Improving Water and Wastewater SCADA Cyber Security

Similar documents
SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Preventing Cyber Security Attacks Against the Water Industry

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Industrial Security for Process Automation

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

State of Texas. TEX-AN Next Generation. NNI Plan

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Designing a security policy to protect your automation solution

Session 14: Functional Security in a Process Environment

Cisco Advanced Services for Network Security

Are you prepared to be next? Invensys Cyber Security

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

OPC & Security Agenda

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

Computer System Security Updates

CISCO IOS NETWORK SECURITY (IINS)

Ovation Security Center Data Sheet

SCADA Cyber Security

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Ovation Security Center Data Sheet

Cisco SR 520-T1 Secure Router

Industrial Security Solutions

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

DeltaV System Cyber-Security

GE Measurement & Control. Cyber Security for NEI 08-09

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Security Issues with Integrated Smart Buildings

13 Ways Through A Firewall

High Performance, Secure VPN Servers for Remote Utility, Industrial Automation Systems:

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Chapter 1 The Principles of Auditing 1

Interconnecting Cisco Networking Devices Part 2

Dr. György Kálmán

Decrease your HMI/SCADA risk

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Recommended IP Telephony Architecture

Network Security Guidelines. e-governance

Three Simple Steps to SCADA Systems Security

Verve Security Center

13 Ways Through A Firewall What you don t know will hurt you

Cisco Certified Security Professional (CCSP)

Securing the Connected Enterprise

Logical & Physical Security

Securing EtherNet/IP Using DPI Firewall Technology

Innovative Defense Strategies for Securing SCADA & Control Systems

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Deploying Firewalls Throughout Your Organization

Effective Defense in Depth Strategies

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

How To Secure Your System From Cyber Attacks

- Introduction to PIX/ASA Firewalls -

ACME Enterprises IT Infrastructure Assessment

IT Security and OT Security. Understanding the Challenges

Secure Networks for Process Control

Using ISA/IEC Standards to Improve Control System Security

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

ISACA rudens konference

a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.

Secure SCADA Network Technology and Methods

IP Telephony Management

Security Testing in Critical Systems

Cyber Security Where Do I Begin?

IT Networking and Security

Developing Network Security Strategies

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Resilient and Secure Solutions for the Water/Wastewater Industry

Redesigning automation network security

Industrial Security in the Connected Enterprise

: Interconnecting Cisco Networking Devices Part 2 v1.1

CCNA Security v1.0 Scope and Sequence

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

CCNA Security 2.0 Scope and Sequence

Secure Access into Industrial Automation and Control Systems Best Practice and Trends

CYBER SECURITY. Is your Industrial Control System prepared?

T46 - Integrated Architecture Tools for Securing Your Control System

Building Secure Networks for the Industrial World

"Charting the Course...

REFERENCE ARCHITECTURES FOR MANUFACTURING

Securing Manufacturing Control Networks. Alan J. Raveling, CISSP November 2 nd 5 th Pack Expo 2014

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Cisco Certified Network Associate Exam. Operation of IP Data Networks. LAN Switching Technologies. IP addressing (IPv4 / IPv6)

AUP28 - Implementing Security and IP Protection

How Proactive Business Continuity Can Protect and Grow Your Business. A CenturyLink White Paper

ITL BULLETIN FOR JANUARY 2011

Chapter 4 Customizing Your Network Settings

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Transcription:

Improving Water and Wastewater SCADA Cyber Security Standards Certification Education & Training Publishing Conferences & Exhibits Speakers: Bill Phillips and Norman Anderson 2012 ISA Water & Wastewater and Automatic Controls Symposium August 7-9, 2012 Orlando, Florida, USA

Presenter Bill Phillips, PE: Bill specializes in delivery of secure and reliable process control and SCADA network and communications systems, cyber security vulnerability assessment, and facility automation and information system planning and implementation. Bill has over 30 years of process control and SCADA system experience and has focused on control system network and communications cyber security for the last decade. Bill has a BSEE from Clemson University. Aug 7-9, 2012 Orlando, Florida, USA 2

