Cyber Security From product to system solution



Similar documents
i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Document ID. Cyber security for substation automation products and systems

Symphony Plus Cyber security for the power and water industries

IT Security and OT Security. Understanding the Challenges

How To Understand And Understand The Business Strategy Of Ancient Bb

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Goals. Understanding security testing

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Innovative Defense Strategies for Securing SCADA & Control Systems

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

ABB s approach concerning IS Security for Automation Systems

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Cyber security measures in protection and control IEDs

Security Controls What Works. Southside Virginia Community College: Security Awareness

Verve Security Center

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

March

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Protecting Critical Infrastructure

The Protection Mission a constant endeavor

Analyzing Logs For Security Information Event Management Whitepaper

whitepaper 4 Best Practices for Building PCI DSS Compliant Networks

PCI DSS Policies Outline. PCI DSS Policies. All Rights Reserved. ecfirst Page 1 of 7

Analyzing Logs For Security Information Event Management Whitepaper

Brainloop Cloud Security

ISACA rudens konference

Cisco Advanced Services for Network Security

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Cybersecurity Health Check At A Glance

RuggedCom Solutions for

74% 96 Action Items. Compliance

SANS Top 20 Critical Controls for Effective Cyber Defense

Industrial Security Solutions

ICANWK406A Install, configure and test network security

Network Security Guidelines. e-governance

This is a preview - click here to buy the full publication

Defending Against Data Beaches: Internal Controls for Cybersecurity

Industrial Security for Process Automation

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

A Systems Approach to HVAC Contractor Security

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

TeleTrusT Bundesverband IT-Sicherheit e.v.

Session 14: Functional Security in a Process Environment

Cybersecurity: What CFO s Need to Know

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

We Believe in Security with a Capital S

Cisco ASA und FirePOWER Services

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Cyber security. Protecting critical infrastructure in a changing world

INFORMATION SECURITY GOVERNANCE ASSESSMENT TOOL FOR HIGHER EDUCATION

INFORMATION TECHNOLOGY ENGINEER V

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Analyzing Logs For Security Information Event Management

BUDGET LETTER PEER-TO-PEER FILE SHARING , , EXECUTIVE ORDER S-16-04

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Cyber Security for NERC CIP Version 5 Compliance

Dr. György Kálmán

How To Secure Your System From Cyber Attacks

SecFlow Security Appliance Review

IT Networking and Security

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE

WHITEPAPER. Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with NetMRI

IBM Security. Alle Risiken im Blick und bessere Compliance Kumulierte und intelligente Security Alerts mit QRadar Security Intelligence

Cyber Essentials Scheme

IP Telephony Management

Computer Security: Principles and Practice

The Value of Vulnerability Management*

Best Practices for PCI DSS V3.0 Network Security Compliance

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Network Security Administrator

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Security for NG9-1-1 SYSTEMS

Cyber Security Seminar KTH

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

Looking at the SANS 20 Critical Security Controls

TRIPWIRE NERC SOLUTION SUITE

A Decision Maker s Guide to Securing an IT Infrastructure

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Secure SCADA Network Technology and Methods

Exam 1 - CSIS 3755 Information Assurance

Connecticut Justice Information System Security Compliance Assessment Form

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Cyber Security. Smart Grid

How To Protect Data From Attack On A Network From A Hacker (Cybersecurity)

Transcription:

Markus Brändle, Network Management Forum Heidelberg, 8./9./10. October 2013 Cyber Security From product to system solution ABB Network Management Forum October 14, 2013 Slide 1

Cyber Security A definition in the context of power and automation technology Measures taken to protect a computer or computer system (as on the Internet) against unauthorized access or attack* translates into Measures taken to protect the reliability, integrity and availability of power and automation technologies against unauthorized access or attack *Merriam-Webster s dictionary

Existing regulatory frameworks Energiewirtschaftsgesetz (EnWG) currently in force: 11 (1a): "Der Betrieb eines sicheren Energieversorgungsnetzes umfasst [ ] einen angemessenen Schutz gegen Bedrohungen für Telekommunikations- und elektronische Datenverarbeitungssysteme[ ]. Die Regulierungsbehörde erstellt hierzu [ ] einen Katalog von Sicherheitsanforderungen [ ]. Ein angemessener Schutz des Betriebs eines Energieversorgungsnetzes wird vermutet, wenn dieser Katalog der Sicherheitsanforderungen eingehalten und dies vom Betreiber dokumentiert worden ist. Die Einhaltung kann von der Regulierungsbehörde überprüft werden. [ ]" The mentioned catalogue of requirements is not available yet! Images: www.bmj.de animalethics.umwblogs.org ABB Network Management Forum October 14, 2013 Slide 3

