Implementation of Operator Authentication Processes on an Enterprise Level. Mark Heard Eastman Chemical Company



Similar documents
Role Based Access Control for Industrial Automation and Control Systems

NetIQ Advanced Authentication Framework - Smartphone Applications

NetIQ Advanced Authentication Framework - Client. User's Guide. Version 5.1.0

IBM Security Access Manager for Enterprise Single Sign-On Version User Guide IBM SC

Enterprise Solution for Remote Desktop Services System Administration Server Management Server Management (Continued)...

HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE

Web Based. Fingerprint Time & Attendance Service

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Password Manager Windows Desktop Client

Why Use ThinManager to Manage Thin Clients? White Paper. For more information, please visit:

Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite.

Remote Access Platform. Architecture and Security Overview

Using Rsync for NAS-to-NAS Backups

Installation Notes for Outpost Network Security (ONS) version 3.2

Endpoint Security VPN for Windows 32-bit/64-bit

Management of Hardware Passwords in Think PCs.

Two-factor authentication Free portable encryption for USB drive Hardware disk encryption Face recognition logon

ACER ProShield. Table of Contents

Setting up VPN and Remote Desktop for Home Use

Propalms TSE Deployment Guide

Daylite Server Admin Guide (Dec 09, 2011)

VMware AlwaysOn Point of Care Desktop. with Indigo Identityware software for Fast Access & Strong Authentication with Roaming Desktops

5 Day Imprivata Certification Course Agenda

Sonian Getting Started Guide October 2008

DriveLock and Windows 7

Setting up VPN and Remote Desktop for Home Use

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Security White Paper The Goverlan Solution

solutions Biometrics integration

SafeGuard Enterprise User help. Product version: 6.1

Presenter s name here Date of presentation (optional) Windows Security and Domains for Experion

System Integration Software

ManageEngine Desktop Central Training

SafeGuard Enterprise User help. Product version: 6 Document date: February 2012

Emerson Smart Firewall

XyLoc Windows7 Client Release Notes

Advanced Configuration Steps

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

NETWRIX IDENTITY MANAGEMENT SUITE

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

Working Together Managing and Securing Enterprise Mobility WHITE PAPER. Larry Klimczyk Digital Defence P:

DigitalPersona Pro Enterprise

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Secret Server Qualys Integration Guide

GoldKey Software. User s Manual. Revision WideBand Corporation Copyright WideBand Corporation. All Rights Reserved.

Start Here. P5100 Fingerprint Reader. Quick Installation Guide. Verifi. IMPORTANT. This installation manual is for Windows 8.1.

For keyboard and touchscreen BlackBerry devices User manual

USER GUIDE WWPass Security for Windows Logon

Remote Services. Managing Open Systems with Remote Services

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Check Point FDE integration with Digipass Key devices

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

Start Here. P5100 Fingerprint Reader. Quick Installation Guide. Verifi. IMPORTANT. This product must be used with Windows 7 or 8.

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Windows 7, Enterprise Desktop Support Technician

GE Measurement & Control. Cyber Security for NEI 08-09

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

McAfee Endpoint Encryption (SafeBoot) User Documentation

How To Set Up Safetica Insight 9 (Safetica) For A Safetrica Management Service (Sms) For An Ipad Or Ipad (Smb) (Sbc) (For A Safetaica) (

Easy Data Centralization with Webster. User Guide

PowerPanel Business Edition USER MANUAL

Windows 7, Enterprise Desktop Support Technician Course 50331: 5 days; Instructor-led

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

System Area Manager. Remote Management

Internet Filtering Appliance. User s Guide VERSION 1.2

Two Factor Authentication. Software Version (SV) 1.0

for Networks Installation Guide for the application on the server July 2014 (GUIDE 2) Lucid Rapid Version 6.05-N and later

Diamond II v2.3 Service Pack 4 Installation Manual

Get Success in Passing Your Certification Exam at first attempt!

