Cyber Security Modeling and Assessment of SCADA System Architectures



Similar documents
Cyber Security Assessment of Enterprise-Wide Architectures

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

The Cyber Security Modeling Language and Cyber Security research at department for Industrial Information and Control Systems

Secure Software Programming and Vulnerability Analysis

Goals. Understanding security testing

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Industrial Security for Process Automation

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Semantic based Web Application Firewall (SWAF V 1.6) Operations and User Manual. Document Version 1.0

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Critical Security Controls

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

New possibilities in latest OfficeScan and OfficeScan plug-in architecture

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Stephen Coty Director, Threat Research

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

SEMANTIC SECURITY ANALYSIS OF SCADA NETWORKS TO DETECT MALICIOUS CONTROL COMMANDS IN POWER GRID

13 Ways Through A Firewall

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Update On Smart Grid Cyber Security

Information Security Attack Tree Modeling for Enhancing Student Learning

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

CYBER SECURITY. Is your Industrial Control System prepared?

iscsi Security (Insecure SCSI) Presenter: Himanshu Dwivedi

Security Testing in Critical Systems

Models for Cyber Security Analysis

Metasploit The Elixir of Network Security

Monitoring for network security and management. Cyber Solutions Inc.

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Agenda. Understanding of Firewall s definition and Categorization. Understanding of Firewall s Deployment Architectures

Network Segmentation

A Decision Maker s Guide to Securing an IT Infrastructure

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

13 Ways Through A Firewall What you don t know will hurt you

Network & Agent Based Intrusion Detection Systems

Payment Card Industry (PCI) Data Security Standard

THREAT VISIBILITY & VULNERABILITY ASSESSMENT

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

10 Potential Risk Facing Your IT Department: Multi-layered Security & Network Protection. September 2011

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

A Review on Zero Day Attack Safety Using Different Scenarios

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Network Security. Outlines: Introduction to Network Security Dfii Defining Security Zones DMZ. July Network Security 08

Network Security Demonstration - Snort based IDS Integration -

IT Security and OT Security. Understanding the Challenges

Estimates of success rates of Denial-of-Service attacks

A Manual for the Cyber Security Modeling Language (simplified version)

The Cyber Security Modeling Language: A Tool for Assessing the Vulnerability of Enterprise System Architectures

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Sygate Secure Enterprise and Alcatel

White Paper A SECURITY GUIDE TO PROTECTING IP PHONE SYSTEMS AGAINST ATTACK. A balancing act

Zero day attacks anatomy & countermeasures. By Cade Zvavanjanja Cybersecurity Strategist

Cybercrime myths, challenges and how to protect our business. Vladimir Kantchev Managing Partner Service Centrix

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

Firewalls for small business

Traffic Monitoring : Experience

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Hackers are here. Where are you?

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Cybersecurity considerations for electrical distribution systems

Firewall Tips & Tricks. Paul Asadoorian Network Security Engineer Brown University November 20, 2002

Network Security Administrator

SCADA Security Measures

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Overview. Firewall Security. Perimeter Security Devices. Routers

Agenda , Palo Alto Networks. Confidential and Proprietary.

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

COMPUTER SECURITY. J. Magalhães Cruz Computer Security Protection of Local Systems (short) 1 25

GE Measurement & Control. Cyber Security for NEI 08-09

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Best Practices for Securing IP Telephony

ADDING NETWORK INTELLIGENCE TO VULNERABILITY MANAGEMENT

Locking down a Hitachi ID Suite server

Firewalls and Intrusion Detection

Secure Network Access System (SNAS) Indigenous Next Generation Network Security Solutions

Security Architecture: From Start to Sustainment. Tim Owen, Chief Engineer SMS DGI Cyber Security Conference June 2013

How To Perform An External Security Vulnerability Assessment Of An External Computer System

IDS or IPS? Pocket E-Guide

Threat Modelling for Web Application Deployment. Ivan Ristic (Thinking Stone)

Firewall Cracking and Security By: Lukasz Majowicz Dr. Stefan Robila 12/15/08

What would you like to protect?