Upcoming regulatory frameworks "Referentenentwurf": "Gesetz zur Erhöhung der Sicherheit informationstechnischer Systeme" Establishes German BSI as the "competent authority. Requires operators of critical infrastructure to implement state-of-the-art security controls. Requires operators to report significant incidents to the BSI. Refers to industry standards and proven-in-the-field practices as expected state-of-the-art. Images: www.bmj.de animalethics.umwblogs.org ABB Network Management Forum October 14, 2013 Slide 4

Cyber Security Why is Cyber Security an issue? Cyber security has become an more important issue by introducing Ethernet (TCP/IP) based communication protocols to industrial automation and control systems. e.g. IEC60870-5-104, DNP 3.0 via TCP/IP or IEC61850 Connections to and from external networks (e.g. office intranet) to industrial automation and control systems have opened systems and can be misused for cyber attacks Cyber attacks on industrial automation and control systems are real and increasing, leading to large financial losses Utilities need to avoid liability due to non-compliance with regulatory directives or industry best practices October 14, 2013 Slide 5

The biggest challenges - organizational Risk Management Awareness Competence Management Compliance Images: www.guardianconsultants.co.uk wegilant.com www.floris-cm.nl blogpool4tool.com ABB Network Management Forum October 14, 2013 Slide 6

The biggest challenges - technical Installed Base Situational Awareness Sustaining Security Heterogeneity Vulnerabilities Disruptive Changes Images: www.zazzle.co.nz www.zoho.com blog.monitorscout.com www.leadthefish.com nl.123rf.com www.ccure.it ABB Network Management Forum October 14, 2013 Slide 7

Cyber Security BDEW White Paper Requirements Motivation: Security measures for control and telecommunication systems Protect the operation of these systems against security threats Main Requirements: Robustness Testing / Product & System Hardening User Account Management User activity logging / Audit Trail Secure Communication Antivirus Firewall Patch Management October 14, 2013 Slide 8

Cyber Security for the energy sector ABB Network Manager Holistic Approach to Cyber Security Protect Monitor 5. Cyber Security management system Manage 4. System protection 3. System monitoring 1. 2. System status Secure network architecture October 14, 2013 Slide 9

Cyber Security for the energy sector Steps to sustainable cyber security network architecture No direct access to secure zone No services (e.g. remote desktop) between insecure and secure zone No direct data exchange between office and SCADA network (e.g. use of data diodes) Control of traffic between zones Firewall between zones October 14, 2013 Slide 10

Cyber Security for the energy sector Steps to sustainable cyber security system monitoring Automated and centralized monitoring: Host monitoring: Event-logs, processes, resources Server and workstations Equipment monitoring: Ping, SNMP, Syslog RTUs, switches and routers Network monitoring: performance incl. SCADA protocols (e.g. IEC 60870-5- 104, DNP 3.0, Modbus, ICCP, ) Monitoring within network zones October 14, 2013 Slide 11

Cyber Security for the energy sector Steps to sustainable cyber security system protection System protection includes: Access control Antivirus systems (in Windows environments if possible) Whitelisting following need-to-know principle Security updates of applications, operating systems and third party products Trusted shares for updates of applications October 14, 2013 Slide 12

Cyber Security for the energy sector Steps to sustainable cyber security management system Fulfillment of policies: BDEW Whitepaper, DIN 27009, ISO/IEC TR 27019 Internal policies (e.g. ISMS, integrated security management systems) Asset management for IP-based system components: Baseline of current status Procurement, commissioning and service Change Management: Traceability of software changes (e.g. operating system, applications, and configurations) System restore (backup strategy) October 14, 2013 Slide 13

Cyber Security for the energy sector Partnership ABB and Industrial Defender Managing Diverse Requirements of Automation Systems Environments The convergence of: Why Industrial Defender? Global leader in automation systems management for industrial control systems Customer benefits? Technology alignment Verified solutions Combined Know-How Efficient and comprehensive security solutions October 14, 2013 Slide 14

From product to system solution Summary Cyber security from ABB is embedded in substation automation products and solutions is an integral part of product development and quality assurance comprises the latest technology and high competence enables customers to protect, monitor and manage their systems safeguards systems in a changing world October 14, 2013 Slide 15

October 14, 2013 Slide 16