Cyber Security for SCADA/ICS Networks



Similar documents
Into the cybersecurity breach

Cyber Security for SCADA Systems

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

SCADA SYSTEMS AND SECURITY WHITEPAPER

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Unified Cyber Security Monitoring and Management Framework By Vijay Bharti Happiest Minds, Security Services Practice

Guideline on Auditing and Log Management

Information Security Services

CYBER SECURITY GUIDANCE

By David G. Holmberg, Ph.D., Member ASHRAE

Cyber Security Controls Assessment : A Critical Discipline of Systems Engineering

Protecting Critical Infrastructure

Managing IT Security with Penetration Testing

Effective Methods to Detect Current Security Threats

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

CRYPTUS DIPLOMA IN IT SECURITY

Basics of Internet Security

Effective Methods to Detect Current Security Threats

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

93% of large organisations and 76% of small businesses

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

This is a preview - click here to buy the full publication

Using Risk Modeling & Attack Simulation for Proactive Cyber Security Predictive Solutions for Effective Security Risk Management

Penetration Testing Service. By Comsec Information Security Consulting

1. Computer Security: An Introduction. Definitions Security threats and analysis Types of security controls Security services

Secure Web Applications. The front line defense

APT Advanced Persistent Threat Time to rethink?

A Systems Engineering Approach to Developing Cyber Security Professionals

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Industrial Security Solutions

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

How a Company s IT Systems Can Be Breached Despite Strict Security Protocols

Security Issues with Integrated Smart Buildings

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Deploying Firewalls Throughout Your Organization

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

External Supplier Control Requirements

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Understanding SCADA System Security Vulnerabilities

Protecting Organizations from Cyber Attack

20-CS X Network Security Spring, An Introduction To. Network Security. Week 1. January 7

Table of Contents. Page 2/13

The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices

BlackRidge Technology Transport Access Control: Overview

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

SCADA Security: Challenges and Solutions

How-To Guide: Cyber Security. Content Provided by

DeltaV System Cyber-Security

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

How To Manage Security On A Networked Computer System

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

Incident Response. Six Best Practices for Managing Cyber Breaches.

Who is Watching You? Video Conferencing Security

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Cybersecurity and internal audit. August 15, 2014

The Peak of Chaos Shane D. Shook, PhD 10/31/2012

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Jort Kollerie SonicWALL

SCADA/Business Network Separation: Securing an Integrated SCADA System

RUAG Cyber Security. More security for your data

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

The FBI Cyber Program. Bauer Advising Symposium //UNCLASSIFIED

Analyzing HTTP/HTTPS Traffic Logs

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Introduction. Jason Lawrence, MSISA, CISSP, CISA Manager, EY Advanced Security Center Atlanta, Georgia

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Chapter 1 The Principles of Auditing 1

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

Guidelines for Web applications protection with dedicated Web Application Firewall

ISACA rudens konference

SIEM is only as good as the data it consumes

Network/Cyber Security

Building Secure Networks for the Industrial World

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

CYBER SECURITY Audit, Test & Compliance

THE SECURITY OF HOSTED EXCHANGE FOR SMBs

Security Testing in Critical Systems

White Paper: Meeting and Exceeding GSI/GCSx Information Security Monitoring Requirements

SCADA/ICS Security in an.

External Supplier Control Requirements

Web Application Penetration Testing

Information Security Basic Concepts

PENETRATION TESTING GUIDE. 1

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

Transcription:

Cyber Security for SCADA/ICS Networks GANESH NARAYANAN HEAD-CONSULTING CYBER SECURITY SERVICES www.thalesgroup.com

Increasing Cyber Attacks on SCADA / ICS Systems 2

What is SCADA Supervisory Control And Data Acquisition is a type of, computer controlled, Industrial Control systems that monitor/ control industrial processes SCADA Cyber Issues Complex & Digital Connected Industrial & External Legacy-Not designed for Security Internet ed with inadequate protection Poor encryption & Password protection Ability to intrude & manipulate controls 3

SCADA systems (vs) Enterprise Systems Differences Business IT Cyber Issues Intellectual Property theft Financial or Strategic info theft Denial of Services Insider leakage Financial & Reputational Risk Industrial IT- Cyber Issues Loss of visualization of sensor readings Loss of control of the plant Human Safety + Operational Risk 4

A holistic view of Security A holistic view of security 5

Digital Control of Critical National Infrastructure 6

Exploitation of SCADA systems SHODAN pinpoints shoddy industrial controls. the Google for hackers. METASPLOIT Online vulnerability scanner Exploit codes for Vulnerabilities TOR Services free software for enabling anonymous communication conceal a user's location and usage from anyone 7

