Process Control Networks Secure Architecture Design



Similar documents
Effective Defense in Depth Strategies

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Scalable Secure Remote Access Solutions

DeltaV System Cyber-Security

Lifecycle Solutions & Services

Computer System Security Updates

Industrial Security for Process Automation

Security Solutions to Meet NERC-CIP Requirements. Kevin Staggs, Honeywell Process Solutions

Session 14: Functional Security in a Process Environment

Secure Remote Access Solutions Balancing security and remote access Bob Hicks, Rockwell Automation

Innovative Defense Strategies for Securing SCADA & Control Systems

IP Telephony Management

Cisco Advanced Services for Network Security

IT Security and OT Security. Understanding the Challenges

Information Security Policy

Securing The Connected Enterprise

PCN Cyber-security Considerations for Manufacturers. Based on Chevron Phillips Chemical Company PCN Architecture Design and Philosophy

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Building A Secure Microsoft Exchange Continuity Appliance

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Dr. György Kálmán

Are you prepared to be next? Invensys Cyber Security

SCADA/Business Network Separation: Securing an Integrated SCADA System

The Internet of Things (IoT) and Industrial Networks. Guy Denis Rockwell Automation Alliance Manager Europe 2015

OPC & Security Agenda

Building Secure Networks for the Industrial World

Developing Network Security Strategies

Integrating Electronic Security into the Control Systems Environment: differences IT vs. Control Systems. Enzo M. Tieghi

How To Secure Your System From Cyber Attacks

Best Practices for DanPac Express Cyber Security

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

NETE-4635 Computer Network Analysis and Design. Designing a Network Topology. NETE Computer Network Analysis and Design Slide 1

TPS Virtualization and Future Virtual Developments. Paul Hodge

Industrial Security Solutions

Using ISA/IEC Standards to Improve Control System Security

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

Defending Against Data Beaches: Internal Controls for Cybersecurity

Information Technology Cluster

Secure Access into Industrial Automation and Control Systems Industry Best Practice and Trends. Serhii Konovalov Venkat Pothamsetty Cisco

Lab Developing ACLs to Implement Firewall Rule Sets

Remote Services. Managing Open Systems with Remote Services

Security Levels in ISA-99 / IEC 62443

Three Simple Steps to SCADA Systems Security

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

SECURITY CONSIDERATIONS FOR LAW FIRMS

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

REFERENCE ARCHITECTURES FOR MANUFACTURING

Manufacturing Operations Management. Dennis Brandl

Specification and Technical Data. Operations Management Pro. OM Pro 310. Specification and Technical Data. OMPro-SPT-310

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

a Post-Stuxnet World The Future of Critical Infrastructure Security Eric Byres, P.Eng.

CYBER SECURITY: SYSTEM SERVICES FOR THE SAFEGUARD OF DIGITAL SUBSTATION AUTOMATION SYSTEMS. Massimo Petrini (*), Emiliano Casale TERNA S.p.A.

Network and Security Planning Guide

Protecting productivity with Plant Security Services

APT Advanced Persistent Threat Time to rethink?

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

Introduction to Cyber Security / Information Security

SECURING AN INTEGRATED SCADA SYSTEM. Technical Paper April 2007

AUP28 - Implementing Security and IP Protection

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Network Cyber Security. Presented by: Motty Anavi RFL Electronics

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

- Introduction to PIX/ASA Firewalls -

12. Firewalls Content

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Security Design.

Securely Architecting the Internal Cloud. Rob Randell, CISSP Senior Security and Compliance Specialist VMware, Inc.

