Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks



Similar documents
Computer System Security Updates

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Innovative Defense Strategies for Securing SCADA & Control Systems

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

Payment Card Industry (PCI) Data Security Standard

How To Secure Your System From Cyber Attacks

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Enterprise Cybersecurity: Building an Effective Defense

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Global Partner Management Notice

External Supplier Control Requirements

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

8 Steps for Network Security Protection

Evolving Optical Transport Network Security

A Systems Engineering Approach to Developing Cyber Security Professionals

CYBERTRON NETWORK SOLUTIONS

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Quelle sécurité dans une banque? " Sécurité des transactions électroniques sur Internet et KYC"

Jort Kollerie SonicWALL

Information Security Services

Certified Ethical Hacker (CEH)

Cybersecurity Strategic Talent Management. March, 2012

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

Principles of Information Assurance Syllabus

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Enterprise Cybersecurity: Building an Effective Defense

DeltaV System Cyber-Security

Network and Host-based Vulnerability Assessment

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Effective Defense in Depth Strategies

8 Steps For Network Security Protection

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

LOGIIC Remote Access. Final Public Report. June LOGIIC - APPROVED FOR PUBLIC DISTRIBUTION

Network Architecture & Active Directory Considerations for the PI System. Bryan Owen - OSIsoft Joel Langill - SCADAhacker

Overcoming PCI Compliance Challenges

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

Homeland Security Perspectives: Cyber Security Partnerships and Measurement Activities

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

NETWORK SECURITY ASPECTS & VULNERABILITIES

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Basics of Internet Security

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

CYBER SECURITY. Is your Industrial Control System prepared?

Security Issues with Integrated Smart Buildings

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

This chapter covers the following topics: Why Network Security Is Necessary Secure Network Design Defined Categorizing Network Security Threats How

Pension Benefit Guaranty Corporation. Office of Inspector General. Evaluation Report. Penetration Testing An Update

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

PCI Security Scan Procedures. Version 1.0 December 2004

Seven Strategies to Defend ICSs

Passing PCI Compliance How to Address the Application Security Mandates

Cyber Security Risk Mitigation Checklist

Best Practices for DanPac Express Cyber Security

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Introduction to Cyber Security / Information Security

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Update On Smart Grid Cyber Security

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

Top Three POS System Vulnerabilities Identified to Promote Data Security Awareness

13 Ways Through A Firewall

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Four Top Emagined Security Services

Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

Cyber Security Implications of SIS Integration with Control Networks

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Cisco Security Optimization Service

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Cyber Security for SCADA/ICS Networks

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

N-Dimension Solutions Cyber Security for Utilities

Network Security: Introduction

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation Areas for Improvement... 2

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

Vulnerability Analysis of Energy Delivery Control Systems

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014

Understanding SCADA System Security Vulnerabilities

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Telecom Testing and Security Certification. A.K.MITTAL DDG (TTSC) Department of Telecommunication Ministry of Communication & IT

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

CISCO IOS NETWORK SECURITY (IINS)

Transcription:

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks A look at multi-vendor access strategies Joel Langill TÜV FSEng ID-1772/09, CEH, CPT, CCNA Security Consultant / Staff Engineer ENGlobal Automation Houston, Texas

About the Presenter Joel Langill is a Staff Engineer and Security Consultant for ENGlobal s Automation segment based in Houston, Texas. ENGlobal is a specialty automation contractor and solution partner with many of the leading control system vendors. Joel brings a different slant to industrial security, focusing more on the importance of people and processes in order to combat potential threats and how this fits into a comprehensive defense-in-depth strategy. Joel is a TÜV certified Functional Safety Engineer, Certified Ethical Hacker, Certified Penetration Tester, and a Cisco Certified Network Associate, and is a member of ISA84, ISA87 and ISA99 committees. He has contributed to various technical publications and magazines on security, and is a featured writer for InfoSec Institute relating to ICS security. 2

Topics Covered Understanding the Security Perimeter Industrial Control System Landscape Cyber Threat Trends Control System Vulnerabilities & Security Issues Unique Aspects of Remote Access Security Objectives of Remote Access Defense-in-Depth Strategies Industry Standards Tools Additional References 3

Where is the Perimeter? 4

Who is Securing the Perimeter? 5

Industrial Control System Landscape Modern networking increases manufacturing productivity and reduces costs through integration of external, corporate and control system networks Protocols and communication standards that provide this increased interoperability are often the same technologies that have been exploited and compromised on the Internet and corporate networks Leads to vulnerabilities that can significantly reduce the cyber security posture of a manufacturing organization Can expose mission-critical control systems to cyber threats 6

Why is the problem escalating? Insecure connectivity to external networks Usage of technologies with known vulnerabilities Lack of qualified cyber security resources Lack of a cyber security business case and security program specific to control systems Vendors provide features that are often only enabled if the engineer/administrator is aware of the capability Control system protocols lack basic security functionality such as authentication and authorization Open source information 7

