What Risk Managers need to know about ICS Cyber Security



Similar documents
The State-of-the-State of Control System Cyber Security

Keeping the Lights On

Energy Cybersecurity Regulatory Brief

State of the State of Control System Cyber Security

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

SCADA Security Training

future data and infrastructure

STATEMENT OF PATRICIA HOFFMAN ACTING ASSISTANT SECRETARY FOR ELECTRICITY DELIVERY AND ENERGY RELIABILITY U.S. DEPARTMENT OF ENERGY BEFORE THE

Cyber Security and Privacy - Program 183

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

Rethinking Cyber Security for Industrial Control Systems (ICS)

Including Threat Actor Capability and Motivation in Risk Assessment for Smart Grids

ISACA rudens konference

TRIPWIRE NERC SOLUTION SUITE

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

Industrial Cyber Security 101. Mike Spear

What is Cyber Liability

Feature. SCADA Cybersecurity Framework

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

NERC Cyber Security Standards

N-Dimension Solutions Cyber Security for Utilities

AURORA Vulnerability Background

Securing Industrial Control Systems Secure. Vigilant. Resilient. May 2015

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Protecting Organizations from Cyber Attack

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

Roger W. Kuhn, Jr. Advisory Director Education Fellow Cyber Security Forum Initiative

Cyber Security. Protecting the UK water industry

Help for the Developers of Control System Cyber Security Standards

Privilege Gone Wild: The State of Privileged Account Management in 2015

Effective Use of Assessments for Cyber Security Risk Mitigation

Solutions and IT services for Oil-Gas & Energy markets

Privilege Gone Wild: The State of Privileged Account Management in 2015

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Verve Security Center

CONCEPTS IN CYBER SECURITY

SCADA City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor

Plans for CIP Compliance

Bellingham Control System Cyber Security Case Study

OPC & Security Agenda

Team Members: Jared Romano, Rachael Dinger, Chris Jones, Miles Kelly Supervising Professor: Dr. George Collins Industry Advisor: Dr.

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Summary of CIP Version 5 Standards

CIP Supply Chain Risk Management (RM ) Statement of Jacob S. Olcott Vice President, BitSight Technologies January 28, 2016

SCADA Security: Challenges and Solutions

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

WORKSHOP Rethinking Cyber Security for Industrial Control Systems

Techno Security's Guide to Securing SCADA

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

U.S. Cyber Security Readiness

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

ICS CYBER SECURITY RKNEAL, INC. Protecting Industrial Control Systems: An Integrated Approach. Critical Infrastructure Protection

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Cybersecurity & Public Utility Commissions

CYBER SECURITY POLICY For Managers of Drinking Water Systems

SECURITY CONSIDERATIONS FOR LAW FIRMS

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Into the cybersecurity breach

How To Manage Risk On A Scada System

The Importance of Cybersecurity Monitoring for Utilities

Resilient and Secure Solutions for the Water/Wastewater Industry

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Consulting International

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

SCADA. The Heart of an Energy Management System. Presented by: Doug Van Slyke SCADA Specialist

Data Security Concerns for the Electric Grid

The Changing Threat Surface in. Embedded Computing. Riley Repko. Vice President, Global Cyber Security Strategy

Transcription:

What Risk Managers need to know about ICS Cyber Security EIM Risk Managers Conference February 18, 2014 Joe Weiss PE, CISM, CRISC, ISA Fellow (408) 253-7934 joe.weiss@realtimeacs.com

ICSs What are they and where are they used ICSs are critical to operating industrial assets including power, refineries, pipelines, chemicals, manufacturing, water, military systems, medical systems, etc ICSs include Distributed Control Systems DCS, Supervisory Control and Data Acquisition (SCADA), Programmable Logic Controllers (PLC), Remote Terminal Units (RTU), Intelligent Electronic Devices (IEDs) ICSs monitor and control physical processes in real time Focus is reliability and safety

Brief History of ICS 20 years ago Isolated systems, with non-networked cyber dumb devices 10 years ago Emergence of network integration, with more capable intelligent cyber-vulnerable devices Today Combination of modern, integrated networks interoperating with legacy systems creating increasingly cyber-vulnerable networks 10 years from now Who knows? Expect further convergence of networked legacy, intelligent, and newer technologies, with even more cyber vulnerability

Control Systems Basics Internet ERP MES Data Ware house Support Systems Internet

Big Push for Smart Grid Utility Back Office Communications Servers Communications Servers Communications Servers Remote Access My focus Customer Premise Utility Substation AMI Meter SCADA

Why is there so Little Understanding of ICS Cyber Security ICSs are not mainstream Culture issues between Operations, IT, and Forensics Lack of understanding by IT and Forensics Minimal ICS cyber forensics or logging Don t know when an event can be cyber

