Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi etieghi@visionautomation.



Similar documents
Safety and security are simply good business.

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Critical IT-Infrastructure (like Pipeline SCADA systems) require cyber-attack protection

Innovative Defense Strategies for Securing SCADA & Control Systems

Designing a security policy to protect your automation solution

ISACA rudens konference

OPC & Security Agenda

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

DeltaV System Cyber-Security

How To Protect Power System From Attack From A Power System (Power System) From A Fault Control System (Generator) From An Attack From An External Power System

Remote Services. Managing Open Systems with Remote Services

Three Simple Steps to SCADA Systems Security

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

TEMPLE UNIVERSITY POLICIES AND PROCEDURES MANUAL

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

Verve Security Center

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

GE Measurement & Control. Top 10 Cyber Vulnerabilities for Control Systems

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Ovation Security Center Data Sheet

Computer System Security Updates

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Ovation Security Center Data Sheet

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Manufacturing Operations Management. Dennis Brandl

How Secure is Your SCADA System?

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

Data Management Policies. Sage ERP Online

Feature. SCADA Cybersecurity Framework

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Critical Controls for Cyber Security.

INDUSTRIAL CONTROL SYSTEM SECURITY CURRENT TRENDS & RISK MITIGATION

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

A Systems Engineering Approach to Developing Cyber Security Professionals

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Process Control System Cyber Security Standards an Overview

Protecting Organizations from Cyber Attack

White Paper. April Security Considerations for Utilities Utilities Tap Into the Power of SecureWorks

Help for the Developers of Control System Cyber Security Standards

Italy. EY s Global Information Security Survey 2013

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

F G F O A A N N U A L C O N F E R E N C E

Session 14: Functional Security in a Process Environment

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Cyber Security for NERC CIP Version 5 Compliance

The Myths and Facts behind Cyber Security Risks for Industrial Control Systems

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

SCADA City of Raleigh. Martin Petherbridge, CPA, CIA Internal Audit Manager Shirley McFadden, CPA, CIA Senior Internal Auditor

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Keeping the Lights On

How to Integrate NERC s Requirements in an Ongoing Automation and Integration Project Framework

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

This is a preview - click here to buy the full publication

IT Security and OT Security. Understanding the Challenges

Secure Access into Industrial Automation and Control Systems Best Practice and Trends

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

Industrial Control Systems Security Guide

Making the most out of substation IEDs in a secure, NERC compliant manner

Supporting our customers with NERC CIP compliance. James McQuiggan, CISSP

Using ISA/IEC Standards to Improve Control System Security

A Comparison of Oil and Gas Segment Cyber Security Standards

A Decision Maker s Guide to Securing an IT Infrastructure

Professional Services Overview

Protection from cyber threats

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

Discussion Draft of the Preliminary Cybersecurity Framework Illustrative Examples

Protecting Your Organisation from Targeted Cyber Intrusion

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

Music Recording Studio Security Program Security Assessment Version 1.1

How To Protect Yourself From A Hacker Attack

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

A 360 degree approach to security

Dr. György Kálmán

SCADA Security: Challenges and Solutions

A Strategic Approach to Protecting SCADA and Process Control Systems

Plant Network Security

External Supplier Control Requirements

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

WICKSoft Mobile Documents for the BlackBerry Security white paper mobile document access for the Enterprise

NERC Cyber Security. Compliance Consulting. Services. HCL Governance, Risk & Compliance Practice

Are you prepared to be next? Invensys Cyber Security

Security Design.

Network/Cyber Security

GE Measurement & Control. Cyber Security for NEI 08-09

Driving Company Security is Challenging. Centralized Management Makes it Simple.

New Era in Cyber Security. Technology Development

I n f o r m a t i o n S e c u r i t y

Supplier Information Security Addendum for GE Restricted Data

Transcription:

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems Enzo M. Tieghi etieghi@visionautomation.it

Security IT & Control System Security: where are we?

Some cases about industrial - infrastructure Cyber incidents: In January, 2003, the SQL Slammer Worm penetrated a computer network at Ohio s Davis-Besse nuclear power plant and disabled a safety monitoring system for nearly five hours; SQL Slammer Worm downed one utility s critical SCADA network in US; another utility lost its Frame Relay Network used for communications; some petrochemical plants lost Human Machine Interfaces (HMIs) and data historians; a 911 call center was taken offline; Airline flights were delayed and cancelled in 2001, a series of cyber attacks were conducted on a computerized waste water treatment system by a disgruntled contractor in Queensland, Australia. One of these attacks caused the diversion of millions of gallons of raw sewage into a local river and park. There were 46 intrusions before the perpetrator was arrested.

