UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments



Similar documents
New Technologies for Substation Cyber Hardening

Cyber Security Summit Milano, IT

Stronger Than Firewalls: Unidirectional Security Gateways

Introduction to Waterfall Unidirectional Security Gateways: True Unidirectionality, True Security

Waterfall for NERC-CIP Compliance

Applying NERC-CIP CAN-0024 Guidance for Data Diodes To Unidirectional Security Gateways

CRITICAL INFRASTRUCTURE

Safe Network Integration

Meeting the Cybersecurity Standards of ANSI/ISA with Data Diodes

An Analysis of the Capabilities Of Cybersecurity Defense

Experience with Unidirectional Security Gateways Protecting Industrial Control Systems

An International Perspective on Security and Compliance

13 Ways Through A Firewall

Strong Security in NERC CIP Version 5: Unidirectional Security Gateways

DHS ICSJWG Fall Conference Maintaining Necessary Information Paths Over Unidirectional Gateways

13 Ways Through A Firewall What you don t know will hurt you

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

Goals. Understanding security testing

Stronger than Firewalls And Cheaper Too

RuggedCom Solutions for

SANS Top 20 Critical Controls for Effective Cyber Defense

ISACA rudens konference

Network Security Infrastructure Testing

Symphony Plus Cyber security for the power and water industries

SCADA Security Training

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

Document ID. Cyber security for substation automation products and systems

IT Security and OT Security. Understanding the Challenges

NERC CIP Version 5 and the PI System

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Digi Device Cloud: Security You Can Trust

OPC & Security Agenda

SCADA Security: Challenges and Solutions

Securely Connect, Network, Access, and Visualize Your Data

New Era in Cyber Security. Technology Development

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Cyber Security. Smart Grid

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Are you prepared to be next? Invensys Cyber Security

DeltaV System Cyber-Security

The Importance of Cybersecurity Monitoring for Utilities

What is Really Needed to Secure the Internet of Things?

Invensys Security Compliance Platform

North Dakota 2013 IT Security Audit Vulnerability Assessment & Penetration Test Project Briefing

State of the State of Control System Cyber Security

SCADA SYSTEMS AND SECURITY WHITEPAPER

Maximize Security to Minimize Compliance Costs. Technical Solutions Focused Webinar July 28, 2015 Sponsored by Waterfall Security Solutions

CIP- 005 R2: Understanding the Security Requirements for Secure Remote Access to the Bulk Energy System

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

How To Protect Your Network From Attack From A Hacker (For A Fee)

Ovation Security Center Data Sheet

OPCNet Broker TM for Industrial Network Security and Connectivity

Device Hardening, Vulnerability Remediation and Mitigation for Security Compliance

SCADA System Security. ECE 478 Network Security Oregon State University March 7, 2005

Using Tofino to control the spread of Stuxnet Malware

SCADA/Business Network Separation: Securing an Integrated SCADA System

Holistic View of Industrial Control Cyber Security

How To Achieve Pca Compliance With Redhat Enterprise Linux

Effective OPC Security for Control Systems - Solutions you can bank on

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Innovative Defense Strategies for Securing SCADA & Control Systems

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

Cyber Security nei prodotti di automazione

Designing a security policy to protect your automation solution

Introduction to Cyber Security / Information Security

Continuous Compliance for Energy and Nuclear Facility Cyber Security Regulations

Network Monitoring within a DMZ

RUGGEDCOM CROSSBOW. Secure Access Management Solution. siemens.com/ruggedcom. Edition 10/2014. Brochure

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Securing the Service Desk in the Cloud

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Information Blue Valley Schools FEBRUARY 2015

How To Secure Your System From Cyber Attacks

Secure SCADA Network Technology and Methods

Olav Mo, Cyber Security Manager Oil, Gas & Chemicals, CASE: Implementation of Cyber Security for Yara Glomfjord

Industrial Defender, Inc.: Recipient of the 2008 Global Risk Management Process Control & SCADA Company of the Year Award

Stateful Inspection Technology

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

Protecting Your Organisation from Targeted Cyber Intrusion

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

Industrial Security for Process Automation

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

Managed Security Services for Data

nwstor Storage Security Solution 1. Executive Summary 2. Need for Data Security 3. Solution: nwstor isav Storage Security Appliances 4.

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

Protect Your Assets. Cyber Security Engineering. Control Systems. Power Plants. Hurst Technologies

Security Controls for the Autodesk 360 Managed Services

How Secure is Your SCADA System?

