SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP



Similar documents
Designing a security policy to protect your automation solution

Three Simple Steps to SCADA Systems Security

DeltaV System Cyber-Security

Preventing Cyber Security Attacks Against the Water Industry

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Best Practices for DanPac Express Cyber Security

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Industrial Security for Process Automation

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Critical Controls for Cyber Security.

Best Practices for DeltaV Cyber- Security

Security Policy for External Customers

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

How Secure is Your SCADA System?

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Cybersecurity Health Check At A Glance

Verve Security Center

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Innovative Defense Strategies for Securing SCADA & Control Systems

Best Practices For Department Server and Enterprise System Checklist

13 Ways Through A Firewall

Section 12 MUST BE COMPLETED BY: 4/22

ABB s approach concerning IS Security for Automation Systems

Network/Cyber Security

Client Security Risk Assessment Questionnaire

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

BCS IT User Syllabus IT Security for Users Level 2. Version 1.0

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Recommended IP Telephony Architecture

How To Secure Your System From Cyber Attacks

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

13 Ways Through A Firewall What you don t know will hurt you

Ovation Security Center Data Sheet

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Cyber Security in a Modern Process Network. Philip Nunn Product Manager - Industrial Networks

Industrial Security Solutions

Ovation Security Center Data Sheet

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Supplier Information Security Addendum for GE Restricted Data

GE Measurement & Control. Cyber Security for NEI 08-09

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

The Protection Mission a constant endeavor

Patching & Malicious Software Prevention CIP-007 R3 & R4

Decrease your HMI/SCADA risk

The SCADA Security Challenge: The Race Is On

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The Importance of Cybersecurity Monitoring for Utilities

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

CYBER SECURITY. Is your Industrial Control System prepared?

SCADA SYSTEMS AND SECURITY WHITEPAPER

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IT Security and OT Security. Understanding the Challenges

NETWORK SECURITY GUIDELINES

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Building Secure Networks for the Industrial World

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

SANS Top 20 Critical Controls for Effective Cyber Defense

How To Protect Water Utilities From Cyber Attack

Network Security Guidelines. e-governance

Deploying Firewalls Throughout Your Organization

Network Instruments white paper

Dr. György Kálmán

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Industrial Communication. Securing Industrial Wireless

Payment Card Industry Self-Assessment Questionnaire

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

By David G. Holmberg, Ph.D., Member ASHRAE

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Cyber Self Assessment

Chapter 9 Firewalls and Intrusion Prevention Systems

OCR LEVEL 3 CAMBRIDGE TECHNICAL

Medical Networks and Operating Systems

Cisco Advanced Services for Network Security

Internet Security Protecting Your Business. Hayden Johnston & Rik Perry WYSCOM

1B1 SECURITY RESPONSIBILITY

Securing the Service Desk in the Cloud

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

New Era in Cyber Security. Technology Development

United States Trustee Program s Wireless LAN Security Checklist

What is Cyber Liability

Cyber Security. John Leek Chief Strategist

Qualification Specification. Level 4 Certificate in Cyber Security and Intrusion For Business

Security in Wireless Local Area Network

CNA NetProtect Essential SM. 1. Do you implement virus controls and filtering on all systems? Background:

Transcription:

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Today s Topics SCADA Overview SCADA System vs. IT Systems Risk Factors Threats Potential Vulnerabilities Specific Considerations Schneider Electric Seminar - 2

SCADA Systems An application of computer technology which: gathers information from field devices displays it for use by an operator executes automatic control sequences stores and displays data for analysis. Schneider Electric Seminar - 3

Elements of a Typical SCADA System Laptop VPN / Dial up PDA Remote Communications Terminal Server Wireless Network Device Workstation Workstation Server Radio Ethernet SCADA Control Center Interface to Remote Areas Clearwell PLC Control Panels Field Devices Human Machine Interface (HMI) M MCC S-2 Historical Server Comm Tower Field Controller. Clearwell Pump Venturi Flow Tube To Distribution Networks CL2, Turbidity, Conductivity, ph Analyzers Schneider Electric Seminar - 4

SCADA Systems vs. IT Systems Some Common Characteristics Internet Protocol (IP) based systems Ethernet networks Servers and Workstations PC based Windows Operating Systems Network Connectivity Schneider Electric Seminar - 5

SCADA Systems vs. IT Systems SCADA shares many characteristics with IT systems, but SCADA also has: Direct effect on the real world Significant impact on environment Risks to health and safety of human lives Mission Criticality Real Time / High Availability IT Security techniques are a good foundation for SCADA Security Schneider Electric Seminar - 6

SCADA System Risk Factors Standard Protocols and Technologies Vulnerabilities known to hackers/attackers Connections from control network to other networks Corporate WAN/Internet Rogue or Unknown Connections Public Information on Common Control Platforms Easy to understand HMI Graphics Schneider Electric Seminar - 7

SCADA System Threats Attackers Hackers Insiders Disgruntled employees or former employees Spyware/Malware Terrorists Schneider Electric Seminar - 8

SCADA System Threats Control System Disruptions Lack of Monitoring Inability to control Unauthorized Changes Alarm Setpoints Control Setpoints False Information to Operators Virus Introduction Schneider Electric Seminar - 9

