Cyber Security measures in Protection and Control IEDs



Similar documents
Cyber security measures in protection and control IEDs

Document ID. Cyber security for substation automation products and systems

Symphony Plus Cyber security for the power and water industries

How To Secure Your System From Cyber Attacks

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Maruleng Local Municipality

Industrial Security Solutions

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

NERC CIP Whitepaper How Endian Solutions Can Help With Compliance

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Innovative Defense Strategies for Securing SCADA & Control Systems

Industrial Security for Process Automation

SCADA Compliance Tools For NERC-CIP. The Right Tools for Bringing Your Organization in Line with the Latest Standards

Ovation Security Center Data Sheet

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Security in the smart grid

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

SCADA SYSTEMS AND SECURITY WHITEPAPER

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

GE Measurement & Control. Cyber Security for NEI 08-09

NERC CIP Ports & Services. Part 2: Complying With NERC CIP Documentation Requirements

Secret Server Qualys Integration Guide

NERC CIP VERSION 5 COMPLIANCE

The first step in protecting Critical Cyber Assets is identifying them. CIP-002 focuses on this identification process.

DeltaV System Cyber-Security

Global Partner Management Notice

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Ovation Security Center Data Sheet

TECHNICAL WHITE PAPER. Symantec pcanywhere Security Recommendations

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Secure Shell User Keys and Access Control in PCI-DSS Compliance Environments

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

OPC UA vs OPC Classic

TRIPWIRE NERC SOLUTION SUITE

Designing a security policy to protect your automation solution

Cyber Security Seminar KTH

ReadyNAS Remote White Paper. NETGEAR May 2010

LogRhythm and NERC CIP Compliance

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Cyber Security for Substation Automation, Protection and Control Systems

Cyber Security for NERC CIP Version 5 Compliance

Executive Overview...4. Importance to Citizens, Businesses and Government...5. Emergency Management and Preparedness...6

Technical Information

CIP Cyber Security Configuration Change Management and Vulnerability Assessments

Securing Distribution Automation

INTRUSION DETECTION SYSTEMS and Network Security

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

SANS Top 20 Critical Controls for Effective Cyber Defense

Using a VPN with Niagara Systems. v0.3 6, July 2013

Verve Security Center

IT Security and OT Security. Understanding the Challenges

North American Electric Reliability Corporation: Critical Infrastructure Protection, Version 5 (NERC-CIP V5)

D2-02 B11. Cyber Security requirements and related standards for Substation Automation Systems

Secure Substation Automation for Operations & Maintenance

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

Alberta Reliability Standard Cyber Security System Security Management CIP-007-AB-5

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

GE Measurement & Control. Cyber Security for NERC CIP Compliance

IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience

Cyber Security Response to Physical Security Breaches

Technical Proposition. Security

Redesigning automation network security

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

How To Manage Security On A Networked Computer System

Cyber Security Risk Mitigation Checklist

Cyber security. Protecting critical infrastructure in a changing world

Dr. György Kálmán

Cyber Security nei prodotti di automazione

FISMA / NIST REVISION 3 COMPLIANCE

GFI White Paper PCI-DSS compliance and GFI Software products

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

SonicWALL PCI 1.1 Implementation Guide

Retention & Destruction

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

SCADA/Business Network Separation: Securing an Integrated SCADA System

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

FREQUENTLY ASKED QUESTIONS

Basics of Internet Security

The Payment Card Industry (PCI) Data Security Standards (DSS) v1.2 Requirements:

Summary of CIP Version 5 Standards

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Host-based Protection for ATM's

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Standard CIP Cyber Security Systems Security Management

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

How To Protect Your Network From Attack From Outside From Inside And Outside

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

The Comprehensive Guide to PCI Security Standards Compliance

What is Really Needed to Secure the Internet of Things?

Information Security Basic Concepts

Protecting productivity with Plant Security Services

Cyber Security and Privacy - Program 183

Computer and Network Security Policy

Transcription:

