IEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY



Similar documents
This is a preview - click here to buy the full publication

PART 4: TECHNICAL SECURITY REQUIREMENTS FOR AN INDUSTRIAL AUTOMATION AND CONTROL SYSTEMS

Information Security Policies and Procedures Development Framework for Government Agencies. First Edition AH

TECHNICAL SPECIFICATION

Help for the Developers of Control System Cyber Security Standards

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

PUBLICLY AVAILABLE SPECIFICATION PRE-STANDARD

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

WIRELESS LOCAL AREA NETWORK (WLAN) IMPLEMENTATION

SCADA Security Training

How To Get The Nist Report And Other Products For Free

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

ISA-99 Industrial Automation & Control Systems Security

ISACA rudens konference

Building Security In:

ISO/IEC 27002:2013 WHITEPAPER. When Recognition Matters

1 ISA Security Compliance Institute

Wasting Money on the Tools? Automating the Most Critical Security Controls. Mason Brown Director, The SANS Institute

Information Security Awareness Training

SECURITY. Risk & Compliance Services

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

White Paper. Information Security -- Network Assessment

Implementing Program Protection and Cybersecurity

Information Blue Valley Schools FEBRUARY 2015

Defending the Database Techniques and best practices

SECURITY FOR ENTERPRISE TELEWORK AND REMOTE ACCESS SOLUTIONS

future data and infrastructure

Disaster Recovery Plan (Business Continuity) Template

ISO/IEC Information & ICT Security and Governance Standards in practice. Charles Provencher, Nurun Inc; Chair CAC-SC27 & CAC-CGIT

Risk Management in Practice A Guide for the Electric Sector

Security Control Standard

ISMS Implementation Guide

Process Control System Cyber Security Standards an Overview

Wireless Process Control Network Architecture Overview

LEARNING SOLUTIONS website milner.com/learning phone

NIST Cyber Security Activities

Effective Software Security Management

Medical Device Software Standards for Safety and Regulatory Compliance

Altius IT Policy Collection Compliance and Standards Matrix

IT ASSET MANAGEMENT Securing Assets for the Financial Services Sector

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

The Next Generation Security Operations Center

SOFTWARE ASSET MANAGEMENT Continuous Monitoring. September 16, 2013

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

ISA Security Compliance Institute ISASecure IACS Certification Programs

Common Criteria Evaluations for the Biometrics Industry

DoD Software Assurance (SwA) Overview

Information and Communication Technology. Patch Management Policy

NIST A: Guide for Assessing the Security Controls in Federal Information Systems. Samuel R. Ashmore Margarita Castillo Barry Gavrich

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Operational security for online services overview

Rebecca Massello Energetics Incorporated

HIPAA Compliance Review Analysis and Summary of Results

Emerson s Smart Wireless and WIB Requirements

FREQUENTLY ASKED QUESTIONS

Symphony Plus Cyber security for the power and water industries

Rethinking Cyber Security for Industrial Control Systems (ICS)

IT Audit and Compliance

Securing the Microsoft Cloud

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Defending Against Data Beaches: Internal Controls for Cybersecurity

Nine Steps to Smart Security for Small Businesses

Securing the Cloud Infrastructure

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

Cybersecurity. Cloud. and the. 4TH Annual NICE Workshop Navigating the National Cybersecurity Education InterState Highway September 2013

Security and Privacy Controls for Federal Information Systems and Organizations

PROJECT BOEING SGS. Interim Technology Performance Report 1. Company Name: The Boeing Company. Contract ID: DE-OE

20+ At risk and unready in an interconnected world

Certification Report

An Introduction to SCADA-ICS System Security. Document Number IG-101 Document Issue 0.1 Issue date 03 February 2015

Disaster Recovery Business Continuity Premium Edition

ITL BULLETIN FOR JUNE 2012 CLOUD COMPUTING: A REVIEW OF FEATURES, BENEFITS, AND RISKS, AND RECOMMENDATIONS FOR SECURE, EFFICIENT IMPLEMENTATIONS

Malicious Control System Cyber Security Attack Case Study Maroochy Water Services, Australia

PASTA Abstract. Process for Attack S imulation & Threat Assessment Abstract. VerSprite, LLC Copyright 2013

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

TeleTrusT Bundesverband IT-Sicherheit e.v.