HughesNet Broadband VPN End-to-End Security Enabled by the HN7700S-R

BalaBit IT Security Insight Singaporean Internet Banking and Technology Risk Management Guidelines Compliance

Protecting Organizations from Cyber Attack

Industrial Network Security and Connectivity. Tunneling Process Data Securely Through Firewalls. A Solution To OPC - DCOM Connectivity

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Transcription:

UNIDIRECTIONAL SECURITY GATEWAYS Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments 2010

Introducing: Waterfall Security Solutions Ltd Located in Rosh-Ha ayin, Israel Product core developed at 2004 and is evolving since Technology and Business Focus: North American SCADA Networks, Industrial Control networks, Utilities and Critical Infrastructures Tight and continuous relationships with relevant regulators and authorities Installed-base: Nuclear Plants, Fossil Plants, Pipelines, Refineries, Oil & Gas, Petro-Chemicals, Transportation, Air-ports, Water, and many other critical infrastructures and industrial organizations. Side # 2

Introducing: Waterfall Security Solutions Ltd What do we do: Unidirectional Security Gateways, end to end solutions - providing seamless, industrial grade, out-of-the-box integration and connectivity to existing infrastructures, industrial applications and SCADA protocols Provide absolute security Why customers buy our solutions: Assist achieving compliance to NERC, NRC and other relevant regulations Installed base includes Nuclear, Fossil and other power plants, pipelines, refineries and more all in industrial, critical or operational environments Robust, reliable, manageable, unidirectional security gateways Side # 3

The Quickly Changing Landscape Constant Change: Communication and process control systems are evolving Cyber-Threats are evolving Security measures Better evolve as well The Threat Critical National Infrastructures has become a prime target for Cyber Terror and Cyber Crime The assaults are backed up by capable entities (countries or terror groups with means) The perpetrators risks are minimal There are several documented successful power outages and other sorts of damage incidents Side # 4

The Threats are Real Side # 5

Main Threat Scenarios: Let s focus on two main threat scenarios: Side # 6

Scenario I Linking Critical and Business Networks The critical (operational, industrial) network is required to send realtime information to business/administrative networks Plant and production information Operational monitoring and status information Alerts and events The business network is commonly connected to other networks, including the Internet Via these connections, attackers can gain access to the critical network and carry out remote, online attacks into it Side # 7

Scenario II Remote Monitoring of Critical Networks A Control Center or Operations Center is remotely monitoring a critical network or an equipment within it This can be a 3 rd party vendor or service provider monitoring equipment for maintenance and service level The Control Center usually monitors many other networks, from other facilities and other countries Critical network now exposed to threats originating from each and every network which is monitored by this Control Center Internet/ Public network Central Monitoring Site Side # 8

The Traditional Solution Approach IT Security Deploy standard IT security means and techniques: Firewalls, intrusion detection and prevention systems Anti-viruses and content filters Encryption and authentication IT Security is not enough here: All IT Security products suffer software bugs Vulnerabilities and exploits miss configuration and human errors thus, can be hacked and circumvented Is this good enough when considering the risks? Side # 9

Software Based Security (Firewalls) Only one of the firewalls exhibited just a single misconfiguration. All the others could have been easily penetrated by both unsophisticated attackers and mindless automatic worms A. Wool, IEEE Computer, June 2004 Side # 10

Software Based Security What you must learn is that these rules are no different than the rules of a computer system. Some of them can be bent. Others can be broken. Understand? (Morpheus; The Matrix, chapter 15) Side # 11

Unidirectional Security Gateway The Novel Solution Side # 12

The Novel Approach - Unidirectional Connectivity Unidirectional data connectivity from the industrial network to corporate network Hardware based security, providing physical segregation Software agents installed on both ends to enable seamless connectivity with existing infrastructure Industrial Network Corporate Network Waterfall TX Server Waterfall RX Server Waterfall TX appliance Waterfall RX appliance Side # 13

Waterfall s Security Unidirectional Core Transmitter Receiver Hardware Based Unidirectional Security Gateway Laser Transmit Only Photocell Receive Only Side # 14

Connecting But. IP networks and applications are bidirectional, at all levels of communication Solution Mimic behavior of each side of the play: Mimic Tx side as if transmissions reached original destination Mimic Rx side transmissions as if coming from original sender Additional polling, pre-scheduled or trigger based activities and operations Side # 15