ICS Security Expertise Lacking ICS Security Experts IT Security ICS Engineering

What is a Cyber Incident Cyber Incident - An occurrence that actually or potentially jeopardizes the Confidentiality, Integrity, or Availability (CIA) of an information system or the information the system processes, stores, or transmits or that constitutes a violation or imminent threat of violation of security policies, security procedures, or acceptable use policies. Incidents may be intentional or unintentional. (FIPS PUB 200, Minimum Security Requirements for Federal Information and Information System, March 2006.) What is important about this definition Intentional or unintentional Actual or potential compromise of CIA Violation or imminent threat to CIA

What are the Limitations of ICS Cyber Security ICSs are resource-limited, purpose-built systems designed to accomplish specific tasks in a safe, reliable manner for many years IT cyber security technologies generally are not resource limited and expect to be changed frequently Protecting ICSs takes rocket science to not impact performance It is expected that a well-designed ICS cyber security program can protect ICSs from unintentional and intentional threats that are not at the targeted nation-state level. That is, you can t protect against a Stuxnet-like attack you need to be able to detect it and have appropriate recovery mechanisms in place.

ICS Cyber Security Concerns For ICS it is Mission Assurance not Information Assurance System of Systems Existing policies and technologies may not be adequate ICS cyber logging and forensics may not be adequate Physical impacts Destroy equipment Environmental spills Personal safety Duration Many months Cascading impacts One industry can affect other industries

Cyber Breach Discovery Target hack - what does that mean to ICSs Ostensibly had significant cyber security Came from external connection From Mandiant - average time to discover a cyber breach on the enterprise network is 416 days what does this mean to ICSs All systems had updated security software and followed recommended procedures

ICS Cyber Threats are Real >325 actual ICS cyber incidents to date Ranged from significant discharges to significant equipment damage to deaths Very few ICS-specific cyber security technologies, training, and policies >1,000,000 ICS devices directly connected to the Internet (and counting)

What has Happened Recently ICS honeypot Loss of control of a turbine BART computer failure affecting train operation Israeli tunnel hack Iranian Stuxnet paper and translation of Project Shine Project Shine discoveries Utility test beds New Aurora testing and hardware mitigation programs Continuing issues: IT and ICS disconnect Lack of security focus by many in the ICS community Disclosure issues

Legislation, Regulation, Standards NERC CIPs V3 and V5 (non nuclear) NEI 08-09, Regulatory Guide 5-71 (nuclear) Executive Order (NIST) Framework ISA99 (ICS Cyber security standards) Several bills being introduced

What does this mean to NERC CIP NERC CIP is compliance-based NERC CIP has numerous exceptions to eliminate most utility assets NERC CIPs would not have prevented major grid cyber incidents that have already occurred

Risks to Consider Olympic Pipeline company declared bankruptcy PG&E spent >$590Million to date on San Bruno (similar situation to Olympic Pipeline) Loss of control of turbine connected to major industrial installation Aurora affects EVERY electric substation Already been 4 major cyber-related outages in the US NERC advisories and Lessons Learned are not adequately addressing cyber Inadequate risk assessments Inadequate ICS cyber security training and awareness

What Needs to be Done Senior management acknowledge and address the problem ICS, IT Security, and Forensics work together Technology changes Improve security of legacy ICSs New ICSs with security as part of initial design Policy and other changes Resilience and recovery ICS cyber security training Appropriate information sharing Appropriate insurance coverage Demonstrations (Utility test beds)

Utility Test Bed Utility with typical legacy systems (generation, substations, SCADA) from multiple vendors Utility test bed to evaluate ICS cyber security technologies for impacts on ICS performance and over-all system reliability Utility test bed to document results and provide lessonslearned Utility test bed to develop training for secure systems What needs to be done beyond what is already being done

What should you take from this ICS cyber is real It is not clear what is a cyber incident Cyber incidents have real costs You need to make sure your ICS cyber assessments are adequate and complete Cyber can affect keeping lights on from 2 aspects Malicious threat Unintentional that often comes from trying to keep the bad guys out

What should you ask How will you identify your mission critical control system assets? What will you do about procuring more secure control systems? How will you address training and awareness specifically for your control system assets? How will you perform outreach on ICS cyber security inside your company and to your customers and suppliers?

Conclusions ICSs are cyber vulnerable ICS cyber security is a major risk to your mission and your bottom line Need to assure insurance is appropriate to the risk Stuxnet made ICSs a legitimate target Securing ICSs requires ICS-specific approaches Appropriate training and certification

Mark your calendar for the 14 th ICS Cyber Security Conference week of October 20 th at Georgia Tech in Atlanta www.icscybersecurityconference.com