A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager



Similar documents
Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

CyberArk Privileged Threat Analytics. Solution Brief

Seven Things To Consider When Evaluating Privileged Account Security Solutions

Software that provides secure access to technology, everywhere.

How Secure is Your SCADA System?

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

NATIONAL CYBER SECURITY AWARENESS MONTH

What Do You Mean My Cloud Data Isn t Secure?

Executive Summary 3. Snowden and Retail Breaches Influencing Security Strategies 3. Attackers are on the Inside Protect Your Privileges 3

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Enterprise Security Governance. Robert Coles Chief Information Security Officer and Global Head of Digital Risk & Security

SCADA Security: Challenges and Solutions

Securing Remote Vendor Access with Privileged Account Security

The data breach lifecycle: From prevention to response IAPP global privacy summit March 6, 2014 (4:30-5:30) Draft v

Compliance series Guide to meeting requirements of the UK Government Cyber Essentials Scheme

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Reducing the cost and complexity of endpoint management

Presented by: Mike Morris and Jim Rumph

Are You Ready for PCI 3.1?

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

The Four-Step Guide to Understanding Cyber Risk

Addressing APTs and Modern Malware with Security Intelligence Date: September 2013 Author: Jon Oltsik, Senior Principal Analyst

Innovative Defense Strategies for Securing SCADA & Control Systems

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

DeltaV System Cyber-Security

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

F G F O A A N N U A L C O N F E R E N C E

Don t Fall Victim to Cybercrime:

Top tips for improved network security

Cedric Leighton, Colonel, USAF (Ret) Founder & President, Cedric Leighton Associates

How-To Guide: Cyber Security. Content Provided by

Emerging Network Security Threats and what they mean for internal auditors. December 11, 2013 John Gagne, CISSP, CISA

13 Ways Through A Firewall What you don t know will hurt you

RSA Solution Brief. RSA SecurID Authentication in Action: Securing Privileged User Access. RSA Solution Brief

State of Security Survey GLOBAL FINDINGS

I ve been breached! Now what?

N-Dimension Solutions Cyber Security for Utilities

13 Ways Through A Firewall

Reducing Cyber Risk in Your Organization

Intel Cyber-Security Briefing: Trends, Solutions, and Opportunities

Security and Privacy

Five keys to a more secure data environment

Verve Security Center

Are you prepared to be next? Invensys Cyber Security

Internet threats: steps to security for your small business

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity: Building an Effective Defense

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Defending Against Data Beaches: Internal Controls for Cybersecurity

Security Best Practices for Mobile Devices

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

New York State Energy Planning Board. Cyber Security and the Energy Infrastructure

Frost & Sullivan s. Aerospace, Defence & Security Practice. Global Industrial Cyber Security Trends

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

How To Protect Yourself From A Hacker Attack

Small businesses: What you need to know about cyber security

Information Technology Security Review April 16, 2012

2012 NCSA / Symantec. National Small Business Study

This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.

Basics of Internet Security

Security Testing in Critical Systems

Nine Steps to Smart Security for Small Businesses

Teradata and Protegrity High-Value Protection for High-Value Data

Protecting Organizations from Cyber Attack

Privacy Liability & Data Breach Management Nikos Georgopoulos Cyber Risks Advisor cyrm October 2014

This is a preview - click here to buy the full publication

Perspectives on Cybersecurity in Healthcare June 2015

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

WHAT YOU NEED TO KNOW ABOUT CYBER SECURITY

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Challenges in Industrial IT-Security Dr. Rolf Reinema, Head of Technology Field IT-Security, Siemens AG Siemens AG All rights reserved

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Network/Cyber Security

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Trends in Malware DRAFT OUTLINE. Wednesday, October 10, 12

NERC CIP VERSION 5 COMPLIANCE

Transcription:

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks Alex Leemon, Sr. Manager 1

The New Cyber Battleground: Inside Your Network Over 90% of organizations have been breached In the past: I can stop everything at the perimeter Today: I can t stop anything at the perimeter Information and process security focus shifts to inside the network Over 35% of breaches are internal driven by malicious and unintentional insiders Compromised credentials empower any attacker to act as an insider Compliance and audit requirements focus on privileged accounts Privileged accounts provide access to the most sensitive and valuable assets Information exposure damages brand reputation and customer confidence 2

Critical Infrastructure is a Target A world full of attackers Nation States Criminals Hacktivists Employees Third-Party Vendors Motivation Industrial Espionage Political Protest Financial Gain Environmental Activism Blackmail or Retaliation Job Security Fun 3

