Cyber security measures in protection and control IEDs



Similar documents
Document ID. Cyber security for substation automation products and systems

Symphony Plus Cyber security for the power and water industries

How To Secure Your System From Cyber Attacks

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Innovative Defense Strategies for Securing SCADA & Control Systems

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

External Supplier Control Requirements

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Industrial Security for Process Automation

Ovation Security Center Data Sheet

Industrial Security Solutions

LogRhythm and NERC CIP Compliance

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Global Partner Management Notice

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

GE Measurement & Control. Cyber Security for NEI 08-09

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Secret Server Qualys Integration Guide

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

How To Manage Security On A Networked Computer System

Ovation Security Center Data Sheet

Cyber Security for Substation Automation, Protection and Control Systems

Cyber Security Seminar KTH

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

TRIPWIRE NERC SOLUTION SUITE

Standard CIP Cyber Security Systems Security Management

DeltaV System Cyber-Security

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

SANS Top 20 Critical Controls for Effective Cyber Defense

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

SCADA SYSTEMS AND SECURITY WHITEPAPER

NERC CIP VERSION 5 COMPLIANCE

NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

Designing a security policy to protect your automation solution

GFI White Paper PCI-DSS compliance and GFI Software products

GE Measurement & Control. Cyber Security for NERC CIP Compliance

INTRUSION DETECTION SYSTEMS and Network Security

Standard CIP 007 3a Cyber Security Systems Security Management

FISMA / NIST REVISION 3 COMPLIANCE

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

D2-02 B11. Cyber Security requirements and related standards for Substation Automation Systems

Maruleng Local Municipality

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Verve Security Center

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Locking down a Hitachi ID Suite server

How To Achieve Pca Compliance With Redhat Enterprise Linux

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Cyber Security for NERC CIP Version 5 Compliance

Network Security Guidelines. e-governance

SonicWALL PCI 1.1 Implementation Guide

ABB s approach concerning IS Security for Automation Systems

Technical Proposition. Security

Avaya TM G700 Media Gateway Security. White Paper

Avaya G700 Media Gateway Security - Issue 1.0

c) Password Management The assignment/use of passwords is controlled in accordance with the defined Password Policy.

Technical Standards for Information Security Measures for the Central Government Computer Systems

BSM for IT Governance, Risk and Compliance: NERC CIP

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

Basics of Internet Security

The Comprehensive Guide to PCI Security Standards Compliance

Technical Information

Cyber Security Risk Mitigation Checklist

SUPPLIER SECURITY STANDARD

Dr. György Kálmán

Data Management Policies. Sage ERP Online

Securing Distribution Automation

A Systems Approach to HVAC Contractor Security

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Critical Security Controls

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Cyber security. Protecting critical infrastructure in a changing world

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

What is Really Needed to Secure the Internet of Things?

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

IT Security and OT Security. Understanding the Challenges

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

How To Protect Your Network From Attack From Outside From Inside And Outside

Summary of CIP Version 5 Standards

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

SCADA/Business Network Separation: Securing an Integrated SCADA System

Cyber Watch. Written by Peter Buxbaum

ForeScout CounterACT and Compliance June 2012 Overview Major Mandates PCI-DSS ISO 27002

Cyber Security Response to Physical Security Breaches

¼ããÀ ããè¾ã ¹ãÆãä ã¼ãîãä ã ããõà ãäìããä ã½ã¾ã ºããñ à Securities and Exchange Board of India

Transcription:

Cyber security measures in protection and control IEDs K. Hagman 1, L.Frisk 1, J. Menezes 1 1 ABB AB, Sweden krister.hagman@se.abb.com Abstract: The electric power grids and power systems are critical infrastructure parts of our modern society and are ascertained by high demands on reliability and stability. These systems are following standards and trends, as of which one of them is in particular Ethernet and TCP/IP based communication protocols. Evolving technologies like Ethernet and industry- specific standards such as IEC 61850 are enablers for information exchange that support not only higher reliability, but also important ensures interoperability between systems from different vendors. Key features to safe guard our grids are to enable support for authentication and authorization, auditability and logging as well as product and system hardening. An easy solution to add and remove users that shall have or be revoked from having access is the implementation of a centralized account management in the substation automation system. This is a major benefit for the utilities that have to adhere to regulations. In the event of intrusion detection, finding unexpected usage patterns and for security forensics, the security logging mechanisms are a must. It has to be reliable, easily distributed and easily collected. By adding centralized account management to our systems we can easily enhance the security in the substation automation system. Role based account management is not only enabling us to have the proper access rights per user and per role but also helps us reduce the errors created by the human factor. The principle of least privilege ensure that system components as well as humans interacting with the system have access only to the information and resources that are necessary for their legitimate purpose. The paper describes the trends, security measures and provide recommendations in order to get cyber security measures in Protection and Control Intelligent Electronic Devices (IEDs). Keywords: security, hardening, authentication, authorization, logging, centralized I. INTRODUCTION Substation automation systems with protection and control have changed significantly in the past decade. Interconnectivity and information sharing have given the end users higher reliability, increased levels of control and interoperability between different vendors products and systems. This have been achieved through open standards and modern Ethernet technology. [4]. This technology change have given a lot of benefits but also exposed utilities for cyber security threats that have been seen in the traditional enterprise systems since years. Tough requirements on timing, availability and environmental conditions have made it challenging to apply off the shelf technology for this domain. In the past, protection and control devices were single function and mainly hard-wire interconnected. Over the time, more and more functionality was integrated in multi-function intelligent electronic devices (IEDs). By increasing the number of functions per device, the need of communication between the devices in the system increased. The lack of broad knowledge about data communication technologies, protocols, remote access, and cybersecurity threats will increase the prospects of cyberinitiated events. Key features to safe guard electric power grids and power systems are to enable support for authentication and authorization, auditability and logging as well as product and system hardening. An easy solution to add and remove users that shall have or be revoked from having access is the implementation of a centralized account management in the substation automation system. This is a major benefit for the utilities that have to adhere to regulations. In the event of intrusion detection, finding unexpected usage patterns and for security forensics, the security logging mechanisms are a must. It has to be reliable, easily distributed and easily collected. Adopting new substation solutions

cannot only be a technical issue but an organizational one as well. In fact, as new technical solutions are being developed and put in place, it is very important to involve P&C engineers, field technicians, and managers in the evolution and recycle process, since they will need time, training and understanding to make the transition and to be comfortable with new technologies, limitations and techniques. [5]. II. TRENDS Cyber security for automation and control systems in the electric sector has constantly gained attention and importance over the last couple of years. While in the past, cyber security was not considered an issue or a nice-to-have, it has become a must-have and continues to do so. The power system is classified as critical infrastructure. There are different drivers and trends that affect the industry as a whole, e.g. how vendors must continue to address cyber security in their products, systems, processes, procedures, and services, or how end users must address security in procurement, installation and operation through both technical and non-technical means. For substation automation the cyber security requirements can be grouped in three main groups of 1. Basic security requirements a) Secure system architecture such as different security zones b) Protect the electronic security perimeter c) Improve the robustness and hardening d) Authentication and authorization (User account management) e) Auditability and logging (User activity logging) f) Antivirus protection 2. Enhanced security requirements a) Patch management b) Application white listing c) Secure communication to/from the substation automation system using https, VPN, 3. Security in protocols / comply with upcoming standards (e.g. IEC 62351) a) DNP 3.0 / IEC 60870-5-104 Secure authentication based on IEC 62351 b) Central user account management c) Certificate handling The security requirement Group 1 needs to be addressed at first to increase the overall security of the substation automation system. Requirement Group 2 can provide additional security measures for those devices which are connected to a network outside the substation e.g. via a TDM or packet based WAN to the control- or maintenance center. While the requirements Group 1 and Group 2 can be implemented already today, the requirement Group 3 needs further clarification of the IEC62351 standard. This standard is still in a changing process affecting all parts and needs at least two to three years until it is finalized. In the meantime intermediate security measures shall be considered.

The last years trend in our industry have been to walk away from proprietary, vendor specific communication protocols and solutions to standardization and standards towards Ethernet and TCP/IP based solutions. Figure 1: Trends in power distribution As seen in Figure 1, the sector is moving from traditional top-down generation transmission distribution consumer into a grid where generation of power can be at big power plants as well as at the end consumers themselves. This have in turn led to increased data communication needs. Main reason for this have been to get higher level of interoperability between different vendor s products, and in the end, to reduce the engineering cost and complexity for the Utilities. Given by the nature of the availability and ease of use of TCP/IP for almost everyone, the need for security gets elevated. A key element is for the standardization groups to make sure their protocols are robust and enables for good error checking on each protocol level. This especially since the protocol definitions are all public and easy for everyone to interpret and use. Another trend which can be seen is a high level of connectivity, meaning every device in our modern society have more or less a need of connectivity. This includes the power system as well as any other domain around us. The equipment needs to be configured, serviced, monitored and operated. This is valid both from within close range of the system as well as far away from the same, remote operation. Therefore standard communication infrastructure and high connectivity level forces us to take certain measures to safe guard our power system. We have to be able to control, monitor and protect our infrastructure. III. SECURITY MEASURES Reducing the exposure of the system is the first way of securing it, that can be done through physically locking (physical perimeter), firewalling (blocking communication entry points) and through white-listing (allowed applications). Independent if all of these are used or only one, the attack surface [1] must be known. The following chapters (IV VII) will cover this topic. IV. HARDENING To make a reliable and stable system the attack surface must be reduced and to furthest extent known. By knowing the attack surface, we know our exposure. The attack surface is reduced by only enabling the needed physical interfaces required, and also only to enable the required services or protocols needed per interface.