Cyber Threat Trends Intruder Knowledge Attack Sophistication Back Doors Disabling Audits Era of Legacy Control Hijacking Sessions Burglaries Exploiting Known Vulnerabilities Password Cracking Self-Replicating Code Systems Password Guessing Stealth / Adv Scanning Techniques Packet Spoofing Sniffers Sweepers Morphing Sophisticated Command & Control Cross-Site Scripting Denial of Service Current SCADA Zone of Defense WWW Attacks Automated Probes/Scans GUI Network Mgmt Diagnostics Era of Modern Information Malicious Code Technology BOTS Distributed Attack Tools 1980 1985 1990 1995 2000 2005 2010 Lipson, H. F., Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Special Report CMS/SEI-2002-SR-009, November 2002 8

Staying ahead of the curve Number of Security Incidents Security advisories and vendor patches become available Comprehensive Remote Access Solution Lipson, H. F., Tracking and Tracing Cyber-Attacks: Technical Challenges and Global Policy Issues, Special Report CMS/SEI-2002-SR-009, November 2002 9

Control System Vulnerabilities ICS Configuration Vulnerabilities Poor Patch Management ICS Software Vulnerabilities Project Weak User Authentication Poor Code Quality Execution VulnerabilitiesInformation Disclosure Vulnerable Web Services Insufficient Project Team Resources Poor Network Protocol Implementation Vulnerable Ancillary Applications Poor Patch Management Insecure Integration Methods Weak Authentication Insufficient Vulnerability Testing Least User Privileges Violation Insufficient Validation Testing Information Disclosure ICS Network Vulnerabilities Insufficient Documentation Lack of Network Segmentation Firewall Bypassed Access to Specific Ports not Restricted Port Security Not Implemented Common Cyber Security Vulnerabilities Observed in DHS Industrial Control Systems Assessments, DHS CSSP, July 09 Incorporating Cyber Security into your Automation Project s Execution Methodology, ENGlobal, April 2010 10

Addressing Control System Cyber Security Issues Backdoors and holes in the network perimeter Devices with little or no security features Vulnerabilities in common protocols Attacks on field devices Database attacks Communications hijacking and Man-in-the-Middle attacks Improper or nonexistent patching of software and firmware Insecure code techniques Improper cyber security procedures for internal and external personnel Lack of control systems specific mitigation technologies 11

Attacking via Databases and Trusted Relationships A Simple VPN+Firewall Solution is Not Enough Recommended Practice: Improving Industrial Control Systems Cybersecurity with Defense in Depth Strategies, DHS CSSP, October 09 12

Security Objectives for Remote Access When designing a remote access solution for control system networks, the following security objectives should be considered: Keep the bad guys out of the network Keep the bad guys in Keep everyone in the playground Completely isolate the remote client from specific networks (PCN, PIN, ELAN, WAN) Encrypt all data in transit outside the enterprise Monitor remote access traffic for any unusual or suspect activity Correlate information from multiple-sources for rapid threat identification Ability to quickly revoke access Platforms are not company-controlled which limits applications, policies, etc. Must consider various IT security policies including required firewall configurations, port access, etc. 13

DiD Disclaimer The solution and architecture that follows is meant to be a representation of the functionality and components that comprise an overall DiD strategy The implementation specifics are heavily dependent on the actual vendors chosen Components described on the following pages are available from most of leading suppliers of hardware and software solutions 14

Remote Access Profiles (Internal vs. External) 15

Remote Access Profiles (Internal vs. External) AAA Threat Mitigation 16

Review of Defense in Depth Strategies Security Risk Assessment & Quantification Process Security Policy People Network Segmentation (Zones & Conduits) Process Demilitarized Zones Process VPN with Encrypted Tunnel Product Strong Two-Factor Authentication Product Virtual LANs Product Network Access Control for Role or Policy-based Access Product Secondary Firewall from Different Vendor Product Firewall to Control Systems Network Product Security Information Event Management Product Intrusion Detection Product Equipment Selection & Procurement Process Security Awareness & Training Program People Incident Response & Forensics Process Vulnerability Testing Process 17

How much does this solution cost? Firewall with SSL/DTLS VPN Access $1,500 - $5,000 Firewall using Hardware/Software (Linux IPTables) $1,000 - $1,000 Authentication Server $1,000 - $2,000 Network Access Control $0 - $25,000 SIEM $5,000 - $45,000 Intrusion Detection $1,100 - $10,000 TOTAL $9,600 - $88,000 18

Thank you for attending! JOEL LANGILL TÜV FSEng ID 1772-09, CEH, CPT, CCNA Staff Engineering / Security Consultant ENGlobal Automation 15534 West Hardy Road Suite 100 Houston, TX 77060 http://www.englobal.com (281) 726-9813 joel.langill@englobal.com @jtlangill joel.langill 19

Global Thinking Global Solutions 20