Shared File Room Field Guide

Multi-factor authentication

TrueEdit Remote Connection Brief

A Guide to New Features in Propalms OneGate 4.0

Integrating LANGuardian with Active Directory

Course Description. Course Audience. Course Outline. Course Page - Page 1 of 12

Help System. Table of Contents

for Networks Installation Guide for the application on the server August 2014 (GUIDE 2) Lucid Exact Version 1.7-N and later

Implementing HIPAA Compliance with ScriptLogic

Liquid Machines Document Control Client Version 7. Helpdesk Run Book and Troubleshooting Guide

Maximize the Productivity of Your Help Desk With Proxy Networks Remote Support Software

RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2

PROPALMS TSE 6.0 March 2008

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Password Reset PRO INSTALLATION GUIDE

DIGIPASS Authentication for Windows Logon Product Guide 1.1

Setup and Configuration Guide for Pathways Mobile Estimating

"Charting the Course to Your Success!" MOC D Windows 7 Enterprise Desktop Support Technician Course Summary

How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment

Remote Desktop Services User's Guide

WD My Cloud EX4 Personal Cloud Storage Release Notes for Firmware

Active Directory Self-Service FAQ

Cashless Prepaid Card Systems Vending Systems for Prisons Biometrics Time & Attendance Kiosks Custom Technology Solutions

How To Create An Easybelle History Database On A Microsoft Powerbook (Windows)

Advanced Diploma In Hardware, Networking & Server Configuration

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Shared File Room Field Guide. Version 5.5

Transcription:

Implementation of Operator Authentication Processes on an Enterprise Level Mark Heard Eastman Chemical Company

Presenter Mark Heard, Eastman Chemical Company Control System Engineer Experience with several kinds of automation systems, especially networking with other plant systems General interest in security and admin issues for MCS Work on Eastman Cybersecurity teams Process Control Network Security, 2003- Network Segmentation, 2004- Cybersecurity Vulnerability Assessment, 2005- Process Automation Systems Authentication, 2006- Systems Integrity, 2008- Working with ISA, ChemITC (formerly CIDX) since 2002

Brief History of Control System Security In The Good Old Days Proprietary or VAX/VMS O/S Dedicated Operator Workstations Physical Key Access Controls Operator/Supervisor/Engineer Easily shared Hard to duplicate Obvious if lost or stolen Operator Supervisor Engineer Connect to ProcessControl Connecting to ProcessControl.com Operator Make way for Windows! Inexpensive standardized hardware UserID/Password Access Control Group Accounts Maintain process visibility & control Diminished access control Loss of accountability

CIA and AIC Security Models For Information Systems Confidentiality is #1 Integrity is #2 Availability is #3 For Control Systems Availability is #1 Integrity is #2 Confidentiality is #3 All Systems Must Protect People Property Information

Corporate Team Formed Assessment of DCS Security by I/T based Auditors revealed a potential risk Team formed to address the risk Combination of DCS and I/T backgrounds on team Charge from Executive Team Address Control Room Operator Authentication Is It Possible? Is There 1 Optimal Solution? What is the Cost? Lead Instead of Wait and See Process Control Systems Involved Honeywell TDC, TPS, Experion NovaTech D/3 Emerson WDPF, Ovation, DeltaV

Challenges Different Hardware/Software Configurations for Each DCS Vendor Proprietary Input Devices Security Model Delivered by DCS Vendors Segmented Networks Ease of Use vs Security High Availability, Robustness Implementation

Review of DCS Vendor Security Models Find out what was in place and what is planned Most Vendors are waiting for Customer Demand Industry "Best Practice" guidance recommends waiting on Vendor developed solutions Catch 22 Scenario

Authentication Requirements Musts: Authenticates process control system operators by Eastman domain UserID and Password. Runs without a network connection in cached credentials mode (automatic). Verifies user authorization before allowing interaction with the process control system. Supports emergency unlock (login bypass) with notification to designated system administrators. Process control displays remain visible at all times (transparent).