Some cases about industrial - infrastructure Cyber incidents: In September, 2001, a teenager allegedly hacked into a computer server at the Port of Houston: the port s web service, which contained crucial data for shipping pilots, mooring companies and support firms responsible for helping ships navigate in and out of the harbor, was left inaccessible 1997: Shutdown at traffic air control system tower at Worchester Regional Airport (MA) USA Italy 2004: Sasser halts 40 PCs in production plant of leading pharmaceutical company (batches to rework, week-end spent to restart plants, reinstall and revalidate systems etc.) Water distribution SCADA system in California attacked and down (2005) No official statistical source: database with 20-30 tracked incidents in 2002-2004 in California (USA) Database at BCIT (CA) in construction

The 3 security faces Phisical Security (Perimeter): Guard on duty, gates, ports, etc. Human factor Security (Organization): Security policy Security procedures Awareness and training Cyber-Security (Technology): Antivirus Acces control, authentication, Firewalls,

Network Vulnerability: examples SAP MES Mail Server Browser Clients VPN Penetration Corporate Network Firewall Internet Email Viruses Browser Malware IM Downloads Firewall Penetration Unauthorized Access Desktops Historian Mobile Operator Protocol Vulnerabilities Vendor Diagnostics Web Server Wireless AP Vulnerability Exploit Flat Networks Plant Network Resource Constraints Ethernet Control System Application Server Contractor Hacking/Malware Remote Access Server EMS/ Indirect System Penetration HMI Disgruntled Employee POTS Remote Access Process Control Network (Proprietary or Ethernet) Controller or PLC

esecurity in control systems: industrial and infrastructure consideration about security (not only Safety ) 11 items why Security in control systems (DCS, PLC, SCADA/HMI, plant networks, etc. ) is different from IT Security

BS7799 vs. ISA-99.00.01 Comparison of Objectives Manufacturing and Control Systems Availability Integrity Traditional IT Systems Confidentiality Integrity Confidentiality Availability Priority

ANSI/ISA-95 Functional Hierarchy Level 4 Level 3 Business Planning & Logistics Plant Production Scheduling, Operational Management, etc Manufacturing Operations Management Dispatching Production, Detailed Production Scheduling, Reliability Assurance,... 4 - Establishing the basic plant schedule - production, material use, delivery, and shipping. Determining inventory levels. Time Frame Months, weeks, days 3 - Work flow / recipe control to produce the desired end products. Maintaining records and optimizing the production process. Time Frame Days, Shifts, hours, minutes, seconds Level 2 Level 1 Batch Control Continuous Control Discrete Control 2 - Monitoring, supervisory control and automated control of the production process 1 - Sensing the production process, manipulating the production process Level 0 0 - The actual production process

ANSI/ISA TR99.00.02 2004 Art. 6.5 Special Considerations for Manufacturing and Control Systems Manufacturing and Control System electronic security plans and programs are consistent with, and build on, existing IT security experience, programs, and practices. However, there are critical operational differences between IT and Manufacturing and Control Systems that influence how specific measures should be applied. ( ).

Why esec is different - 1 Differing risk management goals Rirsk Definition: Human safety and fault tolerance to prevent loss of life or endangerment of public health or confidence, loss of equipment, loss of intellectual property, or lost or damaged product.

Perché Why la esec Sicurezza is different è diversa? - 2 /2 Differing architecture security focus In a typical IT system, the primary focus of security is protecting the information stored on the central server. In manufacturing systems, the situation is reversed. Edge clients (e.g., PLC, operator station, or DCS controller) are typically more important than the central server.

Perché Whyla esec Sicurezza is different è diversa?/3-3 Differing availability requirements Many manufacturing processes are continuous in nature. Unexpected outages of systems that control manufacturing processes are not acceptable. Exhaustive pre-deployment testing is essential to ensure high availability for the Manufacturing and Control System. In addition to unexpected outages, many control systems cannot be easily stopped and started without affecting production. In some cases, the products produced or equipment being used is more important than the information being relayed. The requirement for high availability, reliability, and maintainability reduces the effectiveness of IT strategies like rebooting.