IEC 61850 MMS & GOOSE Station bus 1 IEC 61850 GOOSE & -9-2 Station bus N IED FTP DNP3 FTP IED config protocols Figure 2: Communication interfaces with enabled services As seen in Figure 2, only the required protocols per communication interface should be enabled. If e.g. FTP isn t needed on anything but Station bus N and Service port, then it shouldn t be enabled on any other interface. This systematic results in a drastic reduction of the attack surface of our system, and on our exposure to vulnerabilities and attacks. This can be visualized as in Table 1. Table 1: Selection of protocols per interface Reducing an exposure means directly reducing the device s exposure for vulnerabilities that can be exploited by anyone unauthorized who wants to get control over the system. An example, if there is a known vulnerability on a given protocol which we anyway have to use, the risk belonging to that particular vulnerability can be reduced if we make sure the protocol isn t used on interfaces with high exposure.

Figure 3: Levels of exposure The closer to public interfaces and the outer perimeter the higher exposure level our protocols get. The different exposure levels can be described as an onion as in Figure 3. The protocols selected to be run per interface must withstand improper usage, e.g. fuzzing, where unexpected packets of information (valid and invalid) are sent to the device to try to find vulnerabilities. Another vital feature is the one typically called Denial of Service (DoS) protection. Here the system have to withstand abnormal amount of data sent directly to the system as a method to prevent it from being able to communicate in a normal way. A denial of service attack on a substation automation system can prevent e.g. control commands from being issued, monitoring of measurements, GOOSE from being sent or received, time synchronization to fail. To prevent these DoS attacks as well as having the ability to log the occurrence of them are two important measures that have to be taken in the power system. Isolation, gives us partly what we need in terms of attack surface reduction, however, in conjunction with the hardening of the services and protocols used we also must make sure no direct routing is allowed between the different exposure levels. Routing data from the outer levels to the inner levels will elevate the inner level to the same exposure level as the outer level. V.AUTHORIZATION The second way in reducing exposure is to enable authorization mechanisms, i.e. the user have to provide proper credentials before being authorized to use the system. There are several ways to provide user credentials, but the most common one is using the combination of a user name and a password. In the world of information systems, the usage of user name and password have long been debated and seen as not secure enough. This is also valid for the Power System area. As of today, most of our installations rely on physical perimeter protection only, and not authentication on each device in the system. What have been missing in our area are proper tools to aid the system owners to implement a working account management system. The tools have been insufficient, the devices have been too limited, hence the result, account management haven t been used. The key to make this a success is the usage of a centralized account management system, like Active Directory from Microsoft. A system that enables centralized control over users, passwords, groups, policies etc. These tools have now come to the Power System domain and with the enforcement of regulations like NERC CIP [2] there will be a quick change. The alternative would been to remove connectivity from the devices, which equals a step back in evolution. With a central account management system, users can be added, removed, blocked, approved and monitored. As usual, the keyword is interoperability, meaning devices and systems from different vendors must work together. Another major factor is standardization where IEC 62351 is the key to success. Once the centralized repository for users exists, the proper roles have to be given to the users. A user can have one to many roles, whereas each role represents a set of rights. IEC 62351-8 [3] have given us a pre-defined set of roles with a pre-defined set of rights. In comparison the standard defines which user roles shall have what user rights, as shown in Figure 4.

Figure 4: Role to right mapping In order to reduce the exposure for mistakes and vulnerabilities, we recommend to never use a role with more than necessary rights. The result will be a reduction of the risk of unintended failures from the user, e.g. usage an engineer role to change a configuration, not security administrator. Another great advantage of the usage of roles is the ability to add/remove people in an organization without having to assign the roles to each and every one, but assign the specific roles to the users instead, i.e. design the roles once, utilize them many times. VI. AUTHENTICATION Once we have the mechanism for authorize users in place we need to make sure that the users can be certain that they operate on the proper devices. We also need to make sure that the devices communicate with other proper devices. It is necessary to authenticate the different entities to each other, to not allow rogue devices or systems to act as if they were proper devices. Especially when using a centralized account management system, it is mandatory to ensure that only authenticated devices are allowed to retrieve user information from that system. This is where certificates come into play as with certificates it can be verified that an authenticated system is talking to another authenticated system. When both the centralized account management server as well as the clients using are authenticated, they can exchange information like user credentials, roles, rights and certificates. Now we have a secure way to authorize users and allow them to change their passwords. If there wouldn t be a mutual authentication between the server and client, a rogue client could be used to enumerate all users in the central repository, and vice versa, if a rogue server is present, any user could be invented and given maximum rights which would circumvent the entire idea of authentication and authorization. Important to remember is that a system is never stronger than its weakest link. When it comes to set-up a system using certificates, it is very important to prevent external exposure until all required certificates have been deployed. VII. AUDITABILITY After taking the steps of hardening, authorization and authentication, we have a system that is to a higher level more secure than the Power System we started with. Now the only thing missing is the visibility and ability to monitor what happens in the system. We are missing auditability. To be able to monitor the system we need the discrete actions in the system to be generated as events. These events are hereby called security events and are not be mixed with what we typically call process events. Security events are used to indicate login, logout, forcing of values, changes in configurations, firmware changes, password changes, audit log access, etc. They are important part of the regulations that Utilities have to adhere to. For instance, NERC CIP requires such events to be kept for a time of 90 days within a station. In parallel to the centralized account management, there typically is a centralized security event logger in the system. The responsibility of this system is to log all security events from all different parts of the system. The central logger shall have a time correlated list of all the security events in the system. This is the place to audit when it comes to checking the system integrity. This is also the place for pattern