Cyber Security Seminar KTH

Simplifying Security & Compliance Innovating IT Managed Services. Data Security Threat Landscape and IT General Controls

Decrease your HMI/SCADA risk

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

ΕΠΛ 674: Εργαστήριο 5 Firewalls

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

1. Introduction. 2. DoS/DDoS. MilsVPN DoS/DDoS and ISP. 2.1 What is DoS/DDoS? 2.2 What is SYN Flooding?

Windows Remote Access

Payment Card Industry (PCI) Penetration Testing Standard

POMPDs Make Better Hackers: Accounting for Uncertainty in Penetration Testing. By: Chris Abbott

Closing Wireless Loopholes for PCI Compliance and Security

Security perimeter white paper. Configuring a security perimeter around JEP(S) with IIS SMTP

Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

How To Protect A Network From Attack From A Hacker (Hbss)

Transcription:

Cyber Security Modeling and Assessment of SCADA System Architectures Mathias Ekstedt, Associate Professor Teodor Sommestad Hannes Holm Industrial Information and Control Systems KTH Royal Institute of Technology Cyber security managment is difficult! Is my control system secure enough? CISO(etc.) What can I do to improve it most effectively?

The Cyber Security Modeling Language (CySeMoL) functionality Success probabilities of attacks: P(SCADAServer.Access) = 0.14 P(SCADAService.InjectCode) = 0.14 P(SCADAServer.FindKnownService) = 0.04 P(SCADAServer.ConnectTo) = 0.23 Effect of changes: For P(SCADAServer.Access) Install IPS: 0.14=>0.11 Regular security audits: 0.14=>0.12 Defense/attack graphs The attack step makes other attack steps possible The countermeasure reduces the chance of success The attack step disables the countermeasure

A simple defense graph example RDP DB service Machine /OS Network F W The CySeMoL magic Success probabilities of attacks: P(SCADAServer.Access) = 0.14 P(SCADAService.InjectCode) = 0.14 P(SCADAServer.FindKnownService) = 0.04 P(SCADAServer.ConnectTo) = 0.23 Effect of changes: For P(SCADAServer.Access) Install IPS: 0.14=>0.11 Regular security audits: 0.14=>0.12

CySeMoL example in our modeling tool: Model Overview (network architecture) Model of SCADA LAN The usual system architecture stuff: - Networks - Physical components /hosts - Software services Perhaps not in your average system architecture model: - Access control points - Authetication mechanisms - Accounts - Users - Security training process

An attack example USB inserted on HMI OS Take over the PCU (communication with substation) Attack success 24%!!! (maximum)

The attack path extracted There is a chance that: The attacker gains remote access to the HMI through inserted USB stick (step 0 and 1) The HMI has an address on the SCADA network zone (step 2). The attacker connects to the Shared Message Block (SMB) service on the PCU Communication (step 3). Probe to determine what type of product (and version) it is (i.e. that it is SMB and Windows XP) (step 4). Identify a (publically known) vulnerability in the software (step 5). find a functioning high severity exploit (step 6). Run arbitrary code exploit on the PCU Communication OS and open a back door (step 7).! Mitigation: introduce patch managment! 5% No expliot available anymore. Attacker has to develop (or buy) his own.

Mitigation: network-layer deep packet inspection filter for PCU traffic! 17% SMB traffic is now monitored. Decreases chance to successfully run arbitrary code attack on service OS! How to calculate the attack success probabilities..? The simple example RDP DB service Machine /OS Network F W!"#$%&'%$"(%)&'*%$"#$%$"&'%#+#,*% '$(-%,#.%/(%01.(%/2%#%-)13(''&1.#4% -(.($)#51.%$('$()%6&$"%1.(%6((*% 13%-)(-#)#51.'7 811*%#$%-)(9&1:'% )('(#),";% <'*%'(,:)&$2%(=-()$';%

Connect to the service >"(%#+#,*()%,#.%1/$#&.%#,,(''%$1%#%"1'$% #4416(0%$")1:?"%$"(%@)(6#44% AB% AB% AB% AB% AB% AB% AB% AB% >"(%#+#,*()%,#.%1/$#&.%-"2'&,#4%#,,(''%$1%$"(%.($61)*% AB% AB% AB% AB% AB% AB% AB% AB% A($61)*%41?'%#)(%)(9&(6(0%1.%#%)(?:4#)%/#'&'% CDE% CDE% CDE% CDE% AB% AB% AB% AB% E(,:)&$2%#:0&$'%#)(%-()31)F(0%1.%$"(%.($61)*% 1.%#%)(?:4#)%/#'&'% CDE% CDE% AB% AB% CDE% CDE% AB% AB% <0F&.&'$)#$1)'%"#9(%0(@.(0%#%31)F#4%,"#.?(% F#.#?(F(.$%-)1,(''% CDE% AB% CDE% AB% CDE% AB% CDE% AB% 816%('5F#$(%GH%IJ% KL% MM% MN% MO% MN% MH% PK% PP% Q(0&:F%('5F#$(%GHRIJ% NN% NN% NS% NO% NH% NO% HK% HH% T&?"%('5F#$(%GUHIJ% OS% OS% OS% OS% OO% OS% SR% SH% Q(#.% NP% NN% NO% NO% NH% NO% HK% HN% In the defense graph HKI