Perché Why la esec Sicurezza is different è diversa?/4-4 Unintended consequences Manufacturing and Control Systems can be very complex in the way that they interact with physical processes. All security functions integrated into the process control system must be tested to prove that they do not introduce unacceptable vulnerabilities. Adding any physical or logical component to the system may reduce reliability of the control system, but the resulting reliability should be kept to acceptable levels.

Perché Why la esec Sicurezza is different- è diversa?/5 5 Time critical responses For some systems, automated response time or system response to human interaction is critical. For example, emergency actions on regulatory process control systems should not be hampered by requiring password authentication and authorization. Information flow must not be interrupted or compromised.

Perché Why la esec Sicurezza is different è diversa?/6-6 Differing response time requirements Manufacturing and Control Systems are generally time critical Delay is not acceptable for the delivery of information, and high throughput is typically not essential.

Perché Whyla esec Sicurezza is different è diversa?/7-7 System software Differing and custom operating systems and applications may not tolerate typical IT practices. Networks are often more complex and require a different level of expertise (e.g., control networks are typically managed by control engineers, not IT personnel). Software and hardware applications are more difficult to upgrade in a control system network. Many systems may not have desired features including encryption capabilities, error logging, and password protection.

Perché Why la esec Sicurezza is different è diversa?/8-8 Resource constraints Control systems and their real time operating systems are resource constrained systems that do not include typical IT security technologies. Theremaynotbeavailablecomputing resourcesto retrofit these security technologies.

Perché Whyla esec Sicurezza is different è diversa?/9-9 Information integrity In-bound information is highly essential to the control system operation. It is important to take practical precautions to eliminate malicious in-bound information in an effort to maintain control operation.

Perché Why la esec Sicurezza is different è diversa?/10-10 Communications Communication protocols and media used by control systems environments are typically different from the generic IT environment, and may be proprietary. Examples include radio telemetry using asynchronous serial protocols and proprietary communication networks.

Perché Why la esec Sicurezza is different è diversa?/11 - Software Updates Security patches cannot always be implemented on a timely basis because software changes need to be thoroughly tested by the vendor of the manufacturing control application and the end user of the application before being implemented Change management control is necessary to maintain integrity of the control systems.

Perché Why esec la Sicurezza is different: è diversa? final These differences require careful assessment by Manufacturing and Control System experts working in conjunction with security and IT personnel. This team of people should carefully evaluate the applicability of IT and specific Manufacturing and Control Systems electronic security features, including thorough testing before application, where necessary.

Network Segregation Rings of Defense for Corporate and SCADA Networks www.dyonyx.com

What to do: ad hoc methodology and tools Industrial Security Assessment Industrial Security Vulnerability Tests Industrial Security Policy Industrial Incident Response Plans Business Continuity & Disaster Recovery Plans Industrial Protection (Industrial IDS/IPS) Monitoring and Managed Services for Industry Audit

Where Control Systems are? Everywhere Industrial but also Infrastructure Production and Distribution: Water, Oil & Gas, Power, etc. Traffic control: Railways, Highways, Tunnels, Air, etc. Buildings: Airports, Hospitals, Schools, Governament, Research Centers, Universities, Municipalities, etc. TLCs

What s moving 21 Steps to improve Cyber Security of SCADA Networks (USA White House) Common vulnerabilities in critical infrastructure control systems (U.S. Dept. Of Energy s National Nuclear Security Administration) Securing Process Control Systems - IT Security (European Commission)

Industrial security and international standards BS7799-ISO27000 Information security management systems Specification with guidance for use ISO/IEC 17799:2005 Information Technology Code of practice for information security management ANSI/ISA SP99 TR1 Security for Manufacturing and Control Systems ANSI/ISA SP99 TR2 Integrating Electronic Security into Manufacturing and Control Systems Environment ISO/IEC 15408 Common Criteria NIST System Protection Profile for Industrial Control Systems (SPP-ICS) CIDX Chemical Industry Data Exchange - Cibersecurity Vulnerability Assessment Methodology (VAM) Guidance ISPE/GAMP4 Good Automated Manufacturing Practices App. O Guideline for Automated System Security NERC standards AGA standards

need more information? www.visionautomation.it Enzo M. Tieghi - etieghi@visionautomation.it