SCADA Security Measures



Similar documents
The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Taxonomy of Intrusion Detection System

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Security Issues in SCADA Networks

An Analysis of the Capabilities Of Cybersecurity Defense

Supplier Security Assessment Questionnaire

Protecting Critical Infrastructure

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Performance Evaluation of Intrusion Detection Systems

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

The Protection Mission a constant endeavor

Remote Services. Managing Open Systems with Remote Services

GE Measurement & Control. Cyber Security for NEI 08-09

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IT Security and OT Security. Understanding the Challenges

SCADA SYSTEMS AND SECURITY WHITEPAPER

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Understanding SCADA System Security Vulnerabilities

CYBER SECURITY POLICY For Managers of Drinking Water Systems

Security Issues with Integrated Smart Buildings

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Stronger than Firewalls And Cheaper Too

Cyber Security and Privacy - Program 183

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

CHAPTER 1 INTRODUCTION

SCADA-specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy

Designing a security policy to protect your automation solution

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Innovative Defense Strategies for Securing SCADA & Control Systems

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Recommended IP Telephony Architecture

KeyLock Solutions Security and Privacy Protection Practices

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

CSCI 4250/6250 Fall 2015 Computer and Networks Security

SANS Top 20 Critical Controls for Effective Cyber Defense

Information Technology Branch Access Control Technical Standard

ABB s approach concerning IS Security for Automation Systems

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Introduction to Cyber Security / Information Security

Computer System Security Updates

MEDIAROOM. Products Hosting Infrastructure Documentation. Introduction. Hosting Facility Overview

8. Firewall Design & Implementation

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

R3: Windows Server 2008 Administration. Course Overview. Course Outline. Course Length: 4 Day

INTRUSION DETECTION SYSTEMS and Network Security

University of Central Florida Class Specification Administrative and Professional. Information Security Officer

GE Measurement & Control. Cyber Security for NERC CIP Compliance

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

ADM:49 DPS POLICY MANUAL Page 1 of 5

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

Solutions for Health Insurance Portability and Accountability Act (HIPAA) Compliance

Don t skip these expert tips for making your firewall airtight, bulletproof and fail-safe. 10 Tips to Make Sure Your Firewall is Really Secure

Cyber Security for NERC CIP Version 5 Compliance

Lessons Learned CIP Reliability Standards

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Critical Controls for Cyber Security.

ASSUMING A STATE OF COMPROMISE: EFFECTIVE DETECTION OF SECURITY BREACHES

IBX Business Network Platform Information Security Controls Document Classification [Public]

IP Telephony Management

INFORMATION TECHNOLOGY ENGINEER V

Network/Cyber Security

Appendix. Key Areas of Concern. i. Inadequate coverage of cybersecurity risk assessment exercises

Client Security Risk Assessment Questionnaire

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Dr. György Kálmán

University of Pittsburgh Security Assessment Questionnaire (v1.5)

DDoS Protection Technology White Paper

System Specification. Author: CMU Team

Information Security. Incident Management Program. What is an Incident Management Program? Why is it needed?

Security in the smart grid

Network Security Administrator

Network Management and Monitoring Software

SCADA/Business Network Separation: Securing an Integrated SCADA System

Document ID. Cyber security for substation automation products and systems

SURVEY OF INTRUSION DETECTION SYSTEM

BEST PRACTICES IN CYBER SUPPLY CHAIN RISK MANAGEMENT

State of Texas. TEX-AN Next Generation. NNI Plan

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Symphony Plus Cyber security for the power and water industries

Update On Smart Grid Cyber Security

REGULATIONS FOR THE SECURITY OF INTERNET BANKING

Patching & Malicious Software Prevention CIP-007 R3 & R4

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

PierianDx - Clinical Genomicist Workstation Software as a Service FAQ s

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

Transcription:

Systems and Internet Infrastructure Security Network and Security Research Center Department of Computer Science and Engineering Pennsylvania State University, University Park PA SCADA Security Measures CSE 598E Critical Infrastructure Security 1

Paper 1: The VIKING Project - Towards more Secure SCADA Systems Written by: Gunnar Björkman Presented by: Diana Koshy 2

Type of Paper Expository This paper discusses a future project aimed at analyzing the security of SCADA systems. It also describes how SCADA systems work. 3

The Problem: Security on SCADA systems needs to be improved ( or at least exist!) 4

The Problem SCADA systems need to be secure since a problem with the system has dire consequences Security is non-trivial since the systems are very complex and must perform under strict conditions 5

The Problem Risks come from insiders as well as new access points opened by connecting the SCADA system to corporate networks, engineers, contractors, vendors, etc. These risks have been somewhat mitigated by firewalls and Demilitarized Zones (DMZs) Risks also come from use of standardized protocols, hardware and software Communication protocols are becoming more standardized to allow different hardware to communicate 6

The Solution The objective of the VIKING project is to develop, test and evaluate methodologies for the analysis, design and operation of resilient and secure industrial control systems for critical infrastructure. 7

Background Structure of a SCADA System Sensors Remote Terminal Units (RTUs) Station Control Systems Central Control System Workstations Front-End Servers SCADA Servers Archive Servers 8

The Solution The VIKING project aims to take a holistic approach in analyzing security 9

The Solution: VIKING Goals 1. Assess security risk and (financial) consequences of an attack on a SCADA system 2. Create a tool that can quantify security for comparison across different systems 3. Use model-based system as IDS 4. Secure power system communication 5. Be able to identify vulnerable spots in a SCADA system 6. Create a system that can be used to test security solutions and their effects 10

The Solution: Method Create 3 models: 1. power system model - used to model the effects of an attack on electricity supply 2. society model - used to gauge economic consequences of an attack 3. SCADA system models (architectural and cyber-physical) - used to see the effect of an attack on SCADA system behavior 11

