Department of Homeland Security Control Systems Security Program



Similar documents
U.S. Department of Homeland Security s National Cybersecurity and Communications Integration Center

GPS Use in U.S. Critical Infrastructure. and Emergency Communications. Presented to the

Critical Infrastructure Security and Resilience

Resilient and Secure Solutions for the Water/Wastewater Industry

CONCEPTS IN CYBER SECURITY

Maritime cybersecurity using ISPS and ISM codes

U.S. Department of Homeland Security Protective Security Advisor (PSA) North Carolina District

Transportation Industrial Control Systems (ICS) Cybersecurity Standards Strategy

For Official Use Only (FOUO)

Liability Management Evolving Cyber and Physical Security Standards and the SAFETY Act

Managing Cyber Risks to Transportation Systems. Mike Slawski Cyber Security Awareness & Outreach

Roadmaps to Securing Industrial Control Systems

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

CYBER SECURITY INDUSTRY GUIDELINES

The Nationwide Automatic Identification System Newsletter Issue #1 3 rd Quarter FY 2007

ICS-CERT Year in Review. Industrial Control Systems Cyber Emergency Response Team. National Cybersecurity and Communications Integration Center

Business Continuity Roadmap -One Port s Approach. - Rich Baratta, ARM, ABCP Director, Risk Management Port of Long Beach

United States Coast Guard Cyber Command. Achieving Cyber Security Together. Homeland Security

Department of Homeland Security (DHS) GPS Interference Detection and Mitigation (IDM) Program

Subject: Critical Infrastructure Identification, Prioritization, and Protection

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

Common Threats and Vulnerabilities of Critical Infrastructures

A SOLUTION FOR THE NEW YORK HARBOR TODAY. A LEADER FOR THE SHIPPING WORLD TOMORROW.

U.S. Cyber Security Readiness

THE WHITE HOUSE. Office of the Press Secretary. For Immediate Release February 12, February 12, 2013

REHABILITATION AND EXTENSION PROJECT FOR PORT OF LOBITO

Delaware s Transportation Management Program

SOMEBODY'S WATCHING YOU! Maritime Cyber Security White Paper. Safeguarding data through increased awareness

The. Who, What, When, Where, of Port Security. A Resource Guide for Your Use Today and In the Future. by Thomas O Brien, Ph.D.

Endless Seas. We re there with you.

December 17, 2003 Homeland Security Presidential Directive/Hspd-7

NATIONAL STRATEGY FOR GLOBAL SUPPLY CHAIN SECURITY

Supplemental Tool: NPPD Resources to Support Vulnerability Assessments

M&M MARITIME SECURITY. Lucern, 07th October 2015

Roadmap for Remote Controlled Ships

Business Continuity. Port environment

THE NEXT REVOLT 18 BATTERY COASTAL TRAFFIC REVOLT IN BRIEF

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

TECHNICAL INFORMATION

ICS-CERT Incident Response Summary Report

Developments toward the unmanned ship

Final Draft/Pre-Decisional/Do Not Cite. Forging a Common Understanding for Critical Infrastructure. Shared Narrative

NH-ISAC. Cybersecurity Resilience Securing the Infrastructures that Secure Healthcare & Public Health. The National Health ISAC

A Contribution to the Analysis of Maritime Accidents with Catastrophic Consequence

Marine Terminal Management Training Program

Why you should adopt the NIST Cybersecurity Framework

ENSURING SECURITY IN AND FACILITATING INTERNATIONAL TRADE. Measures toward enhancing maritime cybersecurity. Submitted by Canada SUMMARY

Beyond the e-navigation implementation plan: Development towards the unmanned merchant vessel?

