OPC & Security Agenda



Similar documents
a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.

Effective OPC Security for Control Systems - Solutions you can bank on

Using Tofino to control the spread of Stuxnet Malware

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Innovative Defense Strategies for Securing SCADA & Control Systems

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

N-Dimension Solutions Cyber Security for Utilities

Industrial Firewalls Endpoint Security

A Decision Maker s Guide to Securing an IT Infrastructure

Networking for Caribbean Development

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Using ISA/IEC Standards to Improve Control System Security

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Security Testing in Critical Systems

Securing EtherNet/IP Using DPI Firewall Technology

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Network/Cyber Security

Intro to Firewalls. Summary

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Designing a security policy to protect your automation solution

Building A Secure Microsoft Exchange Continuity Appliance

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Keeping the Lights On

Are you prepared to be next? Invensys Cyber Security

CMPT 471 Networking II

Basics of Internet Security

OPC and DCOM: 5 things you need to know Author: Randy Kondor, B.Sc. in Computer Engineering

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Sygate Secure Enterprise and Alcatel

OPCNet Broker TM for Industrial Network Security and Connectivity

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

What is Really Needed to Secure the Internet of Things?

Inspection of Encrypted HTTPS Traffic

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Security Services. 30 years of experience in IT business

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

SECURING SAP NETWEAVER DEPLOYMENTS WITH SAFE-T RSACCESS

Cyber Security in a Modern Process Network. Philip Nunn Product Manager - Industrial Networks

CYBER SECURITY. Is your Industrial Control System prepared?

Industrial Security for Process Automation

DeltaV System Cyber-Security

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

Effective Defense in Depth Strategies

The Benefits of SSL Content Inspection ABSTRACT

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Top five strategies for combating modern threats Is anti-virus dead?

Cloud Services Prevent Zero-day and Targeted Attacks

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

WatchGuard Technologies, Inc. 505 Fifth Avenue South Suite 500, Seattle, WA

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Technical Note. ForeScout CounterACT: Virtual Firewall

How To Manage A Network With Kepware

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Defending Against Cyber Attacks with SessionLevel Network Security

Secure Networks for Process Control

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Network and Host-based Vulnerability Assessment

SCADA Security Training

Dr. György Kálmán

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

DCOM settings for computer-to-computer communication between OPC servers and OPC clients

Protecting Organizations from Cyber Attack

How To Secure Your System From Cyber Attacks

Internet threats: steps to security for your small business

How to Configure Windows Firewall on a Single Computer

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Internet security: Shutting the doors to keep hackers off your network

Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific Developments in Web Application and Cloud Security

SCADA SYSTEMS AND SECURITY WHITEPAPER

Applying the 80/20 approach for Operational Excellence. How to combat new age threats, optimize investments and increase security.

Recommended Practice Case Study: Cross-Site Scripting. February 2007

Chapter 8 Security Pt 2

Why Leaks Matter. Leak Detection and Mitigation as a Critical Element of Network Assurance. A publication of Lumeta Corporation

Common Cyber Threats. Common cyber threats include:

Information Security. CS526 Topic 1

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

74% 96 Action Items. Compliance

Using a VPN with CentraLine AX Systems

Cybersecurity: An Innovative Approach to Advanced Persistent Threats

Holistic View of Industrial Control Cyber Security

Firewalls, Tunnels, and Network Intrusion Detection

IT Security and OT Security. Understanding the Challenges

Using a VPN with Niagara Systems. v0.3 6, July 2013

Cyber Security Where Do I Begin?

Security Practices for Online Collaboration and Social Media

Understanding and evaluating risk to information assets in your software projects

PAVING THE PATH TO THE ELIMINATION OF THE TRADITIONAL DMZ

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

BlackRidge Technology Transport Access Control: Overview

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Securely Connect, Network, Access, and Visualize Your Data

What is a Firewall? Computer Security. Firewalls. What is a Firewall? What is a Firewall?