International Software & Systems Engineering. Standards. Jim Moore The MITRE Corporation Chair, US TAG to ISO/IEC JTC1/SC7 James.W.Moore@ieee.

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

Best Practices for DanPac Express Cyber Security

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

ISA Security Compliance Institute

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

FISMA Implementation Project

TECHNICAL REPORT IEC TR Security for industrial automation and control systems Part 2-3: Patch management in the IACS environment

Payment Card Industry Data Security Standard

System Security Engineering

CHIS, Inc. Privacy General Guidelines

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

Transcription:

IEC 62443: INDUSTRIAL NETWORK AND SYSTEM SECURITY Standards Certification Education & Training Publishing Conferences & Exhibits Tom Phinney Honeywell Integrated Security Technology Lab

Tom Phinney 40+ years experience in software and hardware for real-time systems 25+ years as architect and system designer with GE and Honeywell in Phoenix Specialized in industrial communications since the late 1970s 1980-86: Initial author or early editor of IEEE 802.2, 802.4, 802.5, precursors to 802.11 1981-86: Co-founded company making leading-edge POTS and LAN modems 1988-1993+: Author/editor of ISA SP50 / IEC SC65C Type 1 fieldbus data-link layer 2002: Recipient of ISA s Standards & Practices award for outstanding service 2003: Recognized by ISA as one of the 50 most influential people in modern history in advancing automation, instrumentation, and control technologies 2005: Recipient of the IEC's 1906 award, which recognizes major contributions to furthering the interests of worldwide electro-technology standardization Current: Chairs three IEC standards working groups in the area of industrial process measurement and control : IEC/TC 65/WG 10: cyber-security IEC/SC 65C/MT 9: fieldbus IEC/SC 65C/WG 13: fieldbus cybersecurity profiles ISA SP99 industrial cyber-security leadership team ISA SP100 industrial wireless networking significant technical contributor 2

Outline The threat / risk / response security feedback loop Security as a continuing process, not a reachable goal The landscape of cybersecurity standards IEC 62443: Network and system security for industrial-process measurement and control 3

The security feedback loop Assurance Techniques Evaluation produce Assurance gives evidence of Owners SA giving Threats require Confidence Vulnerabilities using in Countermeasures require TRA to minimize Risk TRA Threat / Risk Assessment SA Security Assurance to Assets Credits: ISO/IEC 15408-1 Dr. Hans Daniel 4

Threat / risk assessment Existing methods are unsatisfactory Which threats? Threats Which risks? Vulnerabilities using Were any missed? The usual conclusion: Countermeasures require TRA The risks are too big and many to protect against them all Risk to Assets The real questions are: Which countermeasures are appropriate? What should I do for the amount I can afford? What is the marginal benefit per unit cost of doing more, or less? 5

Security Assurance Assurance (def): The basis for trusting that policies are implemented as intended Assurance is an ongoing process and thus a continuing cost Confidence is the goal Assurance Techniques Evaluation How much to spend? produce Assurance What to verify, and when? Owners SA giving What is the marginal cost of doing more? of doing less? require Confidence in Vulnerabilities Countermeasures 6

Security an ongoing process Security is not a goal that can be reached New vulnerabilities are discovered daily Threats continue to evolve Personnel become lax, or find workarounds to security measures weak points in the system change, becoming new points of attack Security is a process and an attitude All trust is limited Assume that the attacker is at least as intelligent and motivated as the defenders The weakest points in the system are the most likely targets Security may be achieved, or lost, incrementally through small actions and inactions Eternal vigilance is the price of security 7

