New Technologies for Substation Cyber Hardening



Similar documents
Cyber Security Summit Milano, IT

Stronger Than Firewalls: Unidirectional Security Gateways

Safe Network Integration

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

Strong Security in NERC CIP Version 5: Unidirectional Security Gateways

13 Ways Through A Firewall What you don t know will hurt you

An Analysis of the Capabilities Of Cybersecurity Defense

13 Ways Through A Firewall

An International Perspective on Security and Compliance

CRITICAL INFRASTRUCTURE

How To Protect Your Network From Attack From A Hacker (For A Fee)

Introduction to Waterfall Unidirectional Security Gateways: True Unidirectionality, True Security

Stronger than Firewalls And Cheaper Too

Applying NERC-CIP CAN-0024 Guidance for Data Diodes To Unidirectional Security Gateways

IT Security and OT Security. Understanding the Challenges

Using Tofino to control the spread of Stuxnet Malware

Waterfall for NERC-CIP Compliance

Meeting the Cybersecurity Standards of ANSI/ISA with Data Diodes

Remote Access Considered Dangerous. Andrew Ginter, VP Industrial Security Waterfall Security Solutions

Innovative Defense Strategies for Securing SCADA & Control Systems

NERC CIP Version 5 and the PI System

RuggedCom Solutions for

Experience with Unidirectional Security Gateways Protecting Industrial Control Systems

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Locking down a Hitachi ID Suite server

Cyber Security nei prodotti di automazione

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Security Testing in Critical Systems

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

The Information Revolution for the Enterprise

OPC & Security Agenda

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Missing the Obvious: Network Security Monitoring for ICS

The SCADA That Didn t Cry Wolf: Who s Really Attacking Your SCADA Devices

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Cyber Security for NERC CIP Version 5 Compliance

Where every interaction matters.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Holistic View of Industrial Control Cyber Security

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

NovaTech NERC CIP Compliance Document and Product Description Updated June 2015

patriotscada Distributed Firewall for SCADA and Industrial Networks

Network Security Infrastructure Testing

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Advanced Endpoint Protection Overview

Industrial Security for Process Automation

Enterprise Cybersecurity: Building an Effective Defense

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Lessons Learned from AMI Pioneers Follow the Path to Success

Goals. Understanding security testing

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Log Audit Ensuring Behavior Compliance Secoway elog System

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

SECURING THE MOVE TO IP-BASED SCADA/PLC NETWORKS

IBM. Vulnerability scanning and best practices

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Configuring Personal Firewalls and Understanding IDS. Securing Networks Chapter 3 Part 2 of 4 CA M S Mehta, FCA

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

On-Premises DDoS Mitigation for the Enterprise

Protecting Your Organisation from Targeted Cyber Intrusion

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Open Enterprise Architectures for a Substation Password Management System

Assuria can help protectively monitor firewalls for PCI compliance. Assuria can also check the configurations of personal firewalls on host devices

HoneyBOT User Guide A Windows based honeypot solution

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Lesson 5: Network perimeter security

Achieving PCI-Compliance through Cyberoam

GE Measurement & Control. Cyber Security for NERC CIP Compliance

SonicWALL PCI 1.1 Implementation Guide

Data and Command Encryption for SCADA

Recommended IP Telephony Architecture

Guidance Regarding Skype and Other P2P VoIP Solutions

Stateful Inspection Technology

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

Scalable Secure Remote Access Solutions

Enterprise Cybersecurity: Building an Effective Defense

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure

First Line of Defense to Protect Critical Infrastructure

Securely Connect, Network, Access, and Visualize Your Data

Lab Testing Summary Report

IBM Security QRadar SIEM Version MR1. Log Sources User Guide

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Cyber Essentials. Test Specification

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

Chapter 9 Firewalls and Intrusion Prevention Systems

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

SCADA Cyber Security

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Making the most out of substation IEDs in a secure, NERC compliant manner

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

CompTIA Network+ (Exam N10-005)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

TCP/IP Network Connectivity and ION Meters

Transcription:

UNIDIRECTIONAL SECURITY GATEWAYS New Technologies for Substation Cyber Hardening Andrew Ginter VP Industrial Security Waterfall Security Solutions Proprietary Information -- Copyright 2014 by Waterfall Security Solutions Ltd. 2014