Presenter Norman Anderson, PE: Norman has over 5 years experience in the design and commissioning of Process Control Systems for the Water Sector. Norman has provided secure and reliable PLC, SCADA, and Network hardware and software architecture designs and provided control system automation solutions for a range of facilities. Norman has an M.S. in EE from Iowa State University and an M.S. in Physics from the University of Florida. Aug 7-9, 2012 Orlando, Florida, USA 3

Presentation Outline Need to secure control systems Continuing increase in Cyber Attacks Notable Cyber Attacks Available Guidance and Resources Standards Design Guides Assessment/Design/Implementation/Operation Determining Risk factors and mitigation techniques Our Experience and Examples Summary Aug 7-9, 2012 Orlando, Florida, USA 4

General Increase In Cyber Attacks Number of Vulnerabilities 9,000 8,000 7,000 6,000 5,000 4,000 3,000 2,000 1,000 0 CERT Cataloged Vulnerabilities 1995-2007 Year General Trend of increase in incidents and vulnerabilities. CERT stopped incident monitoring in 2003. *Source: CERT Statistics http://www.cert.org/stats/#vul-year Incidents Reported 160000 140000 120000 100000 80000 60000 40000 20000 Vulnerabilities Aug 7-9, 2012 Orlando, Florida, USA Year 5 0 CERT Reported Incidents 1988-2003 1988 1989 1990 1991 1992 1993 1994 1995 1996 1997 1998 1999 2000 2001 2002 2003 Incidents

Reported Incidents by Infrastructure Sector Water/Wastewater is #4 on the list and has twice the incident rate of most commercial facilities. *Source: Summarized by Infrastructure Sector (RISI, 2010) Aug 7-9, 2012 Orlando, Florida, USA 6

Industrial Security Incident Attack Points of Entry Many attacks are through local business networks and via remote access. These are two common connections to industrial networks to allow for machines having email and internet access to connect to SCADA networks and to allow remote vendors to connect to SCADA networks for maintenance. *Source: Summarized by Points of Entry (RISI, 2010) Aug 7-9, 2012 Orlando, Florida, USA 7

Financial Impacts Approximately 23% of the industrial security incidents resulted in damages greater than one million dollars per incident. *Source: Reported in the U.S. (RISI, 2010) Aug 7-9, 2012 Orlando, Florida, USA 8

Media Coverage Pump destroyed at water plant Springfield, IL o Believed to be due to cyberattack (not confirmed by DHS). o Story covered by news media such as the Washington Post, Fox News, CNN, and MSNBC o Even though unconfirmed, the utility was in the national spotlight for weeks Texas SCADA system hacked and screenshots of HMI released o Response to DHS downplay of IL incident o Again carried by major news media o Used a virtual network connection with the internet with simple password to access network Aug 7-9, 2012 Orlando, Florida, USA 9

More Infamous Attacks Maroochy Shire Sewage Treatment Plant in Queensland, Australia. o Attack resulted in approximately 212,000 gallons of raw sewage to spill out into local parks, rivers, and a nearby hotel. o The attack was perpetrated by a disgruntled insider and former Contractor, Vitek Boden, that previously installed the radio-controlled SCADA equipment for the plant. o During the attack period, Boden used a laptop computer and stolen radio on at least 46 occasions to issue unauthorized radio commands to the SCADA System (Abrams and Weiss, 2008) Aug 7-9, 2012 Orlando, Florida, USA 10

More Infamous Attacks, Continued Stuxnet High sophisticated WORM to target Siemens PLCs Used to destroy centrifuges used for uranium enrichment Deployed using USB flash media devices (thumb drives) o No external connections does not equal safety Showed the weaknesses of Industrial Control Systems Native Code Code with virus Duqu (Stuxnet Variant) Discovered by Symantec and appears to be a variant of Stuxnet Not intended to destroy industrial control systems but to steal information from them Aug 7-9, 2012 Orlando, Florida, USA 11

Common Vulnerabilities Denial of Service (DoS): Attempt to make computer network unavailable Would slow or shutdown the communications SCADA network Mitigation techniques include Firewalls, ACLs, Intrusion Prevention Systems SQL Injection Attacks SQL databases using vulnerabilities in websites Can steal database information or destroy data Mitigation techniques include effective patch management, Intrusion Prevention Systems DCOM Most notable are RPC DCOM and Blaster attacks Can take control of computer and install programs, view, delete, etc. Mitigation includes use of intrusion detection, packet filtering, and network segmentation, and port blocking Aug 7-9, 2012 Orlando, Florida, USA 12