Authentication Requirements (Continued) Musts Can only be configured, disabled or stopped by authorized administrators. Uses standard Windows domain authentication (Eastman network UserID's and Passwords). High Priority Needs: Logs all user authentication and authorization activity. Locks out user again after a predetermined period of user inactivity. Supports remote administration and reporting through remote registry/event-log connection

Authentication Requirements (Continued) Needs: Logs all user control system activity tagged with the UserID Honeywell's Sign-on Manager was the best fit to most of our requirements

Group Account Transparency Enabler Accountability Access Control Audit Trails Transparency GATE Ease of Use

GATE Operator Authentication Interface Operator Authentication (Domain Login) Logoff Current User Emergency Unlock Hide Login Form We could just make everyone logon to Windows Not a popular option! Identifying Logon Log Me Out Configure Service Review Activity Logs Register Fingerprints Service Configuration & Login History Review Very Cool Very Fast Very Easy

GATE Authentication Service Architecture Operating System Keyboard and Mouse Events Operator Workstation Fingerprint Reader ALARM GATE Operator Authentication Service Event Log Keyboard and Mouse Events All Other Applications GATE is implemented as a low level hook into the Windows Operating System. It flies below radar and does not interact directly with applications running on the workstation. Keyboard and Mouse events are blocked until an authorized operator authenticates with UserID/Password or biometric fingerprint identification.

GATE Key Design Considerations User Interface Must be almost completely intuitive. Not reasonable to expect a lengthy enrollment process. Must be fast! Cannot get in the way during an emergency situation. Must not block visibility of process control graphics. Use existing EMN UserID's and Passwords. Nothing new to remember! Enroll once. Use everywhere.

GATE Key Design Considerations (Continued) Technology Don't monkey around with GINA and take chances with Windows stability! Don't make any changes to DCS vendor software. Maintain process isolation! Don't plan on having 24x7, 99.999% connectivity to the corporate network. Must stand alone! Provide facility for remote configuration and maintenance. Log everything in a place where the users cannot easily corrupt or delete the data.

GATE Key Design Considerations (Continued) Auditability Must be able to identify who had control at what time. Must be able to annotate activity logs. (Management responsibility when emergency unlock is used) Must be able to export logs for auditors. Auditors may not have administrative rights.

GATE Failsafe Mechanisms Software Crash Network Outage Forgotten Password Fingerprint Reader Failure Gate fails "open" (unlocked) Gate operates from locally cached data Use the fingerprint reader or Emergency Unlock feature Login by UserID/Password Software Freeze Data Loss/Corruption Logon or Unlock remotely from another workstation reboot option is always available Synchronize with data from another workstation Can't wait for Logon!!! EMERGENCY Click on the Emergency Unlock button twice or use Control/Alt/End hotkey.

Biometric User Registration and Authentication Self Registration User must authenticate by UserID and password immediately before registering fingerprint images. Fingerprints are stored by simply touching a finger on the reader. Users should store multiple fingerprint images (at least 4) to insure reliable recognition. Up to 10 images can be stored for each user. Different fingers can be used for each image. Authentication Fingerprint recognition is equivalent to entering UserID and Password for gaining system access. Recognition and logon will normally take less than 1 second.

Peer-to-Peer Synchronization Architecture IP Sockets layer messaging on a firewall restricted access port. Operator Workstation Application configuration and user authentication data is shared across all workstations on a DCS network. All workstations are capable of operating in stand-alone mode with no network connectivity. Data synchronization will normally occur within a few seconds of any change. Fingerprint Reader Operator Workstation Fingerprint Reader Operator Workstation Fingerprint Reader An operator can login once to a defined group of workstations on a DCS network. Peer-to-Peer data synchronization occurs on an IP port that is blocked at the control network firewall. Workstations will periodically verify data synchronization and "catch-up" any machines that have been offline.

Costs One Time Software Purchases Fingerprint Recognition SDK < $5000 Virtual Serial Port SDK < $500 Per Operator Workstation Fingerprint Reader < $40 USB Extension Cable (if needed) < $10

Project Status Piloted in manufacturing areas: Tested on Novatech D/3, Emerson Ovation, DeltaV, and Honeywell TPS, Experion Testing in all areas of Kingsport, TN Site Fully Operational in the Corporate Network Control Center Used by technicians in the control center Systems monitor I/T computers and networks Deployed 2H2007 to Manufacturing Control Rooms

Enhancements Network fault tolerance GATEway Service for non-trusted domains or workgroups GATE Usage Reports and Analyzer (automated) Automatic software updates (no reboot!) Future Vista support 2 factor authentication

Where Do We Go From Here Operator Authentication is Here to Stay Simply Using Windows Authentication is NOT Adequate for Control Systems Engage Vendors to Integrate Solutions into the Standard Product

Questions? Contact Information: Mark Heard mheard@eastman.com 423-229-3516