Waterfall's Mission: Replace ICS Firewalls Waterfall s mission: revolutionize ICS perimeter security with technologies that are stronger than firewalls Enables safe IT/OT integration, remote services, industrial cloud Substations, Generation, Not For IT Offshore BES Control Batch Processing, Primary Production, Security Networks Platforms Centers Refining Safety Systems Routers Firewalls Secure Secure Inbound / Waterfall Unidirectional Bypass Outbound FLIP TM Security Gateways Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 2

Firewalls at Cyber Perimeters Really? Attack Type UGW Fwall 1) Phishing / drive-by-download victim pulls your attack through firewall 4 2 2) Social engineering steal a password / keystroke logger / shoulder surf 4 1 3) Compromise domain controller create ICS host or firewall account 4 2 4) Attack exposed servers SQL injection / DOS / buffer-overflowd 4 2 5) Attack exposed clients compromised web svrs/ file svrs / buf-overflows 4 2 6) Session hijacking MIM / steal HTTP cookies / command injection 4 2 7) Piggy-back on VPN split tunneling / malware propagation 4 2 8) Firewall vulnerabilities bugs / zero-days / default passwd/ design vulns 4 2 9) Errors and omissions bad fwall rules/configs / IT reaches through fwalls 4 2 10) Forge an IP address firewall rules are IP-based 4 2 Total Score: 40 19 Attack Success Rate: Impossible Difficult Straight- Forward Photo: Red Tiger Security Firewall have been with us for 30 years now. The good guys and the bad guys both know how to defeat firewalls Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 3

Emerging Threat: Targeted Attacks Use spear phishing to punch through corporate firewalls or sometimes more conventional attacks on web & other servers Use custom malware to evade anti-virus Operate malware by interactive remote control Steal administrator passwords / password hashes Create new administrator accounts on domain controller Use new accounts to log in no need to break in any more defeats software update programs Bypasses standard IT security controls: firewalls, encryption, AV, security updates Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 4

Waterfall's Mission: Replace ICS Firewalls Waterfall s mission: revolutionize ICS perimeter security with technologies that are stronger than firewalls Enables safe IT/OT integration, remote services, industrial cloud Substations, Generation, Not For IT Offshore BES Control Batch Processing, Primary Production, Security Networks Platforms Centers Refining Safety Systems Routers Firewalls Secure Secure Inbound / Waterfall Unidirectional Bypass Outbound FLIP TM Security Gateways Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 5

Firewall Conventional Network Integration Corporate users reach into plant historian through firewall Corporate users send queries/requests, historian responds Industrial Network Corporate Network Workstations Historian PLCs RTUs Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 6

Unidirectional Security Gateways Hardware-enforced unidirectional server replication Replica server contains all data and functionality of original Corporate workstations communicate only with replica server Industrial network and critical assets are physically inaccessible from corporate network & 100% secure from any online attack Industrial Network Historian Server Waterfall TX agent Corporate Network Waterfall RX agent Replica Server Workstations PLCs RTUs Waterfall TX appliance Waterfall RX appliance Unidirectional Historian replication Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 7

DNP3 Replication TX agent is DNP3 master polls substation & accepts exception reports RX agent is DNP3 slave responds to EMS polls and sends report by exception reports to EMS No DNP3 packets pass through gateway Industrial Network Substation Controller Waterfall TX agent Corporate Network Waterfall RX agent EMS RTUs DNP3 Waterfall TX appliance Waterfall RX appliance DNP3 WAN Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 8

Waterfall Unidirectional Gateway Connectors Leading Industrial Applications/Historians OSIsoft PI, PI AF, GE ihistorian, GE ifix Scientech R*Time, Instep edna, GE OSM Siemens: WinCC/SINAUT/Spectrum Emerson Ovation, Wonderware Historian SQLServer, Oracle, MySQL, Postgres, SAP AspenTech IP21, Matrikon Alert Manager Schneider ClearSCADA Leading IT Monitoring Applications Log Transfer, SNMP, SYSLOG CA Unicenter, CA SIM, HP OpenView, IBM Tivoli HP ArcSight SIEM, McAfee ESM SIEM File/Folder Mirroring Folder, tree mirroring, remote folders (CIFS) FTP/FTFP/SFTP/TFPS/RCP Leading Industrial Protocols OPC: DA, HDA, A&E, UA DNP3, ICCP, Modbus GENA, IEC 60870-5-104, IEC 61850 Remote Access Remote Screen View Secure Bypass Other connectors UDP, TCP/IP NTP, Multicast Ethernet Video/Audio stream transfer Mail server/mail box replication IBM MQ series, Microsoft MSMQ Antivirus updater, patch (WSUS) updater Remote print server World s largest collection of COTS industrial server replications Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 9