Example Control System Attack Animation Explains Control System Attack By Remote Attacker Aug 7-9, 2012 Orlando, Florida, USA 13

Importance of Security Why Security is Important at a Water or Wastewater Facility: Critical Infrastructure and Public Safety o Critical resources o Downtime can affect life safety Operational Reliability and Availability o Attacks can lead to significant downtime Financial Impacts o Loss of revenue for utility and its customers o Mitigation and legal costs Media Attention o Loss of public confidence ostaff intimidation Aug 7-9, 2012 Orlando, Florida, USA 14

Available Guidance AWWA Roadmap to Secure Control Systems in the Water Sector published in 2008 o Goal is in 10 years to have no loss in critical function due to cyber attack o Develops a roadmap with goals at the 1, 3, and 10 year marks. Currently in year 4 (mid-term) of program ANSI/ISA-99.02.01-2009 Security for Industrial Automation and Control Systems: Establishing an Industrial Automation and Control Systems Security Program o Builds upon global standards ISO/IEC 17799 and ISO/IEC 27001 and addresses the difference needed for industrial security o Defines procedures for implementing and assessing secure industrial control systems Aug 7-9, 2012 Orlando, Florida, USA 15

Available Guidance, Continued NIST SP 800-82 o Final Version Published: http://csrc.nist.gov/publications/nistpubs/800-82/sp800-82-final.pdf o Goal is to provide a guideline for critical infrastructures to secure their control systems with the idea to maintain systems online and operating unlike traditional IT systems. NERC Critical Infrastructure Protection (CIP) o Numbers CIP-002-3 through CIP-009-4 (18 standards) related to Cyber security implementation plans o Covers implementation of management controls as well as operating procedures for personnel Aug 7-9, 2012 Orlando, Florida, USA 16

Available Guidance, Continued Cisco/Rockwell Automation Converged Plantwide Ethernet (CPwE) Design and Implementation Guide oprovides design and implementation guidelines for industrial control systems based on the manufacturing industry ogoal is to provide less downtime, higher security, and optimization of Industrial Ethernet networks o Guide provides real network architecture examples, security methods, and implementation methods Aug 7-9, 2012 Orlando, Florida, USA 17

Securing Networks Securing networks requires proper planning to ensure successful implementation. There are four basic stages of planning and implementation for network security: 1. Assessment Determine Risks and Mitigation techniques Risk impact versus cost of mitigation 2. Design Develop appropriate network architecture and segmentation (NOTE : Taylor to selected HMI suite TCP/UDP port requirements) Choose necessary hardware and software 3. Implementation Qualified and certified installers and designers 4. Operation and Maintenance Develop operational procedures for staff Maintain network, hardware, and software Aug 7-9, 2012 Orlando, Florida, USA 18

Assessment The Critical Starting Point First step for proper network security Past Assessments were largely based on RAM-W This method was not very specific or comprehensive Limited guidance was available at the time US-CERT Cyber Security Evaluation Tool (CSET) Developed by DHS to assist in protecting key assets with assistance from NIST Available free from the US-CERT website: http://www.uscert.gov/control_systems/satool.html [training from Control System Security Program (CSSP) also provided] Uses 4 major steps and generates a report based on current industry standards Assessment is then used to plan and prioritize mitigation solutions Aug 7-9, 2012 Orlando, Florida, USA 19

Typical Large Utility Control System Network Aug 7-9, 2012 Orlando, Florida, USA 20

Typical Small Utility Control System Network Aug 7-9, 2012 Orlando, Florida, USA 21

Typical Small Remote Systems No matter the size of the network there are still critical systems to protect. Process control networks are inherently different than IT business networks even though many components are similar. Aug 7-9, 2012 Orlando, Florida, USA 22

Wastewater Utility Control System Design Example Includes redundant WAN connections Internet connection for WAN extension to remote facilities & mobile remote access Compact resilient core network Uses VLANs and firewall subinterfaces to tailor network architecture to SCADA HMI applications suite requirements and to securely support business network access Aug 7-9, 2012 Orlando, Florida, USA 23

