyed to the operator in a trusted manner Incorrect control settings are sent to the system in a trusted manner Control is completely taken over by attacker * Not to be considered as an exhaustive list of attacks and controls

Man-in-the-Middle Attacks* (2 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer Example Attacks Physically become in line to the data communication stream with a wiretap Wireless interception, transmission and alteration of emissions Physical cable cut or RF interference Example Security Controls Kevlar and emissions shielded network cable Vacuum sealed and protected physical cable runs Monitor physical link endpoint connection activity Redundant physical connectivity Protect data at rest with crypto Tempest shielding (e.g. Faraday) * Not to be considered as an exhaustive list of attacks and controls

Man-in-the-Middle Attacks* (3 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer Example Attacks MAC address spoofing of default gateway Elect to become the Spanning Tree Protocol root bridge Enable an unauthorized DHCP server Enable VLAN trunking utilizing the Dynamic Trunking Protocol (DTP) Example Security Controls Spanning Tree Protocol Root Bridge and BPDU Protection Port Security / MAC Address Protection ARPWatch / ARP Snooping DHCP Snooping VLAN and Dynamic Trunk Protection * Not to be considered as an exhaustive list of attacks and controls

Man-in-the-Middle Attacks* (4 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer Example Attacks Inject blackhole or incorrect routing table information Inject arbitrarily sourced, forged and spoofed IP packets Source route IP packets Example Security Controls Use static routes or mutually authenticated routing updates Disable IP source routing Perform IETF RFC 1918, 2827 ingress and egress network filtering Filter BOGON and unnecessary IP address space Use IP Security (IPSEC) protected payloads with ESP / AHP * Not to be considered as an exhaustive list of attacks and controls

Man-in-the-Middle Attacks* (5 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer Example Attacks DNS cache poisoning Web browser cookie eavesdropping and manipulation Web browser cross site scripting / cross site request forgery Digital certificate impersonation Generic TCP Session Hijack Example Security Controls Split DNS within enclaves Static host tables Trusted website browsing Contained application environments Stringent review of certificate trusts Limiting interdependencies Mutual Strong Authentication * Not to be considered as an exhaustive list of attacks and controls

Man-in-the-Middle Attacks* (6 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer Example Attacks Virtual Machine guest to host escalation Meet in the middle system escalation (Remote) Remote Control Example Security Controls System isolation / enclaves Tight coupling Restricted Remote Interaction (e.g. Jump Hosts) * Not to be considered as an exhaustive list of attacks and controls

Man-in-the-Middle Attacks* (7 of 7) Attacker reads, inserts and modifies information without either party aware Physical Layer Datalink Layer Network Layer Application Layer System Layer Social Layer Example Attacks Phishing / Pharming / Whaling V-Phishing (Vishing) Telephone Calls Business Card / Name Dropping Identity Theft Example Security Controls Party or Request Validation Identity Validation and Monitoring CAN SPAM Act Truth in Caller ID Act Legislation Legislation to alter processing of Change of Address forms * Not to be considered as an exhaustive list of attacks and controls

What are the rules of the game? Critical Infrastructure Protection

Critical Infrastructure Federal Legal Requirements InformationTechnology: Federal Laws, Regulations, and Mandatory Standards for Securing Private Sector Information Technology Systems and Data in Critical Infrastructure Sectors, September 16, 2008 GAO Briefing 12

NERC CIP Reliability Standards (Regulated Requirements) 13

CIP Past FERC SMD Appendix G NERC UAS-1200 NERC 1300 NERC CIP 002-009 NERC CIP-001 FERC Order 693 FERC Staff Assessment FERC CIPS NOPR FERC Order 706 Influential Factors NE Blackout 2003 Aurora SANS CIA briefing News media in general

CIPS In A Nutshell Critical Infrastructure Protection Standards (CIPS) are intended to protect the following: Bulk Power System (Bulk Electric System) Critical Assets Control Centers, Transmission Subs, Generation Plants Critical Cyber Assets EMS, DCS, RTUs, IEDs, PLCs, Relays Decision Support Systems Critical Infrastructure Information Provide greater reliability through greater security and accountability

PENALTIES! The Cost of NERC CIP Non-Compliance Compromised reputation, potential loss of customers and business partners, Potentially a lot of money

International, National and Organizational Standards NERC CIP ISA S99 ISO 27001 NIST SP 800-53 r2, 800-82 NRC IEC 62351 NNSA DoD 8500.1 IEEE P1686 IEEE P1711 IEC 61850 (Cigre B5.38) http://www.us-cert.gov/control_systems/csstandards.html 17

NIST SP 800-82 Example Architecture Source: Idaho National Laboratory, Control Systems Cyber Security: Defense in Depth Strategies (May, 2006) 18

Apply Vertical Intelligence of Other Critical Infrastructures Healthcare Life supporting solutions Finance Integrity of transaction Telecommunications Robust, fault-tolerant communications system Electric Utilities (SCADA/DCS) Safety, Reliability, System Criticality, Vendor Systems

Simple Principles to reflect upon while architecting

Simple Principles Isolationism provides protection The more isolated an environment is from others the greater the success of physical and logical security controls assuring continuously accurate information and control 21

Simple Principles Assets will be physically stolen or lost Physical assets, physical assets storing electronic information and electronic assets will be stolen or lost You must limit the impact of any theft of information Your conversations will be eavesdropped upon Any verbal, paper or electronic conversation can be monitored; you must be accepting of this and utilize the appropriate protective controls to limit your risk 22

Simple Principles Assets will be physically stolen or lost Physical assets, physical assets storing electronic information and electronic assets will be stolen or lost You must limit the impact of any theft of information Your conversations will be eavesdropped upon Any verbal, paper or electronic conversation can be monitored; you must be accepting of this and utilize the appropriate protective controls to limit your risk 23

Simple Principles Build with a moat (control) Separate trust levels / Security Enclaves Understand how the moat (control) works (or) Build with Nightingale Floors * * Nijo Castle Kyoto, Japan 24

Air Gaps Not Only Answer Computer Virus Strikes Space Station August 27, 2008: Tariq Malik space.com A virus designed to swipe passwords from online gamers has inexplicably popped up in some laptop computers aboard the international space station. The low-risk virus was detected on July 25, but did not infect the space station's command and control computers and poses no threat to the orbiting laboratory, NASA officials said.

Holistic Approach Threats, Vulnerabilities, and Consequences Standards and Regulations People, Process, and Technology Threat, Vulnerability, Consequence Standards and Regulations People, Process, Technology

Do you have a choice to play? Risk, Key Takeways and Q&A

Encountered Themes of Risks Too much public information about the system Poor communication procedures throughout the industry regarding cyber security Growing interdependent, interconnected legacy systems Insufficient security awareness and security training Constrained ability to tactically execute and enforce documented policies, standards and procedures Attrition of workforce 28

Key Takeaways Assure holistic and integrated involvement with people, processes and technology Maintain ongoing situational awareness operationally, physically and cyber (internally and externally) The discovery process may prove to be difficult remember to understand all components including environmentals Key architecture components are crucial (electronic and physical perimeters, authentication, logging, remote management, change management, development, data storage, communication flow) Architect and build for incident response Defense in depth Security awareness and training to combat workforce attrition NERC CIP Reliability Standards are paving the way for future legislation and compliance requirements for international electric utilities and critical infrastructures

Q&A Contact Information Matthew Luallen Co-Founder, Encari 312-375-4715 mluallen@encari.com Visit our blog at Control Engineering magazine s website www.controleng.com