The security mindset All trust is limited Compartmentalize Minimize what must be defended Minimize increment of potential loss Defend in depth One Maginot line is not sufficient Re-verify basis for trust (similar to Reagan s trust but verify ) Verification testing should not be predictable Unverified trust decays with time Assume that some personnel & equipment are compromised by the attacker This is one reason why a single Maginot line is not enough 8

Classes of attackers Amateur computer hackers/criminals Organized crime groups Professional, non-state actors (i.e., terrorists, political activists) Traditional adversarial nation-states Rival corporations and nation-states seeking competitive advantage Angry or unethical employees, contractors and consultants Outsourced or subcontracted firms and/or employees Software and hardware vendors looking for financial benefits Unethical advertisers / commercial entities (i.e., spyware and adware providers) Credits: www.sans.org 9

The management challenge Security is a never-ending process that is every employee s personal responsibility with more uncertainty than other business processes with mostly indirect measures of success and potentially catastrophic demonstrations of failure As with all continuing processes, people become complacent or develop workarounds without regard to consequences Continuing assurance provides the mechanism and driver for maintaining vigilance 10

Cybersecurity assurance standards Product assurance ISO/IEC 15408, Common Criteria ISO/IEC 19790, Security requirements for cryptographic modules (similar to NIST FIPS 140-2) ISO/IEC TR/19791, Security assessment of operational systems Process assurance ISO/IEC 21827, SSE capability maturity model (SSE-CMM ) ISO/IEC 17799, Code of practice for information security Mgmt COBIT Control objectives for information and related technology draft ISA S99 standards: Concepts and process guidance Environment assurance ISO 9000, 11

The assurance matrix Product Process Threat / risk assessment Existing assurance standards address varying portions of this matrix Development Integration Operation None partition cleanly between development, integration and operation phases Some address only process; others address both process and product, but unevenly None do a good job with threat / risk assessment, in a form that can provide practical guidance 12

IEC 62243, Network and system security for industrial-process measurement and control Focus to date has been on operational best practices Undergoing restructuring to a threat/risk assessment plus assurance basis Proposed multi-part structure: Concepts and Threat/Risk Assessment Development Assurance Integration Assurance Operational Assurance Sample Security Solutions: Policies and System Configurations (most of the material in the early 62443 drafts will go here) 13

The assurance matrix Product Process Threat / risk assessment Development Integration Operation Probable structure of IEC 62443 n 1. Threat / risk assessment 2. Development assurance 3. Integration assurance 4. Operation assurance 5. Sample security solutions (also known as Good practices 2006 ) Anticipate heavy reference to other assurance standards Part 5 likely will be the first part issued, as a TS 14

IEC 62443 working reference model ECI SED Standalone device IRA Remote access client (e.g. maintenance) ICC Remote control center (e.g. backup, or a different plant) Public network (e.g. Internet) PSM PEC Semi-public network (e.g. enterprise network) CNH Control center / HMI Service laptop ULCC Control center network (upper level) ACI Application servers Control servers LLCC Control center network (lower level) controller controller automation cell automation cell FC Control network (field level) 15

Acronyms of working reference model Securing external network communications paths into automation networks: ECI: External network Control network Interconnection IRA: Interactive Remote Access to a control network ICC: Inter-Control Center access to a shared control net SED: Standalone Embedded Device PEC: Portable Engineering Computer PSM: Portable Storage Medium Securing internal network communication paths within automation networks: ACI: Inter-Area Communication within a hierarchical multi-area control network CCN: Control Center Networks within a single control area FCN: Field Control Networks within a single control area Securing devices within automation networks: CNH: Control Network Host AFD: Automation Field Device 16

Example profile outline from 62443 n.2 ECI: External network control network interconnection n.2.1 Introduction n.2.1.1 Use cases n.2.1.2 Threats addressed by this profile n.2.1.3 Terminology and definitions n.2.1.4 Applicable network topology n.2.2 Assumptions n.2.3 Network topology requirements n.2.4 Data flow requirements n.2.5 Required security functionality n.2.6 Operations requirements n.2.7 Policy requirements n.2.8 Responsibilities by vendor, integrator, owner/operator 17

T h a n k y o u 18