SCADA Scare! SCADA Exploitation Use SHODAN indexing http headers to find routers, servers, traffic lights and other industrial control equipment 1 Million SCDA/ICS connected, growing by 2000-8000/ day, many exploitable Find out the device facing internet, revealing software version Use Metasploit, to retrieve the relevant exploit code for that device Use proxy connection like TOR to keep anonymity & exploit the remote system Legacy SCADA controls Robustness to cyber attack is poor ( no FW, Data diodes, identity/ access mgnt.) Presence of ActiveX, Back door admin accounts, hardcoded authentication Fuzzing crash, buffer over flow, no password time out for login Readymade plug-ins for Metasploit, Nessus to access real time systems 8

SCADA Scare. The attack Once owned, ladder logic of PLC, uploaded Causing vital parameters to speed up/ down, pressure/ temperature/ interlocks Attacks are rare, but honeypot proves attackers could manipulate Solutions Robust SCADA/ICS products with Cyber security built-in ( if possible) In most cases, we need to segregate critical network from risky internet/ business network Do not allow IP numbers for SCADA/ICS to be directly accessible from Internet Careful routing of industrial protocol with additional layer of security/ control 9

Cyber Security for SCADA/ ICS Networks Understanding Business Risk 10 Threat Sources Criminals/ Organized crime Corporate Intelligence Disgruntled staff Hackers Terrorists Activists Untrained/ unauthorized staff Representation of Threat Financial gain Competitors/ Intellectual property Compromising security, data leakage Website defacement, theft of data Physical attack + Cyber to compromise availability Hacktivism willful unauthorized penetration to block facilities/ political mileage Use of USB causing malware to enter, other unauthorized, insecure actions

Know the Regulatory Compliance Modern Security Std for other industries PCI-DSS, HIPPA not possible to adapt in legacy SCADA/ICS Adapting old systems to the new framework is difficult USA- NIST 800-82 ISA 99 IEC62443 11

Zoning, Segregation & Protection of Industrial Metworks Access to data generated in real time Risk of intrusion & safety Protection from External threat : Thorough Risk Assessment, Secure G/way, Data diodes Zoning of Architecture IEC62443, ISA99 Secure remote conduits like VPN, WAN 12

Situational Awareness Picture of an attack Real Time Cyber monitoring of Critical Info-com Infrastructure High security environments vulnerable to sophisticated attacks Many ICS directly controlled via host business networks Attack vectors, attack surfaces, likelihood of attack increase If ICS design/ configuration can t be changed, need full Situational Awareness of the nature of the attack, even if it can t be prevented Incorporate pro-active monitoring technology, process, policies, with experienced analysts to detect suspicious activity 24 x 7 security monitoring (or) CSoC as a Service Full situational awareness picture of physical, environmental, logical and personnel domains effective, controlled and recorded response 13

Forensic Readiness Scrutiny on time taken to investigate and remediate / how the incident is managed is monitored by agencies Various compliances may be mandated, including Forensic Readiness UK Govt Security policy framework in 20 areas, including risk treatment section, that talks about Forensic Readiness Maximize the ability to preserve and analyze data generated by IT systems for legal and management CESG s Good Practice Guide (GPG) with Information Assurance Implementation with Forensic Readiness Planning Scenario based approach to Forensics planning, with hypothetical risks and real previous incidents Corresponding security response, documented and exercised 14

Incident Response Assured Cyber Incident Response Key to successful investigation & remediation is : - Assured Cyber Incident Response Provider - Forensics Service Provider in advance of an accident Entire enterprise network to be examined concurrently for malware / APT by looking at suspicious applications Once identified, forensics snapshot of data to be taken All systems on network forensically searched, followed by remediation Option is to stop those processes or to forensically wipe off, across all systems 15

Critical Infrastructure Cyber Security Services 16

Individual Components of a CSoC Services 17

Individual Components of Integrated Cyber Security Ops Centre 18

19 / Cyber Range Simulation Solutions THALES GROUP CONFIDENTIAL

Where does Thales fit in Thales in SCADA security 20

Conclusions SCADA threats are changing very fast Many misconceptions on the type of SCADA threat, extent of dmaage, or disruption, effort & skills required for protection Significant consequences of ignoring/ inadequate controls on cyber security of SCADA/ICS Cyber & SCADA Key concern for all industrial infrastructures Demands rapid, accurate and informed decisions to ensure safety, security & efectiveness A holistic approach to SCADA protection, using Cyber Security Operation Centres and Situation Awareness monitoring solutions Inter-related cyber, physical and industrial IT Vulnerbilities must be managed 21

Thank You In Heaven, we trust rest all networks should have Cyber Security Protection!! For some information on Cyber Security for Critical Infrastructure, please contact Ganesh Narayanan, Head- Consulting Cyber Security ganesh.narayanan1970@gmail.com +65 9758 9646 22