Decrease your HMI/SCADA risk

NATIONAL CYBER SECURITY AWARENESS MONTH

IDS or IPS? Pocket E-Guide

Transcription:

OPC & Security Agenda Cyber Security Today Cyber Security for SCADA/IS OPC Security Overview OPC Security Products Questions & Answers 1

Introduction CYBER SECURITY TODAY The Need for Reliable Information Flow Reliable data communications is critical for modern ICS and SCADA: Production management systems Manufacturing execution systems Asset management systems Enterprise data historians Just in time manufacturing Regulatory compliance Remote maintenance support Ethernet, TCPIP and Windows are core technologies 2

The Stuxnet Worm July, 2010: Stuxnet worm was discovered attacking Siemens PCS7, S7 PLC and WIN CC systems around the world Infected 100,000 computers Infected at least 22 manufacturing sites Appears to have impacted its possible target, Iran s nuclear enrichment program Here Come the SCADA Vulnerabilities March 15: Gleg Ltd. (Russia) releases Agora SCADA+ exploit pack for Canvas. Used 11 0 day exploits ( grew to 54) March 21: security researcher (Italy) releases 34 vulnerabilities on 4 different platforms to public March 22 23: Vulnerabilities disclosed for 2 more ICS platforms April: Vulnerabilities disclosed for 5 additional ICS platforms 3

What Stuxnet Means to the ICS World Stuxnet has become a SCADA for Dummies training manual for the hacking community Security Researchers are focusing on SCADA/ICS because it is easy money/fame (little malicious intent) Actors with bad intent have access to the weapons: Download exploits for free (Italian list) Purchase tool kits (Gleg) Directed where to look for more vulnerabilities Some Lessons Learned SCADA and ICS are now targets of interest Most systems have many exploit opportunities The Son of Stuxnet is only a matter of time What system will it strike? 4

Concepts & Technologies UNDERSTANDING CYBER SECURITY FOR SCADA AND ICS The Bastion Model of Security A popular industrial security policy is to install single firewall between business and the control system. Known as the Bastion Model since it depends on a single point of security. Other examples of the bastion model: The Great Wall of China The Maginot Line 5

Layering Your Defenses #1 Manage risk with diverse and layered defensive strategies If one defence is compromised, another layer presents additional obstacles to the attacker Layering Your Defenses #2 Remember that attacks come in different flavors Each defensive layer can be optimized to deal with a specific range of threats. Technology Layer Example Solution Defense Against Network Security Firewall Scanning Malformed Packets Denial of Service Attacks Platform Security Anti virus software Known worms Application Security Account and Role Access Control Disgruntled Employees Inappropriate Access 6

Too Many Protocols ICS network can be an alphabet soup of network protocols and technologies Each protocol brings new hacker opportunities Reducing the Attack Surface Picking one or two universal protocols and sticking with them Reduces the Attack Surface Limits hacker opportunities Allows security focus 7

IT Security is not SCADA/ICS Security There are important differences between information technology (IT) networks and industrial automation and control systems networks. Problems occur because assumptions that are valid in the IT world may not be on the plant floor Some examples: Valid types of outbound traffic Importance of web customers What are the Critical protocols Desired state on failure An Example Assumption IT Assumption: Outbound traffic is safe, inbound traffic is unsafe Result: By default, all ports are blocked on the outside interface, and all ports are open on the inside interface of the security appliance. Cisco ASA 5500 Adaptive Security Appliances Document ID: 91970 8

Its Impact on a Chemical Plant Plant Floor Reality: Cisco ASA firewall is installed between DCS and PLCs with DCS as SCADA master (thus inbound traffic to PLC must be allowed) Event: Firewall installed with default rule sets Impact: All traffic to PLCs is blocked, plant down for three hours SCADA/ICS Appropriate Technologies Deploy ICS appropriate security technologies to secure ICS/SCADA systems Look beyond traditional network layer firewalls, towards firewalls that are capable of deep packet inspection of key SCADA and ICS protocols 9

