Cyber Security Health Test



Similar documents
Cyber Security for the energy industry

Cyber Security and Privacy - Program 183

How Much Cyber Security is Enough?

Document ID. Cyber security for substation automation products and systems

ISACA rudens konference

INTEGRATING SUBSTATION IT AND OT DEVICE ACCESS AND MANAGEMENT

Department of Management Services. Request for Information

7 Homeland. ty Grant Program HOMELAND SECURITY GRANT PROGRAM. Fiscal Year 2008

ZigBee IP Stack Overview Don Sturek Pacific Gas and Electric (PG&E) 2009 ZigBee Alliance. All rights reserved. 1

NIST Coordination and Acceleration of Smart Grid Standards. Tom Nelson National Institute of Standards and Technology 8 December, 2010

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Agenda. Introduction to SCADA. Importance of SCADA security. Recommended steps

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK

Smart Substation Security

William Hery Research Professor, Computer Science and Engineering NYU-Poly

Robert Malmgren. Smart Grid. Security Challenges - Legacy and Infrastructure Burdens

PROJECT BOEING SGS. Interim Technology Performance Report 3. Company Name: The Boeing Company. Contract ID: DE-OE

Securing Distribution Automation

The Next Generation of Security Leaders

Flexible Plug & Play Smart grid cyber security design and framework. Tim Manandhar

Cyber Security Seminar KTH

An Evaluation of Security Posture Assessment Tools on a SCADA Environment

Symphony Plus Cyber security for the power and water industries

Technical Security in Smart Metering Devices: A German Perspective S4 SCADA Security Scientific Symposium , Miami Beach FL / USA

EVALUATION REPORT. Weaknesses Identified During the FY 2014 Federal Information Security Management Act Review. March 13, 2015 REPORT NUMBER 15-07

Cybersecurity in the maritime and offshore industry

1 ISA Security Compliance Institute

UNIDIRECTIONAL SECURITY GATEWAYS. Utilizing Unidirectional Security Gateways to Achieve Cyber Security for Industrial Environments

Cyber security measures in protection and control IEDs

Utility Telecom Forum. Robert Sill, CEO & President Aegis Technologies February 4, 2008

Cyber Security. Smart Grid

Industrial Cyber Security 101. Mike Spear

Consulting International

Patch and Vulnerability Management Program

Enterprise Information Technology Security Assessment RFP Answers to Questions

Defending Against Data Beaches: Internal Controls for Cybersecurity

Defending the Internet of Things

How To Protect Your Network From Attack

Security Issues for the Power Automation Industry in Central/South America. Juan Esteban Hoyos Pareja Timothy X. Brown Mark Dehus

Security and Vulnerability Testing How critical it is?

Information Security Management Systems. Chief Operating Officer, Director of Strategy and Business Development, Chief Information Security Officer

Challenges and Opportunities for Aligning the Power System Cybersecurity and Reliability Objectives

The Importance of Cybersecurity Monitoring for Utilities

Q&A ADDENDUM FOR INFORMATION SECURITY VULNERABILITY ASSESSMENT PUBLISHED 10/20/2015

ICT budget and staffing trends in Healthcare

Compliance Guide ISO Compliance Guide. September Contents. Introduction 1. Detailed Controls Mapping 2.

Security in Smart Grid / IoT. Nenad Andrejević Comtrade Solutions Engineering

Goals. Understanding security testing

Cyber Security for Substation Automation, Protection and Control Systems

Risk Management in Practice A Guide for the Electric Sector

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

Secure Machine to Machine Communication on the example of Smart Grids

Cyber Security for SCADA/ICS Networks

Communication Security Measures for SCADA Systems

Protecting Critical Infrastructure

IEEE Standards Activities in the Smart Grid Space (ICT Focus)

Improving SCADA Control Systems Security with Software Vulnerability Analysis

Personal Security Practices of the CAO

Holistic View of Industrial Control Cyber Security

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Intrusion Detection for SCADA Systems

future data and infrastructure

DNP Serial SCADA to SCADA Over IP: Standards, Regulations Security and Best Practices

OPC & Security Agenda

Secure Networks for Process Control

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Secure Networking for Critical Infrastructure Using Service-aware switches for Defense-in-Depth deployment

Unifying Smart Grid Communications using SIP

Update On Smart Grid Cyber Security

The IBM Solution Architecture for Energy and Utilities Framework

How To Protect Your Network From Attack

Executive Summary. Cybersecurity cannot be completely solved, and will remain a risk we must actively manage.