Network Segmentation Using VLANs Network organization secures and helps maintain networks. Virtual LANs (VLANs) - Useful for SCADA systems because VLANs define broadcast domains that can be widely separated (i.e. not on the same network segment) Can reduce costs, by allowing host on different networks to share layer 2 switches. Use 802.1q VLAN encapsulation protocol Layer 3 device required to route between VLANs, some Layer 2 devices will support VLANs to some extent. VLAN Approach: o VLAN Range: 1-1005 (normal) & 1006-4094 (extended) o Don t Use VLAN 1 (Native VLAN) o Verify VLAN capabilities of network switches & routers o Use logical approach o Incorporate VLAN designations into IP Addresses Aug 7-9, 2012 Orlando, Florida, USA 24

Network Segmentation Using VLANs (Example) Example: VLAN 10 Network Management VLAN 20 SCADA DMZ VLAN 30 SCADA VLAN 40 Security (Video) VLAN 50 Remote User (DMZ) VLAN 100 Public Media WAN (Inter Facility VPNs) VLAN 110 Backup Public Media WAN Extensions: (For shared media) VLAN 60 Business VLAN 70 Business Remote User (DMZ) Aug 7-9, 2012 Orlando, Florida, USA 25

Network IP Addressing Approach: Use 10.0.0.0 private network Class A for primary VLANs Use 192.168.0.0 private Class Cs for routed links Incorporate facility & VLAN numbers into IP addresses Limit broadcast domains to a single facility Primary VLAN Example: 10.VLAN.Facility.Host/X or 10.Facility.VLAN.Host/X X = Subnet Mask bit count X (between 24 &30) based on anticipated host count WAN Example: 192.168.1.Y/X X = Subnet Mask bit count (between 24 & 30) based on number of nodes Y (between 0 & 252) = Network Number Aug 7-9, 2012 Orlando, Florida, USA 26

Example Firewall Configuration Specification Security Levels - Implicit Deny Lower-to-Higher level Interfaces Typically 3-4 for small to medium size firewalls Sub-interfaces can extend that number Stateful Inspection Can drop otherwise legitimate packets that are not part of an active connection Holds in memory variables defining the state of each connection State variables include things like source and destination addresses, port numbers, packet sequence numbers Access Control Lists Used to apply access control rules at interfaces Format: access-list-number {permit deny} protocol source {sourcemask} destination {destination-mask} [eq destination-port] Aug 7-9, 2012 Orlando, Florida, USA 27

Example Firewall Configuration Specification Security Levels Each Interface & Sub-interface Inside 100 (Most trusted) Outside 0 (Least trusted) DMZ 50 Access Control Lists Permit DMZ to-inside SCADA specific traffic such as web server, terminal server and historian traffic. Permit VPN LAN-to-DMZ authenticated remote user traffic such as web server, terminal server and historian traffic. Remote PLC Connections: Consider a Remote PLC DMZ to avoid direct connections between Internet connected PLCs and the SCADA network Consider dual Ethernet DMZ PLC interfaces (i.e. separate VLANs) to increase separation. Aug 7-9, 2012 Orlando, Florida, USA 28

Domain Controller Implementation Use group policies to manage role based access Separate controllers required for each domain Domain Controller and Active Directory Traffic Uses Remote Procedure Calls (RPC) and Distributed Component Object Model (DCOM) which introduce numerous vulnerabilities. Should not be permitted across firewall boundaries (i.e. don t extend the corporate domain into the SCADA DMZ) Exception When a Read-only Domain Controller (drastically reducing port requirements) is used with an IPSec VPN tunnel connection to extend the SCADA domain into the SCADA DMZ Generally worth the trouble to ease implementation & maintenance of role based access & remote access using RADIUS authentication Aug 7-9, 2012 Orlando, Florida, USA 29

Remote VPN Connections VPNs can securely extend WANs using public media & provide secure remote access to mobile staff Remote Facility Connections Using IPSec Site-to-Site VPNs Used to interconnect two or more facility LANs Encrypts entire IP packet including endpoint private IP addresses Provides, confidentiality, data integrity, origin authentication and replay protection Mobile Remote User Connections TLS/SSL VPNs Uses browser interface to connect mobile remote clients to servers Operate at the session level to provide secure client/server connections Uses certificates to authenticate servers & clients. Uses symmetric keys to provide confidentiality and data integrity Aug 7-9, 2012 Orlando, Florida, USA 30