Critical Infrastructure is a Target A world full of attackers Motivation Nation States Criminals Hacktivists Employees "I fully expect that during my tenure Third-Party as commander Vendors of the U.S. Cyber Command there will be offensive activity directed against critical infrastructure of the United States designed to damage, destroy, or manipulate. Mike Industrial Rogers, Director Espionage of the National Security Agency Political Protest Financial Gain Environmental Activism Retaliation Job Security Fun Reuters Cybersecurity Summit, May 2014 4

Known Attacks on Industrial Control Systems (ICS) Steel Mill, Germany Hackers worked their way into the production networks to access plant automation equipment. They disrupted the control systems that resulted in massive physical damage. Energy Info Mgmt. Co., Canada Attackers stole project files related to a remote administration and SCADA information management software.they maintain that customers were not affected. SPEAR-PHISHING ATTACK REMOTE ACCESS COMPROMISED IN SUPPLY CHAIN Oil & LNG Co., Middle East A spear-phishing attack compromised 30,000 computers with the virus Shamoon. This virus express purpose was the crippling of this oil and natural gas company. INDUSTRIAL MALWARE 5

6 The New Cyber Battleground: Inside Your Network Typical Lifecycle of a Cyber Attack

7 Privilege is a the Center of the Attack Cycle Typical Lifecycle of a Cyber Attack

Privileged Accounts - Keys to the IT Kingdom External Attackers Malicious Insiders 8

Privileged Credentials Are Everywhere Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications Routers, Firewalls, Servers, Databases, Applications Power Plants, Factory Floors Laptops, Tablets, Smartphones 9

Privileged Credentials Are Everywhere Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications Organizations Routers, Firewalls, typically have Servers, Databases, Applications 3-4x more Privileged Accounts than employees Power Plants, Factory Floors Laptops, Tablets, Smartphones 10

Hijacked Credentials Put the Attackers in Control Compromised Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications Routers, Firewalls, Servers, Databases, Applications Power Plants, Factory Floors Laptops, Tablets, Smartphones 11

Hijacked Credentials Put the Attackers in Control Compromised Privileged Accounts Routers, Firewalls, Hypervisors, Databases, Applications Enable attackers to: Bypass security controls & monitoring Routers, Firewalls, Servers, Databases, Applications Access all of the data on the device Disrupt normal operation of the device Cause physical damage Power Plants, Factory Floors Laptops, Tablets, Smartphones 12

The Common Thread: Privileged Accounts Steel Mill, Germany Hackers worked their way into the production networks to access plant automation equipment. They disrupted the control systems that resulted in massive physical damage. Energy Info Mgmt. Co., Canada Attackers stole project files related to a remote administration and SCADA information management software.they maintain that customers were not affected. SPEAR-PHISHING ATTACK REMOTE ACCESS COMPROMISED IN SUPPLY CHAIN Oil & LNG Co., Middle East A spear-phishing attack compromised 30,000 computers with the virus Shamoon. This virus express purpose was the crippling of this oil and natural gas company. INDUSTRIAL MALWARE 13

14 Privileged Account Security Breaks the Attack Chain Typical Lifecycle of a Cyber Attack

A New Critical Security Layer PERIMETER SECURITY SECURITY CONTROLS INSIDE THE NETWORK MONITORING PRIVILEGED ACCOUNT SECURITY 15

The Role of Privilege The role of privilege in the attack Attackers stole passwords to gain initial foothold Embedded passwords in the worm to facilitate its rapid spread Worm used account access to spread and cause destruction Could this have been prevented? Possibly; speculation is that a privileged insider may have been involved Attack may not have been able to prevent the initial attack Extent of damage could have been greatly reduced 16

CIP-005-5 R2: Electronic Security Perimeter(s) Interactive Remote Access Management R2.1 Utilize an Intermediate System such that the Cyber Asset initiating Interactive Remote Access does not directly access an applicable Cyber Asset R2.2 For all Interactive Remote Access sessions, utilize encryption that terminates at an Intermediate System R2.3 Require multi-factor authentication for all Interactive Remote Access sessions Beyond Regulatory Compliance: Protect your organization against advanced security threats

Best Practice Methodology to Reduce Impact Lock Down Credentials Isolate & Control Sessions Continuously Monitor Protect privileged passwords and SSH keys Prevent malware attacks and control privileged access Implement continuous monitoring across all privileged accounts The initial breach may not have been preventable, but proactive controls coupled with advanced detection would have significantly limited the resulting damage. 18

Thank you Alex Leemon Alex.leemon@CyberArk.com