Smart grid cyber security certification

Lessons Learned from AMI Pioneers Follow the Path to Success

A HELPING HAND TO PROTECT YOUR REPUTATION

Dr. György Kálmán

NAVFAC EXWC Platform Information Technology (PIT) Cyber Security Initiatives

Enterprise Management Solutions Protection Profiles

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Looking at the SANS 20 Critical Security Controls

Evaluation Report. Weaknesses Identified During the FY 2013 Federal Information Security Management Act Review. April 30, 2014 Report Number 14-12

ISA Security Compliance Institute

What Risk Managers need to know about ICS Cyber Security

!! "# $%!& $!$ +) * ', -./01.//1233/ "4, -./01.//12223 *, 565

NIST Cyber Security Activities

CMPT 471 Networking II

Transcription:

ENERGY Cyber Security Health Test Robin Massink 20-05-2014 1 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER

Cyber security issues facing the utility industry We are moving from IEC60870-5-101/ DNP3 serial to IEC60870-5-104/DNP3 Ethernet. What do we need to do regarding cyber security when introducing Ethernet components in our SCADA system? We are rolling out a new smart meter network infrastructures and we worry about privacy and security of the system, where to start? We are rolling out a new IP based SCADA system(cdma, MPLS based technologies), and we worry about the security of the system. What are the first things we need to secure? We wonder how secure our current system is. What should we do first to improve this? 2

The situation Problem owner Chief Security Officer Traditional topdown, desk based architectural risk assessment Solution Implementers Information and Competence GAP Asset Management Engineers Time pressure to deliver security is not a priority No security requirements It goes into network for 15 years 3

Challenges The fence around the assets isn t enough anymore The smart grid is moving in, and interconnecting things along the way Vendors offer an answer but is it enough? IT security companies are happy to help, but do they understand what we need? The translation form a security policy to a secure device implementation is not straightforward There are a lot of standards for guidance, but none of them complete, and all with a different scope 4

Cyber security standards and guidelines: current landscape Source: SG-CG/SGIS

Cyber security standards and guidelines: current landscape Cyber Security Health Test service

Cyber security health testing service Smart grid and security standards Testing topics 1. Functional Testing 2. Negative and Robustness testing Requirements test pack Common criteria methodology 3. Known vulnerability testing, leveraging global vulnerability database In-situ, smart grid equipment Findings and recommendations 7

Cyber security health testing service Security risk assessments and policies Top-down approach Device specific list of technical security requirements Validation of implemented security Detailed test cases and technical vulnerabilities Severity of findings Suggestions for improvements Bottom up approach Security validation by testing 8

ENERGY Global Innovation Project 2013 Cyber Security Health testing service Robin Massink 20-05-2014 9 DNV GL 2013 2014 20-12-2013 SAFER, SMARTER, GREENER

When a implementation is not validated 10

Research: standards coverage and analysis Focus: requirements for Cyber security health testing Analysis included: 7 Cyber security projects and investigations 12 National and international security standards 4 Commercial cyber security testing services 4 Common cyber security test methodologies 5 Cyber security experts within DNV GL 11

Result of research: Requirement analysis Standard Requirements Testable requirements Detailed IEC 62351 105 100% 100% 100% IEEE 1686 50 100% 90% 80% IEC 62443-2-4(WIB) 102 49% 35% 30% NERC-CIP 85 38% 25% 20% NIST IR 7628 147 35% 20% 10% Total 489 289 231 207 Testcases that can be defined

Approach, standards and methodology Unique requirements distilled from 489 requirements divided over 6 standards Divided over 15 topics 4 device categories with in total 26 device types applicable to SCADA, DA and smart metering C.c. methodology for test case definition 13

Equipment and depth Vulnerability assessment tools Penetration test tools Scan tools Robustness tools File analysers Network access tools Protocol analysers Protocol specific tools Brute force crack tools Vendor specific tools (vendor configuration tools) Measurements tools (response monitor) Include local and remote access Verify claimed features Verify relation between features (holistic) No source code assessment No chip etching or side channel analysis 14

Pilots & participants We offered a free pilot to utility companies Participating countries: USA Norway Spain Netherlands Germany Deliverable: Test report includes Implemented security features Assessment depth and findings Recommendations for mitigation Provided equipment: Protection relay Telecom equipment RTU IED SCADA system IDS system Smart meter Data concentrator 15

Findings Companies do not know what is inside their network on a deep level Not much high level requirements are facilitated by functionality in devices Multiple security functions could be circumvented Standard or bad passwords is still the biggest threat Claimed security functions are not used, or broken Configurations do not display an understanding of device capabilities Devices are easy to break: ICMP, HTTP are capable of crashing a device Requirements are not considered by the vendor as applicable for them Or vendors claim compliance to standards that not apply Utilities only consider functions they use (are not aware of other functions) Interconnection is done without considering security Usage of standard components is very common 16

Result of the global innovation project 5 successful pilot projects and a lot of findings A commercial service for cyber security device testing A public list with 78 testable requirements to be used for procurements, implementation and validation 17

Next Steps Donate testable security requirements document and methodology to IEC62351? Donate early draft test procedures for IEC62351-5? Harmonisation with EU Smart grid cyber security certification(enisa) ISO/IEC 17067 - product certification schemes Global innovation project for 2014: end-to-end cyber security testing service for Energy companies with SCADA, DA and smart meter systems 18

Thank you More info on our blog: dnvkemautilityfuture.com For further info and the public requirements test pack, please ask or email me: robin.massink@dnvgl.com +31 026 356 2586 www.dnvgl.com SAFER, SMARTER, GREENER http://www.dnvkemautilityfuture.com/dnv-gl-explains-the-importance-of-cyber-security-health-testing-of-scada-systems 19