VPN Tunnel with Encryption Aug 7-9, 2012 Orlando, Florida, USA 31

Remote Access VPNs Aug 7-9, 2012 Orlando, Florida, USA 32

Firewalls for Network Security and Routing Aug 7-9, 2012 Orlando, Florida, USA 33

Converged Plantwide Ethernet (CPwE) Design & Implementation Guide (DIG) LAN resilience alternatives shown & performance comparisons. L2&3 QoS settings recommendations DMZ Example tailored to SCADA CPwE DIG Developed by Cisco Systems & Rockwell Automation Provides detailed guidance & includes LAN configuration alternative testing results These figures from the DIG are from the LAN and DMZ design chapters Aug 7-9, 2012 Orlando, Florida, USA 34

Designing and Implementation Roadblocks Conflicts faced by utilities Lack of regulatory driver Many competing needs Losing sleep each time another event makes the news. What to do? Utility staffs are a resourceful bunch and they find a way to address their concerns Some are able to get funding to specifically address cyber security. Others have to be more creative. Utilities often lack resources to self-perform SCADA security assessments & improvements planning, design and implementation, as mentioned before, there is help. Aug 7-9, 2012 Orlando, Florida, USA 35

Designing and Implementation Roadblocks, Continued Our experience Some utilities, usually bigger ones, have adopted appropriate standards and established internal policies, procedures and standards that they apply to each project More commonly, the utility hasn t established comprehensive standards and isn t aware of the vulnerabilities in their existing systems; but would like to make progress as part of each project. Sometimes it s a grass roots or replacement project which means that they are open to a comprehensive solution but do have budgetary constraints. Other times it more like what can we shoehorn into this small incremental project. Aug 7-9, 2012 Orlando, Florida, USA 36

Example - Incremental Implementation IPSec VPN Tunnel 10 BaseTX 100 BaseTX 100 BaseFX 62.5 125mu Layer 3 Switch W/ EIGRP100 2801/2611 W/ EIGRP100 Tx/Fx Layer 2 Switch ASA 5510 WasteWater- SCADA-SERVER PLANT 1 MOSCAD MTU Modbus WASTEWATER- MODBUS-IP- SCADA-VIEW CONVERTER P1Switch Plant1-SCADA-2960TT-1 Fa0/0 PLANT 2 Industrial Park PLC WW-SCADA-SRVR1 WW-SCADA-SRVR2 Plant2-SCADA-2960TC-1 MTU PLC PLC1A HP JetDirect Lift Station 14.2 Plant2-WW-L14_2-2955 PLC1B Switch Westside Blvd SE SERVER PLC Cabinet OIU PLC PLC (Redundant Quantum) PLC Box PLC WELL 15 100BASE-TX/100BASE-FX Media Converter 54mbps Plant1-SCADA-2801-1 Tank 15 Well15-SCADA-3000-1 LS8 PLC LS 8 Modbus Serial 54mbps Esteem Access Point MODBUS-IP- CONVERTER MODBUS-IP- CONVERTER Esteem Access Point Plant3-SCADA-2960TT-1 PLANT 3 Address? Modbus Modbus+ P3 PLC LS13 PLC LS21 PLC 1536Kb/s (CIR) 58/KDFN/103677/TWCS Plant2-SCADA-2801-1 1536Kb/s (CIR) 58/KDFN/103674/TWCS Plant 6 SCADA VIEW 1536Kb/s (CIR) 58/KDFN/103608/TWCS Plant6-SCADA-2801-1 Plant6-SCADA-2960TT-1 Remote Connections Point-to-Point Connection to Well 12 Esteem AP Bridge Esteem AP Bridge Exalt AP Bridge 54mbps Proxima AP Bridge 54mbps Remote VPN User Remote VPN User Remote VPN User Plant3-SCADA-2801-1 1536Kb/s (CIR) 58/KDFN/10367?/TWCS TW Telecom Metro Ethernet (ILAN) Layer-2 (Bridged) 1536Kb/s (CIR) 58/KDFN/103608/TWCS Remote Connection to BPS 12 1536Kb/s (CIR) Exalt AP Bridge Proxima AP Bridge CITY CENTER 58/KDFN/103610/TWCS 1536Kb/s (CIR) CityCenter-SCADA-3000-1 TW Telecom Internet 58/KDFN/103609/TWCS W DMZ Well10CC-SCADA_DMZ-2960TT-1 WWTP1SCADA3 (HIST) 6Mb/s (CIR) 58/KDFN/103600/TWCS WW DMZ SCADA-ASA: 5510s in HA 20Mb/s (CIR) 58/KDFN/103604/TWCS WELL 10 (Control Center) Well10-WATER-2960TC-1 RX3I Well 10A Building Control Panel 54mbps Proxima AP Bridge Esteem AP Bridge Remote Connections W-SCADA-WIN911 WW-SCADA-HIST Well10-WATER-2955-1 WELL 8 Proxima AP Bridge W-SCADA-TS W_SCADA_CLIENT2 Well10CC-SCADA-3560-1 Well 10 Control Center WW-SCADA-WIN911 3621 Redhill Place Well10-WATER-2611-1 W-SCADA-2960TT-1 Dell 2700 OIT BPS WWTP12850 (EMAIL) WW-SCADA-TS WW-SCADA-2960TT-1 W-SCADA-2960TT-1 PLC Well8-SCADA-3000-1 SHARED DMZ [FUTURE] SCADA-DMZ-RODC01 SCADA-DMZ-RODC02 (DC, NTP, Anti-virus, WSUS) WW-SCADA-CLNT W-SCADA-CLIENT1 (WATER VIEW) W-SCADA-DEV-1 W-SCADA-SERVER1 (Z400) RX3I SHARED SCADA SCADA-DCSEC SCADA-DCPRI Well 10 Booster ATF OIT PLC Esteem AP Bridge Remote Connections Aug 7-9, 2012 Orlando, Florida, USA 37

