You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell



Similar documents
Missing the Obvious: Network Security Monitoring for ICS

What happens when you use nmap or a fuzzer on an ICS?

Network Security Monitoring

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Network Security Monitoring

Network Security Monitoring: Looking Beyond the Network

OPC & Security Agenda

Defending Against Data Beaches: Internal Controls for Cybersecurity

Network Security Monitoring Theory and Practice

The principle of Network Security Monitoring[NSM]

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Intrusion Detection Systems. Darren R. Davis Student Computing Labs

Peeling Back the Layers of the Network Security with Security Onion Gary Smith, Pacific Northwest National Laboratory

Industrial Control System Cyber Situational Awareness. Robert M. Lee* June 10 th, 2015

Network Instruments white paper

IT Security and OT Security. Understanding the Challenges

Security Onion. Peel Back the Layers of Your Network in Minutes. Doug Burks

Network- vs. Host-based Intrusion Detection

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

New Era in Cyber Security. Technology Development

Architecture Overview

SCADA Security Training

INTRUSION DETECTION SYSTEMS and Network Security

An Open Source IPS. IIT Network Security Project Project Team: Mike Smith, Sean Durkin, Kaebin Tan

Network Security Monitoring

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Richard Bejtlich / taosecurity.blogspot.com BSDCan 14 May 04

SANS Top 20 Critical Controls for Effective Cyber Defense

INTRUSION DETECTION SYSTEM

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

CYBER SECURITY. Is your Industrial Control System prepared?

Targeted Intrusion Remediation: Lessons From The Front Lines. Jim Aldridge

FIREWALLS & CBAC. philip.heimer@hh.se

InterPath Financial Institution: Network Security Implementation. By Allan Feid

CMPT 471 Networking II

WHITE PAPER PROCESS CONTROL NETWORK SECURITY: INTRUSION PREVENTION IN A CONTROL SYSTEMS ENVIRONMENT

Practical Steps To Securing Process Control Networks

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

NETWORK SECURITY. 3 Key Elements

NETWORK SECURITY (W/LAB) Course Syllabus

ScotGrid. Bolting the door. Network Based Security Mechanisms. David Crooks, Mark Mitchell on behalf of ScotGrid Glasgow

Concierge SIEM Reporting Overview

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Intrusion Detection in AlienVault

Understanding SCADA System Security Vulnerabilities

Security Controls Implementation Plan

Network/Internet Forensic and Intrusion Log Analysis

Our Security. History of IDS Cont d In 1983, Dr. Dorothy Denning and SRI International began working on a government project.

CS : Digital Forensics Fall 2006 Instructors: Lorie Liebrock, Bob Hutchinson and David Duggan

SCADA SYSTEMS AND SECURITY WHITEPAPER

Cisco Secure PIX Firewall with Two Routers Configuration Example

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Fail-Safe IPS Integration with Bypass Technology

HOSTING. Managed Security Solutions. Managed Security. ECSC Solutions

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

NETWORK SECURITY. Scott Hand. Melanie Rich-Wittrig. Enrique Jimenez

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Building A Secure Microsoft Exchange Continuity Appliance

Innovative Defense Strategies for Securing SCADA & Control Systems

Linux Network Security

DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch

Intrusion Detection and Prevention Systems in the Industrial Automation and Control Systems Environment

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

Utility Modernization Cyber Security City of Glendale, California

How To Protect Your Network From Intrusions From A Malicious Computer (Malware) With A Microsoft Network Security Platform)

Five Steps to Building Visibility and Security Into Your Network

SOURCEFIRE RNA (REAL-TIME NETWORK AWARENESS)

USE HONEYPOTS TO KNOW YOUR ENEMIES

Securing EtherNet/IP Using DPI Firewall Technology

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Advanced Threat Protection with Dell SecureWorks Security Services

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

How Secure is Your SCADA System?

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

Building a Security Operations Center Lessons Learned. active threat protection

Security+ Guide to Network Security Fundamentals, Fourth Edition. Chapter 6 Network Security

Analysis and Evaluation of Network-Based Intrusion Detection and Prevention System in an Enterprise Network Using Snort Freeware

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Cyber Security for NERC CIP Version 5 Compliance

Cyber Watch. Written by Peter Buxbaum

This chapter covers the following topics:

Seven Strategies to Defend ICSs

Industrial Security Solutions

SIEM is only as good as the data it consumes

WHITE PAPER. FortiGate DoS Protection Block Malicious Traffic Before It Affects Critical Applications and Systems

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

INTRUSION DETECTION SYSTEM (IDS) D souza Adam Jerry Joseph I MCA

Intrusion Detection System (IDS)

Cisco IPS Tuning Overview

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Securing Industrial Control Systems in the Chemical Sector. Roadmap Awareness Initiative Making the Business Case

Fear Not What Security Can Do to Your Firm; Instead, Imagine What Your Firm Can Do When Secured!

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Intrusion Detection Categories (note supplied by Steve Tonkovich of CAPTUS NETWORKS)

Database Security in Virtualization and Cloud Computing Environments

Transcription:

You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell Mandiant, a FireEye company [2014 SANS European ICS Summit]

About me Currently: Principal Consultant on Mandiant s Industrial Control Systems Security team Previously: Product Security Architect for major industrial software & hardware vendor

If ICS are so vulnerable, why haven t we seen more attacks?