Do We Really Need to Worry? Worcester Air Traffic Communications 1997 Hacker disabled multiple comm systems Maroochy Shire Sewage Spill 2000 Disgruntled job applicant hacked into remote control systems CSX Train Signaling System 2003 Sobig computer virus - Infection shut down signaling, dispatching and other systems Schneider Electric Seminar - 10

Do We Really Need to Worry? Davis-Bessey Nuclear Power Plant 2003 Slammer worm: Disabled Safety Monitoring System, Failure of Process Computer (plant was not operating) Northeast Power Blackout 2003 SCADA failure contributed to blackout Bellingham Washington Gas Pipeline Failure 1999 SCADA failure allowed overpressure, contributed to incident Schneider Electric Seminar - 11

Potential SCADA Vulnerability Types Policy and Procedure Control Platform Hardware Software Configuration Network Systems Schneider Electric Seminar - 12

Policy and Procedure Considerations Security Policies & Procedures Training Disaster Recovery Change Management Develop Security Policies SCADA Specific Disaster Recovery Plan Monitor for current issues (WaterISAC, US-CERT email list) Schneider Electric Seminar - 13

Low Hanging Fruit Policies and Procedures Software Backups SCADA Configuration PLC Programs Historical Data System Documentation Security Awareness Training Schneider Electric Seminar - 14

Control Platform Considerations Hardware Software Configuration Schneider Electric Seminar - 15

Control Platform Considerations Hardware Physical Security of Critical Systems Redundancy for Critical Components Backup Power Environmental Controls Accidental remote access Schneider Electric Seminar - 16

Low Hanging Fruit Hardware Physical Security of SCADA Assets Separate Servers in Secure Location Limit Operator Access to USB ports Lock Field Equipment Cabinets and Enclosures Secure Cables in conduit to prevent damage (radio coax, etc.) Schneider Electric Seminar - 17

Control Platform Considerations Software Old/Outdated Operating Systems Patch Management for Operating Systems Patch Management for Control Software Virus Protection (Malware) Software Intrusion Detection Software Schneider Electric Seminar - 18

Low Hanging Fruit - Software Anti-Virus Software Verify with SCADA vendor, Deploy carefully Manage Signature Updates Intrusion Detection Software Handle similar to anti-virus software Schneider Electric Seminar - 19

Control Platform Considerations Configuration Critical Configuration Parameters Password Policies and Application Portable Devices (Laptop, PDA) Vendor Default Configurations Access Controls Schneider Electric Seminar - 20

Low Hanging Fruit Configuration Passwords / System Access Individual Passwords Strong Password requirements for privileged users Critical Processes consider impact on passwords if rapid response needed (e.g. UV Local Operator Interface) Define Access Control levels Schneider Electric Seminar - 21

Network Systems Considerations Security Perimeter Separated Networks (Control, Non-Control) Firewall Configuration Wireless Connections Wireless LAN Remote Telemetry Schneider Electric Seminar - 22

Typical SCADA Network Scheme Split Networks Laptop PDA Wireless Network Device Workstation Workstation SCADA Ethernet Network Radio SCADA Server SCADA Server Control Ethernet Network Historical Server Comm. Tower Schneider Electric Seminar - 23

Access to Corporate LAN/WAN Schneider Electric Seminar - 24

DMZ Architecture Laptop with VPN Business System Server (Typical) Internet Admin Network (LAN/WAN) Firewall to Internet Firewall to Admin LAN/WAN Laptop PDA DMZ Network Historical Server Wireless Network Device Workstation Workstation SCADA Ethernet Network Data Server Firewall SCADA Server SCADA Server Control Ethernet Network Schneider Electric Seminar - 25

CSSP Recommended Defense-In-Depth Architecture Schneider Electric Seminar - 26

Wireless Networks Plan your Installation Antennas placed to minimize exposure outside designated areas Configure your Hardware Unique SSID non-broadcast MAC Filtering Strong Security / Authorization Protocols Schneider Electric Seminar - 27

Remote Telemetry Physical Protection of Equipment Spread Spectrum Change Default Codes Licensed Consider Encryption Schneider Electric Seminar - 28

Resources Water Information Sharing and Analysis Center (WaterISAC) www.waterisac.org Department of Homeland Security Control Systems Security Program - www.uscert.gov/control_systems NIST Industrial Control System Security Project http://csrc.nist.gov/sec-cert/ics/index.html ISA Security Compliance Institute - www.isa.org/isasecure Process Control Systems Forum - www.pcsforum.org NIST SP 800-82: Guide to Industrial Control Security Control Systems Cyber Security Self Assessment Tool (CS2SAT) Schneider Electric Seminar - 29

Summary SCADA System Security is a real concern. IT Cyber-Security Techniques are a good foundation for SCADA Security improvements. There are many simple improvements that can be made to enhance system security. Schneider Electric Seminar - 30

Questions? Terry M. Draper, PE, PMP drapertm@bv.com

Potential SCADA Vulnerability Types Policy and Procedure Security Policies and Procedures Training Disaster Recovery Change Management Control Platform Hardware Software Configuration Schneider Electric Seminar - 32

Potential SCADA Vulnerability Types Network Systems Hardware/Software/Configuration Network Perimeter Network Monitoring and Logging Communications Wireless Connections Schneider Electric Seminar - 33