Cyber Security measures in Protection and Control IEDs K. Hagman, L. Frisk, J. Menezes, M.M. Saha ABB AB, Substation Automation Products, Sweden Keywords: security, hardening, authentication, authorization, logging. Abstract The electric power grids and power systems are critical infrastructure parts of our modern society and are ascertained by high demands on reliability and stability. At the heart of these intelligent grids we find specialized IT systems, such as substation automation systems. These systems are following standards and trends, as of which one of them is in particular Ethernet and TCP/IP based communication protocols. Evolving technologies like Ethernet and industry-specific standards such as IEC 61850 are enablers for information exchange that support not only higher reliability, but also important ensures interoperability between systems from different vendors. The paper describes the trends, security measures and provide recommendations in order to get cyber security measures in Protection and Control Intelligent Electronic Devices (IEDs). 1 Introduction Substation automation systems with protection and control have changed significantly in the past decade. Interconnectivity and information sharing have given the end users higher reliability, increased levels of control and interoperability between different vendors products and systems. This have been achieved through open standards and modern Ethernet technology [1]. This technology change have given a lot of benefits but also exposed utilities for cyber security threats that have been seen in the traditional enterprise systems since years. Tough requirements on timing, availability and environmental conditions have made it challenging to apply off the shelf technology for this domain. In the past, protection and control devices were single function and mainly hard-wire interconnected. Over the time, more and more functionality was integrated in multi-function intelligent electronic devices (IEDs). By increasing the number of functions per device, the need of communication between the devices in the system increased. The lack of broad knowledge about data communication technologies, protocols, remote access, and cybersecurity threats will increase the prospects of cyber-initiated events. Key features to safe guard electric power grids and power systems are to enable support for authentication and authorization, auditability and logging as well as product and system hardening. An easy solution to add and remove users that shall have or be revoked from having access is the implementation of a centralized account management in the substation automation This is a major benefit for the utilities that have to adhere to regulations. In the event of intrusion detection, finding unexpected usage patterns and for security forensics, the security logging mechanisms are a must. It has to be reliable, easily distributed and easily collected. Adopting new substation solutions cannot only be a technical issue but an organisational one as well. In fact, as new technical solutions are being developed and put in place, it is very important to involve P&C engineers, field technicians, and managers in the evolution and recycle process, since they will need time, training and understanding to make the transition and to be comfortable with new technologies, limitations and techniques. [2]. 2 Trends Cyber security for automation and control systems in the electric sector has constantly gained attention and importance over the last couple of years. While in the past, cyber security was not considered an issue or a nice-to-have, it has become a must-have and continues to do so. The power system is classified as critical infrastructure. There are different drivers and trends that affect the industry as a whole, e.g. how vendors must continue to address cyber security in their products, systems, processes, procedures, and services, or how end users must address security in procurement, installation and operation through both technical and non-technical means. For substation automation the cyber security requirements can be grouped in three main categories [1] of; Group 1 Basic Security Requirements: Secure system architecture such as different security zones Protect the electronic security perimeter Improve the robustness and hardening Authentication and authorization (User Account Management) Auditability and logging (User Activity Logging)

Antivirus Protection Group 2 Enhanced Security Requirements: Patch Management Application White Listing Secure communication from outside the system using https, VPN, Group 3 Security in protocols / comply with upcoming standards e.g. IEC62351: DNP 3.0 / IEC 60870-5-104 Secure authentication based on IEC 62351 Central user Account Management Certificate Handling The security requirement Group 1 needs to be addressed at first to increase the overall security of the substation automation Requirement Group 2 can provide additional security measures for those devices which are connected to a network outside the substation e.g. via a TDM or packet based WAN to the control- or maintenance centre. While the requirements Group 1 and Group 2 can be implemented already today, the requirement Group 3 needs further clarification of the IEC62351 standard. This standard is still in a changing process affecting all parts and needs at least two to three years until it is finalized. In the meantime intermediate security measures shall be considered. The last years trend in our industry have been to walk away from proprietary, vendor specific communication protocols and solutions to standardization and standards towards Ethernet and TCP/IP based solutions. end, to reduce the engineering cost and complexity for the Utilities. Given by the nature of the availability and ease of use of TCP/IP for almost everyone, the need for security gets elevated. A key element is for the standardization groups to make sure their protocols are robust and enables for good error checking on each protocol level. This especially since the protocol definitions are all public and easy for everyone to interpret and use. Another trend which can be seen is a high level of connectivity, meaning every device in our modern society have more or less a need of connectivity. This includes the power system as well as any other domain around us. The equipment needs to be configured, serviced, monitored and operated. This is valid both from within close range of the system as well as far away from the same, remote operation. Therefore standard communication infrastructure and high connectivity level forces us to take certain measures to safe guard our power We have to be able to control, monitor and protect our infrastructure. 4 Security Measures Reducing the of the system is the first way of securing it, that can be done through physically locking (physical perimeter), firewalling (blocking communication entry points) and through white-listing (allowed applications). Independent if all of these are used or only one, the attack surface [3] must be known. 4.1 Hardening To make a reliable and stable system the attack surface must be reduced and to furthest extent known. By knowing the attack surface, we know our. The attack surface is reduced by only enabling the needed physical interfaces required, and also only to enable the required services or protocols needed per interface. IEC 61850 MMS & GOOSE Station bus 1 IEC 61850 GOOSE & -9-2 Station bus N IED Figure 1: Trends in power distribution FTP DNP3 FTP IED config protocols As seen in figure 1, the sector is moving from traditional topdown generation à transmission à distribution à consumer into a grid where generation of power can be at big power plants as well as at the end consumers themselves. This have in turn led to increased data communication needs. Main reason for this have been to get higher level of interoperability between different vendor s products, and in the Figure 2: Communication Interfaces with enabled services As seen in figure 2, only the required protocols per communication interface should be enabled. If e.g. FTP isn t needed on anything but Station bus N and Service port, then it shouldn t be enabled on any other interface. This systematic results in a drastic reduction of the attack surface of our system, and on our to vulnerabilities and attacks. 2