1. Intention 2. Visibility

1. [Intention] 2. Visibility

Attacker motivation Why are targeted attacks different? It s a Who, not a What They are Professional, Organized & Well Funded If You Kick Them Out They Will Return

Cyber incident response statistics Proactive measures eventually fail Attackers exploit the weakest link

Assumption #1 ICS is becoming more, not less, connected

Assumption #2 Vulnerabilities will exist indefinitely

Assumption #3 Defensive measures eventually fail

Conclusion Security breaches are inevitable

1. Intention 2. [Visibility]

We are not looking! (Meme alert)

Prevention is ideal,

but Detection is a must.

Determined adversaries will breach your defenses, the goal is to keep them from achieving their objectives.

Why ICS is different DETECT RESPOND Enterprise IT Systems Widely-used technology Well-known attack patterns Standardized logging (i.e. syslog, Windows Event log) High frequency of events Involves IT teams Industrial Control Systems Obscure technology Limited historical data (i.e. Stuxnet) Non-existent or non-standard log formats Low frequency, high impact events Involves IT and OT teams CONTAIN Laptop example: Unplug device Perform forensics Re-image & redeploy ICS example: Assess criticality & risk to process Failover Perform forensics Re-commission Acceptance testing Failback

and why ICS isn t different Enterprise/Plant/DMZ communications run through Ethernet switches and routers Windows Event Logs & syslog frequently available Many asset owners have a SOC or CIRT within their organization Security tools frequently deployed in the environment Good governance, quality management, and engineering are technology-agnostic disciplines Network security monitoring for industrial control systems is achievable using the tools we have today

What is network security monitoring? the collection, analysis, and escalation of indications and warnings to detect and respond to intrusions. NSM is a way to find intruders on your network and do something about them before they damage your enterprise. Richard Bejtlich The Practice of Network Security Monitoring

A bit of history. Cliff Stoll Stalking the Wily Hacker 1988 Todd Herberlein et al. A Network Security Monitor 1990 US Air Force Defense Information Systems Agency Lawrence Livermore National Lab Early 1990s NetRanger RealSecure Snort and many others Late 1990s - early 2000s Formal definition of NSM 2002 NSM is not a new concept, and the tools are fairly mature

Ok, so what is NSM really? It s a model for action, based on networkderived data Requires people and process, not just technology Focuses on the adversary, not the vulnerability

In ICS, we have the benefit of time. https://flic.kr/p/9nnu3z

Enterprise defenders are racing to thwart attackers, but the threats we face at this moment have not yet caused wide-scale kinetic effects. https://flic.kr/p/5m8lta

Let s use the time we have to find and disrupt intruders. https://flic.kr/p/fcstr

Difficulties for NSM Encrypted networks Widespread NAT Devices moving between network segments Extreme traffic volume Privacy concerns Issues that most ICS do not face!

Instrumenting ICS Enterprise/IT Each network segment of an ICS should be monitored Plant DMZ Web Historian or other DB Natural points are at network gear separating segments SCADA HMI Control PLCs, RTUs, PACs, sensors SCADA Historian Monitoring traffic at the DMZ ingress/egress point may help provide early warning of attackers coming from the Corporate network

https://flic.kr/p/7sdjw

Methods of monitoring Network tap physical device which relays a copy of packets to an NSM server SPAN or mirrored ports switch configuration which sends copies of packets to a separate port where NSM can connect Host-based host NIC configured to watch all network traffic flowing on its segment Serial port tap physical device which relays serial traffic to another port, usually requires additional software to interpret data

Cisco Fluke Networks Stratus Engineering

Types of data collected for NSM Full content data unfiltered collection of packets Extracted content data streams, files, Web pages, etc. Session data conversation between nodes Transaction data requests and replies between nodes Statistical data description of traffic, such as protocol and volume Metadata aspects of data, e.g. who owns this IP address Alert/log data triggers from IDS tools, tracking user logins, etc.

Technology Many different open source and commercial tools can be used to build NSM capability Let s examine the tools in Security Onion, a purpose-built Linux distribution for NSM https://flic.kr/p/75yf6l

Security Onion Full packet capture Tcpdump/Wireshark Extracted content Xplico Session data Bro Transaction data Bro Peel Back the Layers of Your Network Statistical data Capinfos/Wireshark Metadata WHOIS* Alert data Snort, Suricata, Sguil, Snorby

IR Process DETECT RESPOND Goal: Minimize total time CONTAIN

NSM Process

People The most important part of NSM! Gigabytes of data and 1000s of IDS alerts are useless without interpretation Analyze data collected to understand what s normal and what s not Identify adversary TTPs and act to disrupt them Remember, adversaries are a Who, not a What

Setting the right goal Showing evidence of conformance/compliance Finding indications of compromise

Redefining the win DETECT RESPOND CONTAIN ICS network instrumented with security technology and monitored by security personnel Effective process for response to ICS cyber security incidents Business continuity and DR planning consider ICS asset compromise

Breaking one link in the kill chain stops attackers from achieving their objective Reconnaissance Weaponization Delivery Exploitation Installation Command & Control Actions on Objectives http://papers.rohanamin.com/wp-content/uploads/papers.rohanamin.com/2011/08/iciw2011.pdf

References The Practice of Network Security Monitoring Richard Bejtlich, No Starch Press http://nsmwiki.org http://securityonion.net https://flic.kr/p/5mgrqa

https://flic.kr/p/6hxhpx