Testing Control Systems



Similar documents
DCOM & Control List Genetec Information Systems Page i Win2003 Service Pack 1

Latitude NVMS Windows XP SP2 Configuration

GE Measurement & Control. Cyber Security for Industrial Controls

Industrial Security for Process Automation

Cyber Security for NERC CIP Version 5 Compliance

Symphony Plus Cyber security for the power and water industries

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Windows Remote Access

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

FREQUENTLY ASKED QUESTIONS

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak Capture Link Server V1.00

Windows Operating Systems. Basic Security

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Computer Security: Principles and Practice

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak CR V4.1

HP Client Automation Standard Fast Track guide

RSA SecurID Ready Implementation Guide

Citect and Microsoft Windows XP Service Pack 2

XStream Remote Control: Configuring DCOM Connectivity

The Evolved Office APPLICATION PLATFORM REQUIREMENTS. Release: 16.0

Installation Guide - Client. Rev 1.5.0

5 Steps to Advanced Threat Protection

Topaz Installation Sheet

HoneyBOT User Guide A Windows based honeypot solution

DANGER indicates that death or severe personal injury will result if proper precautions are not taken.

Setup and configuration for Intelicode. SQL Server Express

GlobalSCAPE DMZ Gateway, v1. User Guide

TRIPWIRE NERC SOLUTION SUITE

CTERA Agent for Windows

DCA Local Print Agent Push Install

Cyber Security nei prodotti di automazione

Penetration Testing Report Client: Business Solutions June 15 th 2015

User Guide. CTERA Agent. August 2011 Version 3.0

System Requirements for Web Applications

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Microsoft Baseline Security Analyzer (MBSA)

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

Intelligent Power Protector User manual extension for Microsoft Virtual architectures: Hyper-V 6.0 Manager Hyper-V Server (R1&R2)

This document details the procedure for installing Layer8 software agents and reporting dashboards.

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

Kepware Technologies Remote OPC DA Quick Start Guide (DCOM)

Dell UPS Local Node Manager USER'S GUIDE EXTENSION FOR MICROSOFT VIRTUAL ARCHITECTURES Dellups.com

Emonitor INSTALLATION MANUAL INSTALLING EMONITOR SOFTWARE WITH A GUPTA SINGLE USER DATABASE

GE Measurement & Control. Cyber Security for NEI 08-09

Technical Specifications. Technical requirements for Eversheds E-Learning and Learning Management System (LMS)

Revision History Revision Date Changes Initial version published to

Compliance series Guide to meeting requirements of USGCB

F O U N D A T I O N. Using OPC via DCOM with Microsoft Windows XP Service Pack 2. Karl-Heinz Deiretsbacher, Siemens AG

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

Medical Device Security Health Imaging Digital Capture. Security Assessment Report for the Kodak DR V2.0

Diamond II v2.3 Service Pack 4 Installation Manual

Integrated Virtual Debugger for Visual Studio Developer s Guide VMware Workstation 8.0

Microsoft Software Update Services and Managed Symantec Anti-virus. Michael Satut TSS/Crown IT Support

Keeping the Lights On

Cyber security measures in protection and control IEDs

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

How To Manage A System Vulnerability Management Program

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows Server Update Services 3.0 SP2

Network Licensing. White Paper 0-15Apr014ks(WP02_Network) Network Licensing with the CRYPTO-BOX. White Paper

Vulnerability Audit: Why a Vulnerability Scan Isn t Enough. White Paper

Application Whitelisting - Extend your Security Arsenal? Mike Baldi Cyber Security Architect Honeywell Process Solutions

Server Installation, Administration and Integration Guide

VERITAS Backup Exec TM 10.0 for Windows Servers

How To Secure Your System From Cyber Attacks

Active Directory Infrastructure Design Document

Security Settings for Wonderware Products

Implementing Security Update Management

Managing and Maintaining Windows Server 2008 Servers

Taking a Proactive Approach to Linux Server Patch Management Linux server patching

Host-based Intrusion Prevention System (HIPS)

Advanced Event Viewer Manual

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

System Management. What are my options for deploying System Management on remote computers?

Appendix F: Instructions for Downloading Microsoft Access Runtime

Windows PCs & Servers are often the life-blood of your IT investment. Monitoring them is key, especially in today s 24 hour world!

Planning and Administering Windows Server 2008 Servers

System Center Configuration Manager 2007

Windows Server 2003 End of Support. What does it mean? What are my options?