High Level Overview UNDERSTANDING OPC SECURITY OPC Classic World s leading technology for integrating different automation products. Defines the communication interface that exposes Automation data. Includes all OPC standards that are based on Microsoft's DCOM Technology. Security concerns due to DCOM. 10

OPC Security Considerations Cyber Security Network Security Network Security Who has Access? Secure OPC Architectures OPC Security What might they Do? Behavioral Security Process Security What can they Do? Common OPC Security Issues Unauthorized OPC Clients Authorized OPC Clients with too much power No layering of security OPC Servers implemented with no security restrictions Data privacy: Confidentiality 11

Issue: Unauthorized Access Keep out malicious users Keep out unauthorized clients Microsoft Windows Security ACL based User control: Windows Security Application Control: DCOM What DCOM Security Provides OPC Servers employ no security OPC Clients control OPC Servers Prevent unauthorized access DCOM ACLs used to limit who may: Launch (start) the server Access (communicate) with OPC server User 1 OPC Client OPC Server Access Control List User/Group Launch Access User 1 Yes Yes User 2 No Yes User 3 No (or not listed) No (or not listed) User 2 OPC Client OPC Server User 3 OPC Client 12

What Can Users Do? User Connects User Token Passed Full Access Granted Administrator Engineer Contractor DCOM Security User Connects User Token Passed Same Access granted to all Users (Authorization) Read Write Browse 13

OPC Security Specification Developed by OPC Foundation NT Security performs authentication OPC Server performs access authorization Access authorization based on either : 1. NT Access Token (preferred) Uses the Windows login name/password 2. Private Credential (IOPCSecurityPrivate) Special interface Both OPC Server and client support required OPC Security Specification User first passes DCOM security (Authentication) Access Certificate passed to OPC Server OPC Server grants access (Authorizes) Read Write Browse 14

Layering security Goals Give the least rights possible to authorized clients Eliminate ability to arbitrarily add client nodes One big firewall is not good enough DCOM and regular IT firewalls don t mix Employing OPC Security SECURE OPC COMPONENTS 15

Nested Security Perspectives Cyber Security Network Security Secure OPC Architectures Nested Security Perspectives Cyber Security Network Security Secure OPC Architectures 16

Leveraging OPC Security Specification is vendor neutral Vendor implementations vary: Most: Do not implement Some : Perform user authentication only OPC Security Gateway: Per User Per Tag Security Not all OPC products are made equal OPC Security In Action Tag level security User based ACL Read Write Browse ACL 17

OPC Security in Action Limited Tag Visibility Custom Read/Write Permission Read Write Browse ACL OPC Security in Action Tag level security Custom Read/Write Permissions Read Write Browse ACL 18

Example Company A Company B Read Write Browse Server Example Company A Company B Read Write Browse Server 19

Easy Permission Settings Per User Per Group Per Tag Example Company A Company B Read Write Browse Read Write Browse Server 20

Bringing it all together SECURING OPC ARCHITECTURES Securing Existing OPC Architectures Most OPC Servers: Do not support OPC Security Specification DCOM level authorization only Multi vendor OPC Architectures Typical Firewalls not used 21

Secure Data Access Corporate IT Server 1 Server 2 App Engineering Secure Data Access Corporate Tunneller IT Server 1 Server 2 App Engineering 22

Secure Data Access Corporate Tunneller IT Server 1 Server 2 App Engineering Secure OPC Components Minimize Accidental damage Control OPC Server Visibility Indirect access to multiple OPC Servers 23

MatrikonOPC Security Gateway Secures OPC architectures Hides OPC Servers from unauthorized users OPC Security Specification compliant Supports OPC DA and HDA Easy to use point and click security Your Turn QUESTIONS? 24