Example Incremental Installation Initial installation can be done using a single Ethernet switch and no remote connections. Remote connections can be added in the future when they can be secured correctly. Design supports adding disaster recovery elements as budgets allow Initial equipment can be upgraded in the future through firmware to add required additional services such as high availability. Aug 7-9, 2012 Orlando, Florida, USA 38

Example - Single Implementation by Phased and Sequenced Construction Aug 7-9, 2012 Orlando, Florida, USA 39

Keys to Successful Implementation (Abbreviated Version of a Long List) Use equipment with a long useful lifetime and low risk of becoming completely obsolete in the short term. Have a budget in mind and idea of the risk/reward of network connected systems and equipment. Be aware that equipment cost is not an indication of work costs. A $1000 router could cost as much to configure as a $15,000 industrial router. Are staff or service contracts in place to maintain and troubleshoot systems? Systems are only as good as the maintenance done. Make sure that good system documentation and training will be delivered with the improvements. Set up a secure backup configuration storage mechanism & keep a copy of all addressing, configurations, settings, and software. Use qualified integrators having the proper certifications where appropriate. Aug 7-9, 2012 Orlando, Florida, USA 40

Defense in Depth A strategy for layering protection mechanisms to reduce the impact of a single mechanism failure In addition to the technical and operational controls that can be applied to SCADA systems, defense in depth requires long term organizational management and operations commitment to security for: Developing security policies, procedures and educational materials that apply directly to SCADA Conducting periodic security awareness, incident response and disaster recovery training Ongoing maintenance and upgrade of SCADA security throughout its lifecycle Restricting physical access to SCADA infrastructure Aug 7-9, 2012 Orlando, Florida, USA 41

User Access Require login credentials with secure passwords and auto logouts Use USB security where ports are available Simple user interface. Do not allow access to the start menu or other nonessential programs Do not allow access to the computer Aug 7-9, 2012 Orlando, Florida, USA 42

Summary The jury is in, the threat is real and utilities need to act Adequate guidance is available to support standards based cyber security improvements The DHS CSET tool and INL assessment support team provide a SCADA focused tool for conducting selfassessments Without a regulatory driver, funding continues to be a problem. Proper planning, implementation, and maintenance is key for a successful system. Systems cannot be installed and forgotten. Utilities are finding a way to make meaningful progress with both funding and solutions. Aug 7-9, 2012 Orlando, Florida, USA 43