Decrease your HMI/SCADA risk

Das sollte jeder ITSpezialist über. Automations- und Produktionsnetzwerke wissen

Network Virtualization Network Admission Control Deployment Guide

Process Solutions. Mitigating Cyber Security Risks in Legacy Process Control Systems. White Paper

Security appliances with integrated switch- Even more secure and more cost effective

CCNA Security 2.0 Scope and Sequence

This is a preview - click here to buy the full publication

Sustain.Ability Honeywell Users Group EMEA. Virtualization Solutions: Improving Efficiency, Availability and Performance

Top-Down Network Design

The rocky relationship between safety and security

Recommended IP Telephony Architecture

Symphony Plus Cyber security for the power and water industries

Secure Your Mobile Workplace

Security Frameworks. An Enterprise Approach to Security. Robert Belka Frazier, CISSP

Cyber Security Implications of SIS Integration with Control Networks

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

CHAPTER 6 DESIGNING A NETWORK TOPOLOGY

PI Server Security Best Practice Guide Bryan Owen Cyber Security Manager OSIsoft

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

IACS Network Security and the Demilitarized Zone

AUP28. Implementing Security In Integrated Architecture Practical security solutions for Industrial Control System (ICS)

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

SonicWALL Clean VPN. Protect applications with granular access control based on user identity and device identity/integrity

Transcription:

Process Control Networks Secure Architecture Design

Guest Speaker Robert Alston Principle Lead Network and Security Consultant Over 25 years network experience including design, implementation, troubleshooting and integration of firewalls, routers, switches and infrastructure. Robert has several certifications in the field of networks and security. (CISSP, Cisco CCNA, Cisco CCDA, Certified Unix Engineer (CUE), Control System Security US Department of Homeland Security) and Robert also has a Six Sigma Green Belt. Robert is based in Duluth, Georgia USA. 2

Agenda Secure Process Control Architecture Defining Secure Network Architecture What is a secure network architecture Why a secure network architecture Who needs a secure network architecture Designing Secure Network Architecture Defense in depth Layers of security Security levels Zone and Conduit Models Building Blocks Questions & Answers 3

4 Defining Secure Network Architecture

What Is a secure Network Architecture? Controlled Access Defined security zones Layered levels of security Highly available (Redundancy) 5

Why a secure network architecture? Compliance and Regulation Targeted Attacks Open Systems Risks associated with breach 6

Who needs a secure network architecture? Critical Infrastructure Regulated Industries Manufacturing Businesses that depend on Process Systems 7

8 Designing Secure Network Architecture

Defense in depth Defense in depth approach provides layers of security to protect critical i assets Multiple protection mechanisms Layers of protection Resilient to attack 9

Layers of security Physical Gates, locks, doors, etc. Electronic Biometric, proximity, etc. Cyber Firewalls, IDS/IPS, Access-lists, etc. Process control Application access, role-based access, etc. Process Control System Cyber Electronic Physical 10

Security Assurance Levels (SAL) SAL 1 PROTECTION AGAINST CASUAL OR COINCIDENTAL VIOLATION (I.e. changing a setpoint to a value outside engineering defined conditions, interception of a password send over the network in clear text.) SAL 2 PROTECTION AGAINST INTENTIONAL VIOLATION USING SIMPLE MEANS (I.e. virus infection, exploiting commonly known vulnerabilities of DMZ hosts) SAL 3 PROTECTION AGAINST INTENTIONAL VIOLATION USING SOPHISTICATED MEANS (I.e. exploits in operating systems, protocols. Attacker requires advanced security knowledge, advanced domain knowledge, advanced knowledge of the target system. I.e. password cracking.) SAL 4 PROTECTION AGAINST INTENTIONAL VIOLATION USING SOPHISTICATED MEANS WITH EXTENDED RESOURCES (Similar to SAL 3 but attacker now has extended resources to their disposal. I.e. StuxNet attack) 11