Waterfall's Mission: Replace ICS Firewalls Waterfall s mission: revolutionize ICS perimeter security with technologies that are stronger than firewalls Enables safe IT/OT integration, remote services, industrial cloud Substations, Generation, Not For IT Offshore BES Control Batch Processing, Primary Production, Security Networks Platforms Centers Refining Safety Systems Routers Firewalls Secure Secure Inbound / Waterfall Unidirectional Bypass Outbound FLIP TM Security Gateways Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 10

Waterfall FLIP Contains: TX module, RX Module, Trigger Controller (CPU) Trigger: button / key, schedule FLIP is a Unidirectional Gateway which can flip over Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 11

Waterfall Flip - Reversing Orientation Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 12

Waterfall Flip - Replicate to WAN Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 13

Waterfall Flip - Replicate to Substation Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 14

Possible FLIP States Relays: one way, other way, or neither way Nine possible states TX State: RX State Inside Inside Outside Disconnected Internal network is connected to internal network No connection to external network No harm done Outside network sends data unidirectionally to internal network Normal operation Networks are disconnected No harm done Outside Internal network sends data unidirectionally to external network Normal operation External network is connected to external network No connection to internal network No harm done Networks are disconnected No harm done Disconnected Networks are disconnected Networks are disconnected Networks are disconnected Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 15

FLIP: Stronger than Firewalls Designed to prevent interactive remote control: cannot allow data to flow both ways at once Trigger mechanism cannot be subverted by data passing through Firewalls forward messages, FLIP & Gateways do not TX Agents are clients. They ask for data and forward the answers/data No protocol-level attacks pass through no fuzzing/buffer overflows. All comms sessions terminate in agent hosts. FLIP: Stronger than firewalls Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 16

Firewall Use Case: Protecting Protection Equipment Deployed between protective relays and rest of substation Continuous monitoring of relays FLIP every 2 months or so send batch of new passwords and possibly new firmware into batch-mode update mechanism No interactive remote control for relays Substation Electronic Security Perimeter Relays FLIP RTUs WAN EMS Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 17

Use Case: Protecting Entire Substation Continuous monitoring of substation via DNP3 FLIP periodically new passwords, firmware, configurations, setpoints No interactive remote control for entire substation Substation Electronic Security Perimeter FLIP EMS Relays RTUs WAN Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 18

Evolving Best Practices New best practice: unidirectional gateways & FLIP defeat targeted attacks, insider attacks & malware propagation Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 19

Waterfall Security Solutions Headquarters in Israel, sales and operations office in the USA Hundreds of sites deployed in all critical infrastructure sectors 2012, 2013 & 2014 Best Practice awards for Industrial Network Security and Oil & Gas Security Practice IT and OT security architects should consider Waterfall for their operations networks Waterfall is key player in the cyber security market 2010, 2011, & 2012 The only unidirectional technology on US Department of Homeland Security s National SCADA Security Test Bed, and Japanese CSSC Test Bed Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 20

Waterfall Product Accreditations Only unidirectional technology with a cyber security assessment by Idaho National Laboratories Certified Common Criteria EAL4+ (High Attack Potential) Strategic partnership agreements / cooperation with: OSIsoft, GE, Schneider Electric, Westinghouse, and many other industrial vendors Hold US patents for SCADA/control networks security using Unidirectional Gateways Market leader for unidirectional server replication in industrial environments Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 21

Improving BES Reliability Security: absolute protection of safety and reliability of control system assets, from network attacks originating on external networks Compliance: best-practice guidance, standards and regulations are evolving to recognize strong security Costs: reduces security operating costs improves security and saves money in the long run Waterfall s unique solutions have the potential to be the industry s next game changing standard BES will be measurably more reliable when Unidirectional Gateways are deployed more widely Proprietary Information -- Copyright 2014 by Waterfall Security Solutions 22