This can be visualized as in Table 1. Protocol / Interface Station bus 1 Station bus N Process bus Service port IEC61850 MMS IEC61850 GOOSE IEC61850-9-2 FTP DNP3 IED config protocol Table 1: Selection of protocols per interface Reducing an means directly reducing the device s for vulnerabilities that can be exploited by anyone unauthorized who wants to get control over the An example, if there is a known vulnerability on a given protocol which we anyway have to use, the risk belonging to that particular vulnerability can be reduced if we make sure the protocol isn t used on interfaces with high. Figure 3: Levels of Low Medium High The closer to public interfaces and the outer perimeter the higher level our protocols get. The different levels can be described as an onion as in figure 3. The protocols selected to be run per interface must withstand improper usage, e.g. fuzzing, where unexpected packets of information (valid and invalid) are sent to the device to try to find vulnerabilities. Another vital feature is the one typically called Denial of Service (DoS) protection. Here the system have to withstand abnormal amount of data sent directly to the system as a method to prevent it from being able to communicate in a normal way. A denial of service attack on a substation automation system can prevent e.g. control commands from being issued, monitoring of measurements, GOOSE from being sent or received, time synchronization to fail. To prevent these DoS attacks as well as having the ability to log the occurrence of them are two important measures that have to be taken in the power Isolation, gives us partly what we need in terms of attack surface reduction, however, in conjunction with the hardening of the services and protocols used we also must make sure no direct routing is allowed between the different levels. Routing data from the outer levels to the inner levels will elevate the inner level to the same level as the outer level. 4.2 Authorization The second way in reducing is to enable authorization mechanisms, i.e. the user have to provide proper credentials before being authorized to use the There are several ways to provide user credentials, but the most common one is using the combination of a user name and a password. In the world of information systems, the usage of user name and password have long been debated and seen as not secure enough. This is also valid for the Power System area. As of today, most of our installations rely on physical perimeter protection only, and not authentication on each device in the What have been missing in our area are proper tools to aid the system owners to implement a working account management The tools have been insufficient, the devices have been too limited, hence the result, account management haven t been used. The key to make this a success is the usage of a centralized account management system, like Active Directory from Microsoft. A system that enables centralized control over users, passwords, groups, policies etc. These tools have now come to the Power System domain and with the enforcement of regulations like NERC CIP [4] there will be a quick change. The alternative would been to remove connectivity from the devices, which equals a step back in evolution. With a central account management system, users can be added, removed, blocked, approved and monitored. As usual, the keyword is interoperability, meaning devices and systems from different vendors must work together. Another major factor is standardization where IEC 62351 is the key to success. Once the centralized repository for users exists, the proper roles have to be given to the users. A user can have one to many roles, whereas each role represents a set of rights. IEC 62351-8 [5] have given us a pre-defined set of roles with a pre-defined set of rights. In comparison the standard defines which user roles shall have what user rights, as shown in figure 4 In order to reduce the for mistakes and vulnerabilities, it is recommended 3