More probabilities The professional penetration tester has access to the compiled (binary) code Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes The targeted software has been scrutinized before Yes Yes Yes Yes Yes Yes Yes Yes No No No No No No No No The professional penetration tester has access to the source code Yes Yes Yes Yes No No No No Yes Yes Yes Yes No No No No The software is written in a safe language (e.g. C#, Java) or a safe dialect (e.g. Cyclone) Yes Yes No No Yes Yes No No Yes Yes No No Yes Yes No No The software has been analyzed by static code analyzers and improved based on the result Yes No Yes No Yes No Yes No Yes No Yes No Yes No Yes No V#2'%.((0(0%&3%4:,*2GH%I%,"#.,(J%!" #" $" $" #" $" %" #" #" $" $" #" #" #" #" $" V#2'%.((0(0%%1.%#9()#?(%GHRI%,"#.,(J% #!"!"!" #" #%" #$" &" '" (" '"!"!" #'" )" ("!" V#2'%.((0(0%&3%:.4:,*2%GUH%I%,"#.,(J% )'" %(" %(" )" *++" %)" *++" %+)" %)" &" #)" *"!''" %)" #*" &" D=-(,$(0%.:F/()%13%0#2'%)(W:&)(0% %'" (" )"!"#!$" #$"#%&" '$" &" +" +"!" ##" &" )" '" The service has high severity vulnerabilities which the attacker has exploits for Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes Yes There is a deep packet inspection firewall in-between the attacker s IP and the service s port No No No No No No No No Yes Yes Yes Yes Yes Yes Yes Yes The attacker can authenticate itself as a legitimate user Yes of the service Yes Yes Yes No No No No Yes Yes Yes Yes No No No No The operating system uses executable space protection Yes (e.g. DEP in Windows) Yes No No Yes Yes No No Yes Yes No No Yes Yes No No The operating system running the service uses address Yes space layout randomization (ASLR) No Yes No Yes No Yes No Yes No Yes No Yes No Yes No 816%('5F#$(%GH%IJ% ##" #'" #+" #)" '" '" '" +" )" )" +" #'" #" '" (" (" Q(0&:F%('5F#$(%GHRIJ% '+" ((" +$" )+" %#" %+"!$" '#"!("!*" %)" (&" #$" #+" %$" %(" T&?"%('5F#$(%GUHIJ% **" *&" *&" &'" '*" +(" (!" *(" )&" )&" (*" &'" +#" ($" (%" (&" Q(#.% '*" +&" +%" ()" %'" %)"!!" '!" '#" '#"!#" (+" #+" %$" %'"!%" In the defense graph KRRI MNI KRRI HKI KRRI

The full scenario 1.00*0.24*1.00*0.51*1.00=0.1224=12.24% chance of success KRRI MNI KRRI HKI KRRI What CySeMoL can do for you This is (roughly) what my future system alternatives look like Scenario 3 Scenario 2 Scenario 1 Probably, I can t say for sure, but it seems as if scenario 2 is the most secure alternative

Thank you for listening! CySeMoL scope

CySeMoL full version including attacks and countermeasures Data sources Parameters, relationships and dependency-structure: - Literature, e.g. standards or scientific articles. - Review and prioritization by external experts (~10). The probabilities: - Logical necessities, e.g.: if the firewalls allow you to connect to A from B and you have access to B, then you can connect to A. - Others scientific studies, e.g. time-to-compromise for authentication codes and patch level vs patching procedures. - Experts judgments, Own surveys to researchers and security professionals.

