Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.



Similar documents
Network Access Security. Lesson 10

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Securing Modern Substations With an Open Standard Network Security Solution

Firewalls, Tunnels, and Network Intrusion Detection

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

VPN. VPN For BIPAC 741/743GE

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Innovative Defense Strategies for Securing SCADA & Control Systems

Secure Network Design: Designing a DMZ & VPN

Secure SCADA Network Technology and Methods

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Recommended IP Telephony Architecture

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Firewalls. CEN 448 Security and Internet Protocols Chapter 20 Firewalls

Creating a VPN Using Windows 2003 Server and XP Professional

Security Technology: Firewalls and VPNs

How To Protect Your Network From Attack

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Security Awareness. Wireless Network Security

Chapter 4 Customizing Your Network Settings

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Firewalls and Virtual Private Networks

Module 8. Network Security. Version 2 CSE IIT, Kharagpur

Lecture 17 - Network Security

Security Protocols HTTPS/ DNSSEC TLS. Internet (IPSEC) Network (802.1x) Application (HTTP,DNS) Transport (TCP/UDP) Transport (TCP/UDP) Internet (IP)

Virtual Private Networks

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

Network Security Topologies. Chapter 11

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

HANDBOOK 8 NETWORK SECURITY Version 1.0

Network Security Infrastructure Testing

Security Design.

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

INF3510 Information Security University of Oslo Spring Lecture 9 Communication Security. Audun Jøsang

Computer Networks. Secure Systems

Post-Class Quiz: Telecommunication & Network Security Domain

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

CREATING AN IKE IPSEC TUNNEL BETWEEN AN INTERNET SECURITY ROUTER AND A WINDOWS 2000/XP PC

NETWORK SECURITY (W/LAB) Course Syllabus

How To Set Up A Vpn Tunnel Between Winxp And Zwall On A Pc 2 And Winxp On A Windows Xp 2 On A Microsoft Gbk2 (Windows) On A Macbook 2 (Windows 2) On An Ip

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Site to Site Virtual Private Networks (VPNs):

Digi Connect WAN Application Helper NAT, GRE, ESP and TCP/UPD Forwarding and IP Filtering

Intro to Firewalls. Summary

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

INTRUSION DETECTION SYSTEMS and Network Security

Wireless Controller DWC-1000

FIREWALLS & CBAC. philip.heimer@hh.se

Why Choose Integrated VPN/Firewall Solutions over Stand-alone VPNs

Overview. Firewall Security. Perimeter Security Devices. Routers

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab March 04, 2004

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Establishing a VPN tunnel to CNet CWR-854 VPN router using WinXP IPSec client

"ASM s INTERNATIONAL E-Journal on Ongoing Research in Management and IT"

Domain 6.0: Network Security

IPv6 SECURITY. May The Government of the Hong Kong Special Administrative Region

Chapter 4 Customizing Your Network Settings

13 Virtual Private Networks 13.1 Point-to-Point Protocol (PPP) 13.2 Layer 2/3/4 VPNs 13.3 Multi-Protocol Label Switching 13.4 IPsec Transport Mode

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Howto: How to configure static port mapping in the corporate router/firewall for Panda GateDefender Integra VPN networks

12/8/2015. Review. Final Exam. Network Basics. Network Basics. Network Basics. Network Basics. 12/10/2015 Thursday 5:30~6:30pm Science S-3-028

M2M Series Routers. Port Forwarding / DMZ Setup

Virtual Private Networks Solutions for Secure Remote Access. White Paper

UCIT INFORMATION SECURITY STANDARDS

RuggedCom Solutions for

SCADA SYSTEMS AND SECURITY WHITEPAPER

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Firewalls. Ahmad Almulhem March 10, 2012

VPN SECURITY. February The Government of the Hong Kong Special Administrative Region

Implementing and Managing Security for Network Communications

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

Information Security Assessment and Testing Services RFQ # Questions and Answers September 8, 2014

AN OVERVIEW OF REMOTE ACCESS VPNS: ARCHITECTURE AND EFFICIENT INSTALLATION

GPRS / 3G Services: VPN solutions supported

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Cisco Which VPN Solution is Right for You?

Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP

Introduction to Firewalls Open Source Security Tools for Information Technology Professionals

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Chapter 9 Firewalls and Intrusion Prevention Systems

WAN Failover Scenarios Using Digi Wireless WAN Routers

Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

: Interconnecting Cisco Networking Devices Part 1 v2.0 (ICND1)

About Firewall Protection

SCADA/Business Network Separation: Securing an Integrated SCADA System

ZyWALL 5. Internet Security Appliance. Quick Start Guide Version 3.62 (XD.0) May 2004

Configuring IPSec VPN Tunnel between NetScreen Remote Client and RN300

Chapter 8 Security Pt 2

Secure Substation Automation for Operations & Maintenance

Interconnecting Cisco Network Devices 1 Course, Class Outline

Transcription:

Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009

What Makes a Cyberattack Unique? While the resources needed to conduct a physical attack have not changed much recently, the resources necessary to conduct a cyber attack are now commonplace. Communications on Critical Infrastructure Protection, White House, October 1997.

What Are the Tradeoffs?

Example Network Diagram

Identify, Prioritize, and Defend the Electronic Security Perimeter! Electronic Security Perimeter Electronic Attack Entry Points Private Fiber Network Real-Time Protection Substation Relay Protective Relay Leased Line (Telco) Spread- Spectrum Radio Dial-Up Line (Telco) SCADA Dial-Up Engineering Access Ethernet Engineering Access Communications Processor or RTU Dial-Up Modem

Sending Data Securely Cybersecurity Triad Confidentiality Prevents eavesdropping Trust and Authentication Prevents identity spoofing Message Integrity Prevents message alteration

Attack Vector

Network Scanning Use TCP/IP network scanner to map target network Example: discover engineering and corporate LANs separated by simple router

Malicious SCADA Command Injection Attacker injects trip commands to all live control points

Commercial SCADA Protocol Analyzer 42

Mitigating Electronic Threat Use Significant Barriers to Minimize Chance of Successful Attack Make it difficult for attacker to access channel from outside Implement strong link security to augment access control technologies Use access control technologies effectively in devices

Protect SCADA LANs With VLANs Partitioning is an ideal way to isolate critical networks from others, but today s networks are interconnected

Example Network Diagram

Firewall Filters traffic Stateless Stateful Application Placed between network data junctions, such as the demilitarized zone (DMZ) and Internet

Firewall Log and Alarm Who Accessed the Network? Action Source IP address Destination IP address Port Packet size DROP Port 137 UDP packet blocked Other actions OPEN, OPEN-INBOUND, CLOSE, INFO-EVENTS-LOST

Use VPNs for Security Internet Protocol Security (IPSec) SSL Tunneling Point-to-Point Tunneling Protocol (PPTP)

IPSec Choices Authenitcation Header (AH) or Encapsulating Security Payload (ESP)

Datagram of IPSec Options

IPSec VPN Benefits Operates in most WAN access routers and computer platforms Distinguishes which traffic to protect Provides link security

IPSec Tunnel Vs. Transport Mode Transport Tunnel Tunnel mode gateway-to-gateway Transport host-to-host

1 Overview to Setup IPSec VPN Local Security Policy 2 3

Setup IPSec VPN Potential for error during setup Gray highlighting, not radio button, indicates object selected to edit

Setup IPSec VPN

AH and Encryption Verify the address header is hashed Select Negotiate security radio button, and add address header security

Secure Remote Access Request for remote desktop connection

Toggle to Assign Policy

Malicious SCADA Command Injection IPSec and firewalls protect link IPSec VPN

What Is the Best Security Policy? No golden policy Attacks are complex Require complex defenses that continuously change

Protect Against Unauthorized Access Attempts on Substation / SCADA System Monitor system assets Audit system logs Partition critical infrastructure (network separation) Evaluate and review security policies Be aware of social engineering vulnerabilities Train system users

Is Lack of Internet Connection Safe? Unsecured connections may exist from corporate LAN to critical networks Internet-connected LAN exposes critical network Compromised corporate computer puts critical assets at risk Rogue dial-up or wireless Internet systems can exist unnoticed

Conclusion Standards to consider for remote access of routable protocols Firewalls provide alarms and logs VLAN provides segmentation strategy VPN IPSec protects data

Thank You Any questions?