Advanced Metering Infrastructure Security



Similar documents
OPTIGUARD: A SMART METER ASSESSMENT TOOLKIT

Looking Into The Eye Of The Meter

future data and infrastructure

Managing Mobile: BYOD, MDM, MAM, and more acronyms. John H Sawyer Senior Security Analyst InGuardians, Inc.

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

AMI security considerations

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

How Much Cyber Security is Enough?

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

05.0 Application Development

Facilitated Self-Evaluation v1.0

EnergyAxis System: Security for the Smart Grid

Testing Overview [Document subtitle]

What Risk Managers need to know about ICS Cyber Security

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Lessons Learned from AMI Pioneers Follow the Path to Success

WHITEPAPER. Smart Grid Security Myths vs. Reality

Cyber Security and Privacy - Program 183

AMI Penetration Test Plan

CYBERTRON NETWORK SOLUTIONS

Rebecca Massello Energetics Incorporated

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

IEEE-Northwest Energy Systems Symposium (NWESS)

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Cyber Security Risk Mitigation Checklist

How We're Getting Creamed

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz , ICSG 2014

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

Communication Architecture for AMI and other Smart Grid/Smart City Applications. Presented By: Reji Kumar Pillai President - ISGF

Dr. Emmanuel Hooper, PhD, PhD, PhD Presentation title SUB TITLE HERE National Broadband Plan Public Safety and Homeland Security Workshop

Goals. Understanding security testing

Rethinking Cyber Security for Industrial Control Systems (ICS)

NESCOR Guide to Penetration Testing for Electric Utilities

SAST, DAST and Vulnerability Assessments, = 4

NERC CIP Version 5 and the PI System

Security Testing in Critical Systems

Common Cybersecurity Vulnerabilities in Industrial Control Systems. May 2011

Intelligent Street lighting management using ZigBee. Martin SCHULTE-HOBEIN Field Application Engineer, EMEA Digi International

Manage Utility IEDs Remotely while Complying with NERC CIP

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Taxonomic Modeling of Security Threats in Software Defined Networking. Jennia Hizver PhD in Computer Science

Adobe Systems Incorporated

PHILADELPHIA GAS WORKS Information Security Assessment and Testing Services RFP#30198 Questions & Answers December 4, 2015

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 2009 ZigBee Alliance. All rights reserved. 1

APPENDIX G ASP/SaaS SECURITY ASSESSMENT CHECKLIST

Cyber Security. Smart Grid

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

A Systems Approach to HVAC Contractor Security

Working to Achieve Cybersecurity in the Energy Sector

Electricity for Free? The Dirty Underbelly of SCADA and Smart Meters

FISMA / NIST REVISION 3 COMPLIANCE

Update On Smart Grid Cyber Security

elearning for Secure Application Development

Jort Kollerie SonicWALL

SQuAD: Application Security Testing

Excellence Doesn t Need a Certificate. Be an. Believe in You AMIGOSEC Consulting Private Limited

A Decision Maker s Guide to Securing an IT Infrastructure

How To Protect Your Network From Attack

The Open Cyber Challenge Platform *

Promoting Application Security within Federal Government. AppSec DC November 13, The OWASP Foundation

The Trend Toward Convergence of Physical and Logical (Cyber) Security

Attacks from the Inside

Bellevue University Cybersecurity Programs & Courses

Secrets of Vulnerability Scanning: Nessus, Nmap and More. Ron Bowes - Researcher, Tenable Network Security

High rate and Switched WiFi. WiFi QoS, Security 2G. WiFi a/b/g. PAN LAN Cellular MAN

Principles of Information Assurance Syllabus

Future of Electric Distribution Dialogue

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

External Supplier Control Requirements

Multi-vendor Penetration Testing in the Advanced Metering Infrastructure: Future Challenges

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Thingsquare Technology

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com

Cyber Security Health Test

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

RMAR Technologies Pvt. Ltd.

CPNI VIEWPOINT CONFIGURING AND MANAGING REMOTE ACCESS FOR INDUSTRIAL CONTROL SYSTEMS

Dr. György Kálmán

SEMICONDUCTOR WIRELESS SENSOR NETWORK MARKET EXECUTIVE SUMMARY. Wireless Sensor Network Energy Harvesting And Storage Applications

IEEE Standards Activities in the Smart Grid Space (ICT Focus)

WI-FI VS. BLUETOOTH TWO OUTSTANDING RADIO TECHNOLOGIES FOR DEDICATED PAYMENT APPLICATION

AUTHORED BY: George W. Gray CTO, VP Software & Information Systems Ivenix, Inc. ADDRESSING CYBERSECURITY IN INFUSION DEVICES

Transcription:

Advanced Metering Infrastructure Security John Sawyer, Senior Security Analyst Don C. Weber, Senior Security Analyst InGuardians, Inc. 1 of 131

John Sawyer InGuardians, Inc. - Senior Security Analyst DarkReading.com - Author/Blogger Aspiring Metasploit Module Writer Keep finding my ideas have been done 1@stplace - Retired CTF packet monkey winners DEFCON 14 & 15 Avid Mountain Biker in Florida. 2 of 131

Don C. Weber InGuardians, Inc. - Senior Security Analyst United States Marine Corps 1991-1999 Plethora of Security Positions Certification and Accreditation Security Manager Incident Responder Penetration Tester Periodic Blogger Python Programmer Hardware Smasher 3 of 131

Agenda AMI implementation overview Smart meters to the backend resources Smart meter assessment techniques & mitigations Network configuration & monitoring concerns & mitigations Web application vulnerabilities & mitigations 4 of 131