Data from experts Review of variables to include in the scenarios. + Probabilities on scenarios: - Finding unknown entry-points: 4 experienced penetration testers. - Finding unknown vulnerabilities: 18 vulnerability researchers. - Arbitrary code exploits: 22 penetration testers and security researchers. - Intrusion detection: 165 IDS researchers. - DoS: 50 researchers on DoS attacks. >"(%#+#,*()%,#.%1/$#&.%#,,(''%$1%#%"1'$%#4416(0%$")1:?"%$"(%@)(6#44% AB% AB% AB% AB% AB% AB% AB% AB% >"(%#+#,*()%,#.%1/$#&.%-"2'&,#4%#,,(''%$1%$"(%.($61)*% AB% AB% AB% AB% AB% AB% AB% AB% A($61)*%41?'%#)(%)(9&(6(0%1.%#%)(?:4#)%/#'&'% CDE% CDE% CDE% CDE% AB% AB% AB% AB% E(,:)&$2%#:0&$'%#)(%-()31)F(0%1.%$"(%.($61)*%1.%#%)(?:4#)%/#'&'% CDE% CDE% AB% AB% CDE% CDE% AB% AB% <0F&.&'$)#$1)'%"#9(%0(@.(0%#%31)F#4%,"#.?(%F#.#?(F(.$%-)1,(''% CDE% AB% CDE% AB% CDE% AB% CDE% AB% 816%('5F#$(%GH%IJ% KL% MM% MN% MO% MN% MH% PK% PP% Q(0&:F%('5F#$(%GHRIJ% HK% NN% NN% NS% NO% NH% NO% HH% T&?"%('5F#$(%GUHIJ% SR% OS% OS% OS% OS% OO% OS% SH% Q(#.% NP% NN% NO% NO% NH% NO% HK% HN% Cooke s classical method for weighting experts Find the true expert not the average of experts in general. (It is enough if one person knows the truth, if we can only identify that person ) Ask the expert a set of test questions you know the answer of. Have the experts specify quintiles (0.05, 0.50, 0.95) for the test questions. - there is a 5/50/95 % chance that the value is below X Reward them for being: - calibrated/correct - informative Weight their answers on the real questions based on test question performance >"(%#+#,*()%,#.%1/$#&.%#,,(''%$1%#%"1'$%#4416(0%$")1:?"%$"(%@)(6#44% AB% AB% AB% AB% AB% AB% AB% AB% >"(%#+#,*()%,#.%1/$#&.%-"2'&,#4%#,,(''%$1%$"(%.($61)*% AB% AB% AB% AB% AB% AB% AB% AB% A($61)*%41?'%#)(%)(9&(6(0%1.%#%)(?:4#)%/#'&'% CDE% CDE% CDE% CDE% AB% AB% AB% AB% E(,:)&$2%#:0&$'%#)(%-()31)F(0%1.%$"(%.($61)*%1.%#%)(?:4#)%/#'&'% CDE% CDE% AB% AB% CDE% CDE% AB% AB% <0F&.&'$)#$1)'%"#9(%0(@.(0%#%31)F#4%,"#.?(%F#.#?(F(.$%-)1,(''% CDE% AB% CDE% AB% CDE% AB% CDE% AB% 816%('5F#$(%GH%IJ% KL% MM% MN% MO% MN% MH% PK% PP% Q(0&:F%('5F#$(%GHRIJ% HK% NN% NN% NS% NO% NH% NO% HH% T&?"%('5F#$(%GUHIJ% SR% OS% OS% OS% OS% OO% OS% SH% Q(#.% NP% NN% NO% NO% NH% NO% HK% HN%

The concepts included a trade off Practically we can t, and don t want to, have everything in the model The data collection cost for users Data collection cost for us (the theory s complexity) Variables importance to security Variables tendency to vary in practice What CySeMoL can do for you This is (roughly) what my future system alternatives look like Scenario 3 Scenario 2 Scenario 1 Probably, I can t say for sure, but it seems as if scenario 2 is the most secure alternative

Questions? Limitations with CySeMoL It is incomplete, its scope excludes: - The losses an attack would lead to - Countermeasures that impact losses (e.g. backups) - Threat agents and their mindset (pen tester w. 1 week prep.) - Focus on availability and integrity (not confidentiality) - Little focus on social engineering attacks - Little focus on physical attacks and physical defenses It depends to quite a large degree on domain experts judgment No details much uncertainty - Model is incomplete and lacks depth - knowledge is simply missing A single architecture includes many potential attack paths - much analysis work to do for the decision maker Better tool support is needed