Manufacturing automation architecture ISA95 functional hierarchical model Level 4 Business Planning & Logistics Plant Production Scheduling, Operational Management, etc 4 - Establishing the basic plant schedule - production, material use, delivery, and shipping. Determining inventory levels. Time Frame Months, weeks, days OFFICE DOMAI IN Level 3 Level 2 Level 1 Manufacturing Operations Management Dispatching Production, Detailed Production Scheduling, Reliability Assurance,... Batch Control Continuous Control Discrete Control 3 - Work flow / recipe control to produce the desired end products. Maintaining records and optimizing the production process. Time Frame Days, Shifts, hours, minutes, seconds 2 - Monitoring, supervisory control and automated control of the production process Time Frame Hours, minutes, seconds, subseconds 1 - Sensing the production process, manipulating the production process PROCESS CONTROL DOM MAIN ISA99 Level 0 0 - The actual production process 12

Typical PCS Network Topology Level 4 Level 3.5 DMZ Level 3 Level 2 Level 1 Domain Controller ESF Router PHD Enterprise Switch Firewall Experion ESC ESF ACE Experion EST EAS ESVT Terminal Patch Mgmt Anti Virus 3 RD Party App Subsystem Interface Optional HSRP Router Safety Manager Terminal Qualified Cisco Switches e Domain Controller PHD Shadow Comm flow L4 to L4 Limited to L3 to L3 Limite d L2 to L3 L2 to L2 L1 to L1 y ited 5 to L4 een L4 & L3 Limi y ited L3 3.5 munications betwe Lim Lim mited L2 to L 3 No Direct comm or L2 ite 2 to to L s between L1 & L3 Lim d L2 L1 No communications or L4 13

Security levels Level 1 - Controllers and real time control Level 2 s, Operator Stations ti and supervisory control. Level 3 - Historians and Advanced Control and other Level 2 areas or units. Level 3.5 - DMZ accessed from the Business Network and the PCN. Level 4 - Is the business network with clients for Historians or Advanced Control applications. Level 3 and 3.5 utilizes standard open systems Ethernet technology and Level 4 utilizes standard open systems LAN technology. 14

Level 4 Level 4 Level 3.5 DMZ Level 3 Level 2 Level 1 Domain Controller ESF Router PHD Enterprise Switch Firewall Experion ESC ESF ACE Experion EST EAS ESVT Terminal Patch Mgmt Anti Virus 3 RD Party App Subsystem Interface Optional HSRP Router Safety Manager Terminal Qualified Cisco Switches e Domain Controller PHD Shadow Comm flow L4 to L4 Limited to L3 to L3 Limite d L2 to L3 L2 to L2 L1 to L1 y ited 5 to L4 een L4 & L3 Limi y ited L3 3.5 munications betwe Lim Lim mited L2 to L 3 No Direct comm or L2 ite 2 to to L s between L1 & L3 Lim d L2 L1 No communications or L4 15

Level 4 Is the business network with clients for Historians i or Advanced d Control applications. Untrusted Network Separated by a firewall No direct connection to Level 3 or below Managed by Business IT department Level 4 utilizes standard open systems LAN technology. 16

Level 3.5 Level 4 Level 3.5 DMZ Level 3 Level 2 Level 1 Domain Controller ESF Router PHD Enterprise Switch Firewall Experion ESC ESF ACE Experion EST EAS ESVT Terminal Patch Mgmt Anti Virus 3 RD Party App Subsystem Interface Optional HSRP Router Safety Manager Terminal Qualified Cisco Switches e Domain Controller PHD Shadow Comm flow L4 to L4 Limited to L3 to L3 Limite d L2 to L3 L2 to L2 L1 to L1 y ited 5 to L4 een L4 & L3 Limi y ited L3 3.5 munications betwe Lim Lim mited L2 to L 3 No Direct comm or L2 ite 2 to to L s between L1 & L3 Lim d L2 L1 No communications or L4 17

Level 3.5 Level 3.5 Is commonly called the DMZ Typical nodes WSUS, Anti-Virus, Terminal, etc. Provides connectivity for devices that are to be accessed from the Business Network and the PCN. Security zone between the PCN and outside networks Can be redundant, but not FTE capable 18