Federal Desktop Core Configuration (FDCC)

Important Notes for WinConnect Server VS Software Installation:

Kaseya 2. User Guide. Version 7.0. English

SyncLockStatus Evaluator s Guide

Security and Compliance. Robert Nottoli Principal Technology Specialist Microsoft Corporation

ACTIVE DIRECTORY DEPLOYMENT

Burst Technology bt-loganalyzer SE

Why The Security You Bought Yesterday, Won t Save You Today

Installing and Configuring Windows Server Module Overview 14/05/2013. Lesson 1: Planning Windows Server 2008 Installation.

Management (CSM) Capability

Nexio Connectus with Nexio G-Scribe

OPC Server Machine Configuration

Managing and Maintaining Windows Server 2008 Servers (6430) Course length: 5 days

Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure

Transcription:

Testing Control Systems with Microsoft s Attack Surface Analyzer { Digital Bond, Inc Michael Toecker, PE ddddddddd ICSJWG October 15 th 18 th Track III

{ { Michael Toecker, PE Professional Engineer 8 Years in Control System Security and NERC CIP Compliance Began ICS Work at a Major Power Engineering Firm Cyber Security and Compliance for Owner- Operator of Critical Infrastructure (Electric Power) Digital Bond, Inc Founded in 1998 Focused on Control System Security in 2004 Perform: Consulting Research Outreach Known For: Bandolier S4 Conference Project Basecamp About

Microsoft Attack Surface Analyzer (ASA) Developed internally by the Trustworthy Computing Security Group One of several other tools that are used in the Security Development Lifecycle at Microsoft Works with the following Microsoft Operating Systems: Windows 7, 8, and Vista Windows Server 2008, 2008R2, 2012 Windows Server Core 2008, 2008 R2, 2012 Evaluates security changes that have been made by new software and updates. Snapshot model, where a set of options is captured and stored Snapshots are compared to one another, and differences enumerated Includes Ports, Services, Users, Groups, Registry, others Available at: http://goo.gl/samuz Meet The Tool

Security Issues are known to be insecure practices and configuration. Examples: Weak Access Controls on directories, files, and registry keys Services vulnerable to tampering Vulnerable COM and DCOM Attack Surface is a listing of changes made to the system since the selected baseline. Examples: New Users, Groups, and Group Memberships New TCP/UDP Ports in Use New Network Shares Meet The Tool

Spot the 8 differences? Some rights reserved by Sir Frog

{ { Security Issues Attack Surface Executables with Weak ACLs Directories Containing Objects with Weak ACLs Registry Keys with Weak ACLs Processes with Weak ACLs Process Threads with Weak ACLs Processes with NX Disabled Services Vulnerable to Tampering Services with Fast Restarts Vulnerable Named Pipes Vulnerable COM Classes Vulnerable DCOM Classes Memory Mapped Sections with Weak ACLs Snapshot Components* System Information Processes, Objects, Modules Service Information Services and Drivers (DLLs) ActiveX, DCOM, COM, File Extensions New Registered, and Permissions Internet Explorer Zones, Silent Handlers, others Network Information Ports, Pipes, RPC, Shares Firewall Rules, Profiles, Authorized Apps System Environment, Users, Groups System Path, New Users and Changes *Pulled from Microsoft Attack Surface Analyzer Readme File

Regulations require Testing for Each Significant Change Must ensure that the security of the system is not adversely impacted due to change Baseline approach is ideal for this, as only the changes are reported in the Attack Surface report Examples are: NERC CIP-007 R1 NIST SP-800-82 (Voluntary) ISA 99 Patch Management Guidelines Internal Guidelines and Policies { Owners of Control Systems Have to Meet Regulatory or Voluntary Standard Challenges Why Test at All?

Review of Changes can identify conditions that could affect production Identify Conditions that can Affect Reliability and Productivity { Case Study: Firewall Rule Changes Custom Firewall Rules were in place for an application that allowed specific communications to specific systems New Application fully rewrote those firewall rules, removing capability to communicate On next reboot, system failed to connect, causing operational workarounds to be activated Could not re-establish communication for nearly 48 hours due to operational requirements, technical issues Had MS-ASA existed, could have noticed the changes to the firewall rules, and been able to take action before this failure occurred. Why Test At All?

Verify Secure Coding Practices are being followed Require an explanation for each change in Attack Surface Require Changes for Security Issues Hedge Against Security Mistakes ASA Identifies Common Mistakes in Software Installations { Help Facilitate Security in Software Development Keep Test Code out of Production Things like Test Users, Debugging Ports, etc could be identified from ASA Reports Why Test At All?

New Software Identify Changes to Systems Over Time { Keeps track of changes, and impact of those changes Updates to Existing Software Identifies changes that are outside of usual scope, such as addition of Flash, DLLs, etc. Removed Software Ensures that all pieces of software are removed Why Test at All?