Cybersecurity and Corporate America: Finding Opportunities in the New Executive Order

Why you should adopt the NIST Cybersecurity Framework

National Health Information Sharing & Analysis Center. The National Health ISAC (NH-ISAC) NH-ISAC

GAO MARITIME SECURITY. Vessel Tracking Systems Provide Key Information, but the Need for Duplicate Data Should Be Reviewed

The Impact of GPS Jamming on the Safety of Navigation

How To Understand And Manage Cybersecurity Risk

Safety, Security and Entertainment The Turnkey Solution for all kind of Ships

Sperry Marine Fleet Management Enterprise Solution

GUIDELINES ON THE DESIGN AND USE OF PORTABLE PILOT UNITS

AIS (Automatic Identification System)

DEPARTMENT OF TRANSPORTATION. Saint Lawrence Seaway Development Corporation, DOT. 33 CFR Part 401. [Docket No. SLSDC ] 2135-AA39

Application of Technology to Create an Integrated, Multidisciplinary Approach to Safe and Secure Ports

Release of the Draft Cybersecurity Procurement Language for Energy Delivery Systems

The International Ship and Port Facility Security Code A-M CHAUVEL - BUREAU VERITAS - DNS / DCO

Statement of. Thomas A. Allegretti President & CEO The American Waterways Operators

GUIDELINES AND CRITERIA FOR VESSEL TRAFFIC SERVICES ON INLAND WATERWAYS (VTS Guidelines 2006)

REPUBLIC OF. Marine Notice THE MARSHALL ISLANDS No OFFICE OF THE MARITIME ADMINISTRATOR Rev. 8/06

Water Security Issues: The Federal Perspective. J. Alan Roberson, P.E. Director of Security and Regulatory Affairs AWWA Washington, DC

Cybersecurity Guidance for Industrial Automation in Oil and Gas Applications

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

A MULTIFACETED CYBERSECURITY APPROACH TO SAFEGUARD YOUR OPERATIONS

MARITIME CRITICAL INFRASTRUCTURE PROTECTION. DHS Needs to Better Address Port Cybersecurity

MEASURES TO ENHANCE MARITIME SECURITY. Industry guidelines on cyber security on board ships. Submitted by ICS, BIMCO, INTERTANKO and INTERCARGO

1.1 The primary function of the ECDIS is to contribute to safe navigation.

Part 0 - Classification and Surveys Classification and Surveys I

Cyber-insurance: Understanding Your Risks

Port of Long Beach 1249 Pier F Avenue Long Beach, CA (562)

Department of Homeland Security Federal Government Offerings, Products, and Services

Industry Overview. Transportation

Transcription:

Department of Homeland Security Control Systems Security Program Transportation Sector David Sawin Program Manager Bob Hoaglund, CSSP - Maritime Transportation Modal Lead Control Systems Security Program / ICS-CERT

Agenda Overview of Department of Homeland Security Control Systems Security Program (DHS CSSP) Transportation Sector Discussion of risks/vulnerabilities, opportunities within the maritime industry Next steps for Maritime

Transportation Control Systems Are Highly Connected Transportation is increasingly interdependent using wireless communications 3

E-enabled vehicles are now the norm 4

for all of us! Source: aa1car.com 5

Control Systems Security Challenges SECURITY TOPIC INFORMATION TECHNOLOGY CONTROL SYSTEMS Anti-virus & Mobile Code Support Technology Lifetime Common & widely used Uncommon and can be difficult to deploy 3-5 years Up to 20 years Outsourcing Common/widely used Rarely used (vendor only) Application of Patches Regular/scheduled Slow (vendor specific) Change Management Regular/scheduled Legacy based unsuitable for modern security Time Critical Content Delays are usually accepted Critical due to safety Availability Delays are usually accepted 24 x 7 x 365 x forever Security Awareness Good in private and public sector Generally poor regarding cyber security Security Testing/Audit Scheduled and mandated Occasional testing for outages / audit Physical Security Secure Remote and unmanned 6

7 18 Critical Infrastructure Sectors Homeland Security Presidential Directive 7 (HSPD-7) along with the National Infrastructure Protection Plan (NIPP) identified and categorized U.S. critical infrastructure into the following 18 CIKR sectors Agriculture and Food Banking and Finance Chemical Commercial Facilities Critical Manufacturing Dams Defense Industrial Base Emergency Services Energy Government Facilities Information Technology National Monuments and Icons Nuclear Reactors, Materials, and Waste Postal and Shipping Public Health and Healthcare Telecommunications Transportation Water and Water Treatment Many of the processes controlled by computerized control systems have advanced to the point that they can no longer be operated without the control system