The Assumptions None The paper was just summarizing a proposed project. 12

Paper 2: 21 Steps to Improve Cyber Security of SCADA Networks Written by: US Department of Energy Presented by: Diana Koshy 13

Type of Paper Best-practices paper This paper proposes 21-steps to take in order to alleviate the security problem inherent in current SCADA systems 14

The Problem SCADA systems were not designed with security in mind Organizations using SCADA networks need to improve their security 15

The Solution 2 Categories: 1. Actions to Take to Increase Security 2. Management Actions to Establish Effective Security Program 16

The Solution: Actions to Take 1. Understand the risk, protection and necessity of every connection to the SCADA network 2. Make the network as isolated as possible and use safe methods for data transfer 3. Analyze and implement a strong security strategy for all remaining connections 4. Remove or disable unused services provided by non-proprietary operating systems 17

The Solution: Actions to Take 5. Proprietary (obscure) protocols should not be mistaken for secure protocols 6. Enable and configure all security features already present and/or demand upgrades 7. Secure backdoors and vendor connections 8. Monitor for internal and external intrusions 24- hours-a-day 18

The Solution: Actions to Take 9. Conduct audits of the system to find common vulnerabilities 10.Check physical security of all remote sites that communicate with the SCADA system 11.Put together a Red Team to come up with potential attack scenarios 19

The Solution: Management 12.Clearly define roles and responsibilities for all organization personnel 13.Document the information security architecture and its components 14.Identify risks and vulnerabilities and create an ongoing risk management process 15.Base protection strategy on defense-in-depth principle 20

The Solution: Management 16.Create a clear, structured security program with delineated requirements 17.Establish configuration management processes 18.Conduct routine self-assessments 19.Create system backups and disaster recovery plans 21

The Solution: Management 20.Establish an expectation for strong security for all levels of personnel 21.Train personnel to prevent disclosure of sensitive information about the SCADA system 22

The Assumptions None The paper was a list of suggested best-practices. 23

Paper 3: SCADA-specific Intrusion Detection/Prevention Systems: A Survey and Taxonomy Written by: Bonnie Zhu and Shankar Sastry Presented by: Diana Koshy 24

Type of Paper Survey paper This paper discusses past work on Classification and characteristics of attacks SCADA-specific IDS attempts 25

The Problem SCADA systems are vulnerable Standardized protocols, software and hardware De-isolation of SCADA systems Legacy components not designed for security 26

The Problem Specific Vulnerabilities Listed: HMI controller: Can falsify what operator sees sensor-hmi link: Can spy on what operator sees actuator-controller link: Can see what actuators are told to do sensor threshold values and settings: Can modify settings actuator settings: Can modify settings 27

The Problem Security research on SCADA systems is lacking Unrealistic testing environments Poorly analyzed threat models IDS implementations specific to different SCADA environments Lack of analysis of false positives/false negatives of IDSs 28

The Problem 100% prevention of attacks is impossible Must combine prevention with detection Can t use existing IDSs since SCADA is different It is a hard real-time system, which means timeliness, freshness of data, and availability are crucial Its terminal devices have limited computing and memory resources Safety is a primary concern 29

The Solution Create SCADA-specific IDS and security metrics Ideal system should be able to: detect and block intrusions in real time do so without interrupting performance do so without extra burdens due to false positives do so despite normal noise 30

The Solution Types of IDS: signature detection approach anomaly detection approach probabilistic approach specification-based approach behavioral detection approach 31

The Solution All of these can be applied to different parts of SCADA systems 32

The Solution: Past Work Model-Based IDS for SCADA Using Modbus/TCP Uses the fact that network traffic on a SCADA system is relatively constant to find anomalies Most SCADA-specific of the implementations 33

The Solution: Past Work Anomaly-Based IDS 1. AutoAssociative Kernel Regression and Statistical Probability Ratio Test - monitor anomalous non-malicious activity to establish baseline - use baseline database to compare with new activity 2. Multi-Agent IDS Using Ant Clustering Approach and Unsupervised Feature Extraction -use multiple intelligent agents to perform IDS duties -monitor agents capture packets, extract features and perform PCA -decision agents perform clustering and notify of abnormalities -action agents respond to threats accordingly 34

The Solution: Past Work Configurable Embedded Middleware-Level Detection put a detection system in the middle of the communication channels kind of like a firewall easiest to incorporate since few changes to existing system would need to be made 35

The Solution: Past Work Intrusion Detection and Event Monitoring in SCADA Networks specific to SCADA power-grid and RTUs automatically produce signatures for unauthorized access store settings and details of each SCADA device and compare over time 36

The Solution: Past Work Model for Cyber-Physical Interaction 1. Power Plant interfacing Substations through Probabilistic validation of attack-effect bindings 2. Workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in Cyber Environment 37

The Solution: Past Work Model for Cyber-Physical Interaction 1. Power Plant interfacing Substations through Probabilistic validation of attack-effect bindings probabilistically build a profile of legitimate data flows and main characteristics of normal information exchange only works for known attacks 38

The Solution: Past Work Model for Cyber-Physical Interaction 2. Workflow-based non-intrusive approach for enhancing the survivability of critical infrastructures in Cyber Environment separate SCADA system into cyber, physical, and workflow layers each physical component is a node in workflow layer model functionality and attack patterns only works on known attacks 39

The Solution: Past Work Modeling Flow Information and other Control Systems Behavior To Detect Anomalies analyzes flow on the network (so only good for network layers) combine anomaly-, behavioral-, and specification-based techniques to detect abnormal behavior 40

The Solution: Past Work SHARP uses authentication and privilege escalation protection to detect and block unauthorized physical and network access 41

The Assumptions None The paper was a survey. 42