Research With Caution - Or Die Image Taken From: http://www.gizmodo.com.au/2009/04/strangely_the_man_in_this_electrifying_photo_is_not_dead_today-2/ 5 of 131

What is the Smart Grid? 6 of 131

Where is AMI in the Smart Grid? 7 of 131

AMI Security Concerns Grid Instability Meters going down (takes ~300 Mw or ~ 1000 to 2000 homes) Fluctuation in demand Drop/Spike in demand during peak/non-peak times Resource consolidation could mean external AMI links to other resources of Smart Grid Substation IT Systems 8 of 131

AMI Security Concerns 9 of 131

AMI Security Concerns (2) New Technologies Increased complexity has reliability as well as security concerns Not vetted through YEARS of implementation understanding Internet Protocol Version 6 Information Leakage When somebody is home (not a big worry) Who will be buying and storing this data? 10 of 131

Energy Sector - Security Research Challenged Engineer Mentality Change bad Why would anybody want to mess with it? Extremely Long Equipment Life Cycles Twenty Years Minimum Research and vulnerability disclosure Don C. Weber, InGuardians, 2012 - Smart Meter Assessment Communications Kit (SMACK) Dale Peterson, Digital Bond, 2012 - SCADA vulnerabilities with Metasploit Modules Mike Davis, IOActive, 2009 - Smart Meter Worm Proof of Concept Bad press has lasting impacts Public funding Initial Public Offering (IPO) 11 of 131

Breaking AMI Architecture Down 12 of 131

External AMI Resources 13 of 131

Hardware Components and Attack Points Data At Rest Microcontrollers Memory Components Radios Data In Motion Internal Bus Wireless Optical 14 of 131

Hardware Analysis Data On Device Firmware Passwords, Security Keys, Certificates Radio Configurations Internal Resource Information 15 of 131

Radio Analysis Data In Motion - In Air Frequency Hopping Spread Spectrum (FHSS) Worldwide Interoperability for Microwave Access (WiMAX) Code division multiple access (CDMA) ZigBee, 6LoWPAN, Wi-Fi 16 of 131

Tools Of The Smart Meter Protocol Analysis Assessment Trade Standards Documentation Hardware Analysis Logic Analyzers, Oscilloscopes, Soldering Tools Debuggers, Goodfet Optical Probes, SMACK Custom Tools and Scripts 17 of 131

Tools Of The Smart Meter Assessment Trade (2) Data Analysis IDA Pro, Embedded Compilers Custom Disassemblers Custom Scripts Radio Analysis Spectrum Analyzers, USRP RFCat, KillerBee, Ubertooth Custom hardware and scripts 18 of 131

External Resources Security Mitigations Head-End Management Servers Monitor Activity Logs Monitor Firmware Integrity Identify New, Missing, Returning Devices Incident Response Processes 19 of 131

External Resources Security Mitigations (2) Secure Device Design Life Cycles Leverage current research and vulnerability knowledge Obfuscate and encrypt data at rest and in motion Security Analysis of hardware and software 20 of 131

External Resources Security Mitigations (3) Hardware and Service Acquisition Requests For Proposals/Requests For Information Teams have to include members from IT Security 21 of 131

Internal AMI Resources 22 of 131

Internal Network Components Internal to External Communication Tunnels Application Servers Database Servers Management Systems 23 of 131

Internal/DMZ Network Components 24 of 131

Network Configuration Issues Network Segmentation Separating the "untrusted" devices from the internal network Any device outside of the direct control of the facility should be considered untrusted Evil lurks here! 25 of 131

Network Configuration Issues Network Segmentation Separation of privileges Utility operations staff Server administration Customer Service Customers 26 of 131

Network Configuration Issues Do you really own the network? 27 of 131

Network Monitoring Where do you monitor? Does your IDS/IPS understand? 28 of 131

Network Monitoring Issues Can you monitor? Cellular Networks Managed Vendor Solution Network visibility Host visibility 29 of 131

Network Monitoring Mitigations Know your network! Protocols Devices Work with your vendors AMI <- (think SLA) IDS/IPS Incident response plan 30 of 131

AMI Web Application Vulnerabilities Are AMI web vulnerabilities unique? Cross-Site Scripting Cross-Site Request Forgery SQL Injection Privilege Escalation and so on 31 of 131

AMI Web Application Vulnerabilities What about their impact? 32 of 131

AMI Web Vulnerability Impact 33 of 131

AMI Web Vulnerability Mitigations SDLC (yeah, yeah) Web application penetration test or vulnerability assessment (maybe) Cryptographic signing of all critical requests Throttling of critical requests 34 of 131

Smart Grid Security Efforts NIST Smart Grid Interoperability Panel (SGiP) - Cyber Security Working Group (CSWG):http://collaborate.nist.gov/twikisggrid/bin/view/SmartGrid/CyberSecurityCTG Advanced Security Acceleration Project for Smart Grid (ASAP-SG) - developed the AMI Security Profile v2 for SGiP-CSWG/OpenSG AMI-SEC Open Smart Grid (OpenSG) - Smart Grid Security: http://osgug.ucaiug.org/utilisec/default.aspx North American Electric Reliability Corporation (NERC) - think PCI-DSS DHS: http://www.smartgrid.gov/federal_initiatives/federal_smart_grid_task_force/depart ment_of_homeland_security DOE: http://energy.gov/oe/technology-development/smart-grid ICS-CERT: http://www.us-cert.gov/control_systems/ics-cert/ o Where do AMI vulnerabilities go? IEEE Smart Grid: http://smartgrid.ieee.org/ 35 of 131

Thank you Any Questions? Contact information: John Sawyer john@inguardians.com Twitter: @johnhsawyer Don C. Weber don@inguardians.com @cutaway 36 of 131