to never use a role with more than necessary rights. Important to remember is that a system is never stronger than its weakest link. When it comes to set-up a system using certificates, it is very important to prevent external until all required certificates have been deployed. 4.4 Auditability After taking the steps of hardening, authorization and authentication, we have a system that is to a higher level more secure than the Power System it started with. Now the only thing missing is the visibility and ability to monitor what happens in the It is missing auditability. Figure 4: Role to right mapping The result will be a reduction of the risk of unintended failures from the user, e.g. usage an engineer role to change a configuration, not security administrator. Another great advantage of the usage of roles is the ability to add/remove people in an organization without having to assign the roles to each and every one, but assign the specific roles to the users instead, i.e. design the roles once, utilize them many times. 4.3 Authentication Once we have the mechanism for authorize users in place we need to make sure that the users can be certain that they operate on the proper devices. We also need to make sure that the devices communicate with other proper devices. It is necessary to authenticate the different entities to each other, to not allow rogue devices or systems to act as if they were proper devices. Especially when using a centralized account management system, it is mandatory to ensure that only authenticated devices are allowed to retrieve user information from that This is where certificates come into play as with certificates it can be verified that an authenticated system is talking to another authenticated When both the centralized account management server as well as the clients using are authenticated, they can exchange information like user credentials, roles, rights and certificates. Now it has a secure way to authorize users and allow them to change their passwords. If there wouldn t be a mutual authentication between the server and client, a rogue client could be used to enumerate all users in the central repository, and vice versa, if a rogue server is present, any user could be invented and given maximum rights which would circumvent the entire idea of authentication and authorization. To be able to monitor the system it is needed the discrete actions in the system to be generated as events. These events are hereby called security events and are not be mixed with what we typically call process events. Security events are used to indicate login, logout, forcing of values, changes in configurations, firmware changes, password changes, audit log access, etc. They are important part of the regulations that Utilities have to adhere to. For instance, NERC CIP requires such events to be kept for a time of 90 days within a station. In parallel to the centralized account management, there typically is a centralized security event logger in the The responsibility of this system is to log all security events from all different parts of the The central logger shall have a time correlated list of all the security events in the This is the place to audit when it comes to checking the system integrity. This is also the place for pattern recognition. To be able to see patterns and signs of abnormal behaviour, data mining can be done on the central log. Things like scanning, password breaking attempts, nodes going online/offline etc. should be monitored and searched for. By observing the normal flow of events from a particular devices during normal operation, the system/users can learn to search for the differences in the patterns. This pattern recognition is doing a similar task as an Intrusion Detection System (IDS) performs. In the case of an event, a mal-operation in the power system or abnormal device/system behaviour, the central logger is a good starting point for the forensics work. Since the events in the logs are time stamped, it should be possible to compare them with the process events and other time stamped events in the The central logger must be a trusted and reliable source of data. Tampering protection as well as read-traps, to log if someone reads the log, is normal protection. 4

5 Possible solution Interactions between the substation automation system, corporate networks and the outside world are usually handled on the station level, which means that ensuring a high level of security on the station level is vital to the security of the SA system itself. Therefore, firewalls, intrusion detection or prevention systems, or VPN technology should protect the substation automation All communication from the outside world to a substation should, for instance, be protected by using a firewall and/or VPN-enabled communication. Systems can additionally be divided into multiple security zones as needed to further improve security as shown in figure 5[1]. relied on physical perimeter protection and security-byobscurity, i.e. each vendor have had their own proprietary protocols. Those days are over, now interoperability and regulated openness in the solutions are key. The traditional approach if the system is working do not touch it has to be abandoned. It is no longer enough to judge the security and stability of a system by only looking at it as vulnerabilities can be laying below the surface. The only way to reduce the of these vulnerabilities and mitigate the risk of attacks is to keep the system up to date. By observing and measuring our systems, we build up knowledge of them, especially on the normal system states and behaviour. These security measures, i.e. hardening, authentication, authorization, and auditing, are applicable on all our systems independent of regulations on a particular market or region. The final recommendation is to continue the work of pattern analysis and recognition as well as doing studies on mechanisms to keep a system up-to-date without risking reliability and dependability of the systems. Acknowledgements The authors extend their sincere acknowledgements to the colleagues at ABB Substation Automation Products for their cooperation and supports. References Figure 5: Example for a secure system architecture Verified malware prevention software can protect station computers against attacks and viruses. This is however only efficiently possible in an automatic way, if connected to the Internet, bearing the well-known risks. Another possibility to protect the substation computer is the application white listing that can provide a heightened degree of security for substation automation systems. The approach of the application white listing is to maintain a white list of the authorized applications that are installed and make sure it doesn t change. Cyber security can be for instance further improved by limiting the use of removable media in the station computers. Additionally, the system should have integrated security mechanisms such as robust against security attacks, advanced account management and detailed security audit trails. 6 Conclusion [1] F.Hohlbaum, P.Schwyter, F.Alvarez, Cyber Security requirements and related standards for Substation Automation Systems, Cigre Study Committee D2, Colloquim, October 19-20, Buenos Aires, Argentina, (2011) [2] Application and management of cyber security measures for protection and control systems, Joint Working Group B5- D2.46,Cigre WG material,#603, December, (2014) [3] Stephen Northcutt, The Attack Surface Problem, January 7,(2011) http://www.sans.edu/research/security-laboratory/article/didattack-surface [4] NERC CIP, North American Electric Reliability Corporation, www.nerc.com [5] Power systems management and associated information exchange Data and communications security Part 8: Rolebased access control, IEC/TS 62351-8, Technical Specification, Since the trends are bringing normal IT technology into the area of Power Systems, we have to look for the same ways of protecting our systems as in the IT domain. Earlier we have 5