recognition. To be able to see patterns and signs of abnormal behavior, data mining can be done on the central log. Things like scanning, password breaking attempts, nodes going online/offline etc. should be monitored and searched for. By observing the normal flow of events from a particular devices during normal operation, the system/users can learn to search for the differences in the patterns. This pattern recognition is doing a similar task as an Intrusion Detection System (IDS) performs. In the case of an event, a mal-operation in the power system or abnormal device/system behavior, the central logger is a good starting point for the forensics work. Since the events in the logs are time stamped, it should be possible to compare them with the process events and other time stamped events in the system. The central logger must be a trusted and reliable source of data. Tampering protection as well as read-traps, to log if someone reads the log, is normal protection. VIII. POSSIBLE SOLUTION TO ADDRESS SECURITY FOR SUBSTATION AUTOMATION [4] Interactions between the substation automation system, corporate networks and the outside world are usually handled on the station level, which means that ensuring a high level of security on the station level is vital to the security of the SA system itself. Therefore, firewalls, intrusion detection or prevention systems, or VPN technology should protect the substation automation system. All communication from the outside world to a substation should, for instance, be protected by using a firewall and/or VPN-enabled communication. Systems can additionally be divided into multiple security zones as needed to further improve security as shown in Figure 5. Figure 5: Example for a secure system architecture Verified malware prevention software can protect station computers against attacks and viruses. This is however only efficiently possible in an automatic way, if connected to the Internet, bearing the well-known risks. Another possibility to protect the substation computer is the application white listing that can provide a heightened degree of security for substation automation systems. The approach of the application white listing is to maintain a white list of the authorized applications that are installed and make sure it doesn t change. Cyber security can be for instance further improved by limiting the use of removable media in the station computers. Additionally, the system should have integrated security mechanisms such as robust against security attacks, advanced account management and detailed security audit trails. IX. CONCLUSION Since the trends are bringing normal IT technology into the area of Power Systems, we have to look for the same ways of protecting our systems as in the IT domain. Earlier we have relied on physical perimeter protection and security-by-obscurity, i.e. each vendor have had their own proprietary protocols. Those days are over, now interoperability and regulated openness in the solutions are key.

The traditional approach if the system is working do not touch it has to be abandoned. It is no longer enough to judge the security and stability of a system by only looking at it as vulnerabilities can be laying below the surface. The only way to reduce the exposure of these vulnerabilities and mitigate the risk of attacks is to keep the system up to date. By observing and measuring our systems, we build up knowledge of them, especially on the normal system states and behavior. These security measures, i.e. hardening, authentication, authorization, and auditing, are applicable on all our systems independent of regulations on a particular market or region. The final recommendation is to continue the work of pattern analysis and recognition as well as doing studies on mechanisms to keep a system up-to-date without risking reliability and dependability of the systems. X.ACKNOWLEDGEMENTS The authors extend their sincere acknowledgements to the colleagues at ABB Grid Automation Products for their cooperation and supports. XI. REFERENCES [1] Stephen Northcutt, The Attack Surface Problem, http://www.sans.edu/research/security-laboratory/article/did-attack-surface [2] NERC CIP, North American Electric Reliability Corporation, www.nerc.com [3] IEC/TS 62351-8, Technical Specification, Power systems management and associated information exchange Data and communications security Part 8 : Role-based access control [4] F.Hohlbaum, P.Schwyter, F.Alvarez, Cyber Security requirements and related standards for Substation Automation Systems, Cigre Study Committee D2, Colloquim, October 19-20, Buenos Aires, Argentina, (2011)Cigre colloquium, 2011 F Hohlbaum [5] Application and management of cyber security measures for protection and control systems, Joint Working Group B5-D2.46,Cigre WG material,#603, December, (2014)