Partnership Between DHS and DOT/Volpe Outreach Site Assessments Cyber Security Evaluation Tool (CSET) Standards, best practices, training Transportation Sector Control System Security Roadmap 8

Growing Dependencies Could Increase Risk 9

Maritime Automated Systems 10

Terminal Automation Information Technology Terminal Operation System (TOS) Container Terminal Management System (CTMS) Payroll, other back office systems Communications E-mail, cargo messages Website, cargo tracking Wireless, cargo apps Access Control Security / ID Card system CCTV Truck gates Personnel gates 11

Terminal Automation Scheduling Software Vessels Yard equipment Maintenance Control Systems Seaside cranes Yard Cranes Other Yard Equipment Remote monitoring Buildings Gates 12

Navigation Radar Vessel Automation Automatic Identification System (AIS) Electronic Charts (ECDIS) GPS Communications Radio Satellite Broadband Internet, E-mail Integrated bridge All systems interconnected Auto Helm 13

Automated Container Terminal Entrance Optical Character Recognition Reads Vehicle & Container ID Imaging can also detect container damage, lock system 14

Volpe Center Image 15 Driverless Vehicle Hamburg Germany. Driverless vehicle moving 40 container to automated storage crane.

Countryman & McDaniel 16 Crane Accident Oakland, CA. Dropped cargo container too early. Is this a result of a Control System failure?

Volpe Center Images Inland Waterway System 17

Fire Onboard Could bad planning software have made it worse? Hazmat too close together? 18

Navigation Malfunction Human error or equipment malfunction? 19

Navigation Error Rotterdam. Human error or equipment malfunction? 20 20

Countryman & McDaniel Vessel Balance Accident Liberia. Vessel storage usually planned with bay planning software. 21

Rollover Accident Antwerp 2007. Vessel instability due to ballast tanks? Software or human error? 22

Vessel Accident Bayplan Software MV Annabella Load plan/bayplan software did not recognize 30 containers and assumed all were 40. 7 stacked 30 containers weighed 225 tons no alarm Bayplan would alarm if 40 container stack weighed 240 tons. Stack collapsed during voyage. 26 Feb 07 Many terminals do load plan for vessels. 23

Vessel Accident MV Royal Majesty Bermuda to Boston Integrated bridge, 2 GPS & electronic charts (ECDIS) Antenna line broke and GPS registered Dead Reckoning (DR) for 30 hours. DR is estimated position based on speed and heading. Crew didn t notice DR indicator light or 2 nd GPS 24

Vessel Vulnerability Resolution of Electronic Charts Electronic chart display system (ECDIS) Systems may show different underwater hazard Wrecks, rocks, & other underwater obstructions. 25

Countryman & McDaniel Dry-dock Malfunction Dubai. Opened sea gate while workers were under vessel resulting in 27 deaths and the loss of 2 vessels.

Maritime Mode Progress to Date Surveyed 3 vessels docked on the east coast 2 container terminals on the east coast 1 in the Gulf of Mexico CSET Assessments 3 at southern US Port Outreach to over 15 Maritime organizations 3 Site briefings scheduled Cruise Industry 27

Need Strategies to Strengthen Security Cybersecurity requires a lifecycle approach Risk assessments Standards Design practices Certification Monitoring CIA Aviationlawmonitor.com 28

Next Steps for CSSP-Transportation Expanding CSSP assistance to all transportation modes Help industry define cybersecurity issues Transportation Roadmap 29

Report cyber incidents and vulnerabilities to: www.us-cert.gov Or send e-mail to: soc@us-cert.gov, ics-cert@dhs.gov Or call: Cybersecurity is a Shared Responsibility 877-776-7585 (ICS-CERT) 888-282-0870 (US-CERT) Get more information at: www.us-cert.gov/control_systems

Questions / Feedback Bob Hoaglund - CSSP US Department of Transportation Volpe National Transportation Systems Center (617) 494-3653 Robert.Hoaglund@dot.gov 31