Outside Service Providers and Contractors may improve systems, and add new components Often require some modification of existing security controls or operating system configuration to work Firewall Rules Adding of Users Identifies changes that go above and beyond the scope of the authorized work { Ensure Work is Completed to Specification Why Test At All?

The Testing Process

Start Develop an Initial System Baseline Optional Virtualization Step Create Baseline as a Virtual Machine Create Initial ASA Snapshot Wait For New Changes to System or Software Initial Baseline This is a hardened operating system, locked down to the minimum necessary to have a functioning operating system Many such images exist already (i.e. DISA, FDCC, etc), and can also be developed internally Optional Virtualization Coming up Initial Attack Surface Analyzer Snapshot Snapshot must be of the hardened OS Before even standard programs are installed Domain Membership would be fine, as this often sets many hardened settings Wait for Changes Basically a pause point, where changes come in and get fed into the main process. Setup Activities

Make Change (Install Patch, New Software, Modify Configuration, etc) Load Changes into a Test Environment Make Necessary Corrections Yes Important Parts of the Main Process Create a New ASA Snapshot Generate ASA Comparison Report New ASA Snapshot Vs. Previous Snapshot Analyze the Report, React to Issues, Document Justifications Full Changes vs. Partial Changes Using an Appropriate Testing Environment No Are Corrections Necessary? Analyzing the ASA Report Main Process

Some changes will not be detectable by ASA without taking extra steps Examples: Applications that communicate with devices often need a device IP Address to enable detectable functionality Often includes OPC Servers and DNP Servers, but others exist Not fully making a change can affect important areas of the Final ASA Report, such as: Listening and Established Ports and Services Running or Stopped Services Running Processes Requires some knowledge and experimentation with change Or vendor assistance? Full Change vs Partial Change

The Attack Surface Analyzer report is only as accurate as your Test Environment s Accuracy Major Issues that Affect Accuracy Not Running appropriate Applications while taking a Snapshot Not Communicating with Devices or Other Systems Using Administrator Level accounts instead of Limited Permission Accounts { ASA-Report Accuracy = f(testenv Accuracy ) Mitigation Know how your test environment differs from an actual production deployment Gauge the impact of these differences, and determine if the cost of fixing the difference provides a suitable reward Testing Environment

What sections are you most concerned with? For NERC CIP, most concerned with new listening ports, new users, removing logging and auditing What sections are you least concerned with? For Automation pros, maybe less concerned about Internet Explorer if it s not enabled in my environment. What sections can you safely reduce in severity due to other controls, and which ones will bypass existing controls? Granting Everyone permissions often bypasses controls Firewall rule permissiveness may be less of an issue due to a perimeter firewall Make this a defined process. Analyzing the ASA Report

Questions should be asked about each change New Listening Port? Why is it there, what process is bound to it? Is that a legitimate process? New Network Share? Why does it have Everyone Permissions? Are those Permissions necessary for the application? New 3 rd Party Applications? Why does my control system need an outdated version of Flash.OCX? Or Adobe Reader 7.0? Honest Opinion Sending this report to a vendor for their justification is a valid tactic, as they should know what changes are necessary and which aren t. Plus, maybe they will start using the tool to avoid issues. Analyzing the ASA Report

Saving the new snapshot is necessary Optional Virtualization Step Save the VM for Future Use Save the New ASA Snapshot To be used as the Previous Snapshot No This is your new Baseline, used for subsequent changes Establishes a chain, where all changes can be examined back to the original Baseline Change Closeout

Testing has a cost, both in time and in materials Personnel to perform the tests may have other responsibilities License Dongles, Hardware, Software, Operating Systems all cost money Virtualization can reduce these costs by minimizing the hardware and software commitment Optional Virtualization also lowers the cost of owning certain test environments Windows and other PC based operating systems can be easily virtualized Devices are not virtualization capable (They also aren t MS-ASA compatible anyway.) Use Virtualization to manage and store previous versions of your test systems Allows investigation and rollback Re-imaging a system back to the Hardened Baseline is a mouse click Virtualization

No Support for Windows XP or Older Major stopping point for use in existing automation, but developers will find handy Captures Only What it Currently Sees If you don t run an application, changes associated with that application won t be recorded. System must be in a near production state Applications we are concerned with must be running Device Communication should be Active/Simulated Requires a Secure Baseline to Start Without the initial secure baseline, changes made by the software will be missed Allows comparison to a Gold Standard Concerns and Issues

Sample ASA Report

{ Thanks, Mike Questions?

Digital Bond s S4 Conference in Miami Beach, January 2013 Speakers Include: Travis Goodspeed Billy Rios and Terry McCorkle atlas 0f d00m Details on DigitalBond.com More Research at S4