Waterfall Implementation in Industrial Networks Used for transmitting data from the critical network Hackers on the outside have no path into the network The critical network is 100% protected, business needs is 100% fulfilled Side # 16

Usage Scenarios Supporting all the needs Replicating applications and historian systems Transferring SCADA protocols Remote View and Remote Assistance Support for standard IT Side # 17

Real-time Replication of Historian systems Business Network Industrial Network Replica Historian Server Waterfall Historian Server Internet Fully functional, real-time updated Replica Historian server. Available for business users. Production network / Layer 3-4 network Real-time Historian server and Plant Information replication. Side # 18

Real-time Transfer of SCADA protocols Business Network Industrial Network OPC-DA Server/Client Waterfall OPC-DA Client/Server OPC-DA data Waterfall OPC-DA Server/Client OPC-DA data Internet Side # 19

Remote Monitoring and Remote Assistance Control Room/ Industrial Network Enabling secure external display of control rooms and monitoring centers screens External network Enabling simplified and now secure remote assistance and maintenance Real-time unidirectional replication of workstation or server display screens, to external networks. Waterfall Tx server External/public network Waterfall Rx server Waterfall keeps the Control network physically inaccessible from external networks Side # 20

File Transfer Passing files to external destinations Side # 21

Industrial Grade Solution Waterfall Gateway is a critical mission ready solution High availability implemented in the hardware (dual NICs) Cluster support by the software Inherent archiving and elastic buffering Dual power supply Side # 22

Waterfall One-Way includes connectors for: Leading Industrial Applications/Historians OSISoft PI, GE ihistorian, GE ifix, Scientech R*Time, Instep edna, GE OSM, Siemens WinCC, SINAUT Leading IT Monitoring Applications Log Transfer, SNMP, SYSLOG CA Unicenter, CA SIM, HP OpenView Matrikon Alert Manager File/Folder Mirroring Folder, tree mirroring, remote folders (CIFS) FTP/FTFP/SFTP/TFPS/RCP Leading Industrial Protocols Modbus, OPC (DA, HDA, A&&E) DNP3, ICCP Other connectors UDP, TCP/IP NTP, Multicast Ethernet Video/Audio stream transfer Mail server/mail box replication IBM Websphere MQ series Antivirus updater, patch (WSUS) updater Remote Print server Remote Screen View Real Time Screen capture for remove assistance Side # 23

Compliance Made Easy(ier) Relevant regulations and guidelines NRC RG5.71 NERC CIP 002 to 009 NIST 800.53 - Security Controls for Federal Information Systems and Organizations 800.82 - Guide to Industrial Control Systems Security 10 CFR 73.54 And more provide high assurance that digital computer and communication systems and networks are adequately protected against cyber attacks, up to and including the design basis threat as described in Title 10 of the Code of Federal regulations (10CFR) Part73, Section 73.1. implementation of state-of-the-art defense-in depth protective strategies RG 73.54 c (2), whose aim to ensure that the functions or tasks required to be performed by the critical assets are maintained and carried out RG 73.54 c (4) and to prevent adverse effects from cyber attacks (NRC RG73.54 c (3)). Detailed whitepapers Assessment of Waterfall Unidirectional Security Gateway for NIST Compliance 2010 (800.53 and 800.82) Waterfall NERC Compliance with regard to NERC-CIP Side # 24

Waterfall s Unique advantages Unidirectional Security Gateway - provides a full solution, out of the box Designed and built to meet Critical Infrastructure and Utilities needs Off the shelf integral support for Historians, SCADA protocols, file transfers, streaming Enables compliance with NERC-CIP, NIST 800.53 and 800.82, RG 5.71 Host hardware invariance - server agnostic, hardware independence Host hardware compatibility no need to certify hardware with host servers Simple hardware maintenance and replacement 1GB support hardware and software High Availability Integral in the product, for both hardware and software Inherent buffering mechanisms Side # 25

Waterfall in North America Department of Homeland Security selected Waterfall s technology for its National Cyber Security Test-bed US Patent covering SCADA/Control Networks security using Unidirectional Gateways Passed a cyber security assessment by Idaho National Laboratories Pike Research named Waterfall as key player in the cyber security market Strategic partnership and cooperation with: OSIsoft, GE, Siemens, and many other major industrial vendors Large installed base in the industrial critical infrastructure, in the US and Canada Side # 26

Waterfall implementations in the US Over 14 states, more than 25 operational sites Side # 27

Questions? THANK YOU! Side # 28