Level 3.5 Level 4 Level 3.5 DMZ Level 3 Level 2 Level 1 Domain Controller ESF Router PHD Enterprise Switch Firewall Experion ESC ESF ACE Experion EST EAS ESVT Terminal Patch Mgmt Anti Virus 3 RD Party App Subsystem Interface Optional HSRP Router Safety Manager Terminal Qualified Cisco Switches e Domain Controller PHD Shadow Comm flow L4 to L4 Limited to L3 to L3 Limite d L2 to L3 L2 to L2 L1 to L1 y ited 5 to L4 een L4 & L3 Limi y ited L3 3.5 munications betwe Lim Lim mited L2 to L 3 No Direct comm or L2 ite 2 to to L s between L1 & L3 Lim d L2 L1 No communications or L4 19

Level 3 Level 3 Connections for Historians and Advanced Control Routing Access List control connect other Level 2 areas or units Can be redundant, but not FTE capable HSRP 20

Level 2 Level 4 Level 3.5 DMZ Level 3 Level 2 Level 1 Domain Controller ESF Router PHD Enterprise Switch Firewall Experion ESC ESF ACE Experion EST EAS ESVT Terminal Patch Mgmt Anti Virus 3 RD Party App Subsystem Interface Optional HSRP Router Safety Manager Terminal Qualified Cisco Switches e Domain Controller PHD Shadow Comm flow L4 to L4 Limited to L3 to L3 Limite d L2 to L3 L2 to L2 L1 to L1 y ited 5 to L4 een L4 & L3 Limi y ited L3 3.5 munications betwe Lim Lim mited L2 to L 3 No Direct comm or L2 ite 2 to to L s between L1 & L3 Lim d L2 L1 No communications or L4 21

Level 2 Level 2 Connections for s and Operator Stations Supervisory control Connection to Level 1 Protection for Level 1 with access lists FTE capable 22

Level 1 Level 4 Level 3.5 DMZ Level 3 Level 2 Level 1 Domain Controller ESF Router PHD Enterprise Switch Firewall Experion ESC ESF ACE Experion EST EAS ESVT Terminal Patch Mgmt Anti Virus 3 RD Party App Subsystem Interface Optional HSRP Router Safety Manager Terminal Qualified Cisco Switches e Domain Controller PHD Shadow Comm flow L4 to L4 Limited to L3 to L3 Limite d L2 to L3 L2 to L2 L1 to L1 y ited 5 to L4 een L4 & L3 Limi y ited L3 3.5 munications betwe Lim Lim mited L2 to L 3 No Direct comm or L2 ite 2 to to L s between L1 & L3 Lim d L2 L1 No communications or L4 23

Level 1 Level 1 Controllers and real time control Controllers and Console Stations. FTE Bridge (FTEB) or C300 Protected by all other levels 24

Zone & Conduit model CONDUITS 25

Example Zones and conduits CCR Sub-Station A LCN-1 AVAILABLE CONDUITS PKS SvrsDC ESCESCESC Switch Pair ESFESF ES-T ESVT ESVT PHD L2 to L2 L1 to L1 ited L2 to L1 Limi Control Firewall Pair C300 Controller Switch Pair C200 Controller NIM FSC LCN PM Family 26

Malicious code Building Blocks Content Security and Control SR 3.2 MALICIOUS CODE PROTECTION Threat protection by anti-virus / content filtering at the firewall The IACS shall employ malicious code protection mechanisms. ASA 5500 series firewall (Cisco CSC) (1) Malicious code protection mechanisms shall be employed at workstations, servers, or mobile computing devices on the network. (2) Malicious code protection mechanisms shall be employed at critical entry and exit points (e.g., firewalls, web servers, proxy servers, remoteaccess servers). Principals Building Blocks 27

28 Additional security boundaries

Architecture Standards build Honeywell building blocks ISA99.03.03 IDENTIFIED SECURITY ASSURANCE LEVEL SELECTED PRINCIPALS SELECTED BUILDING BLOCKS DESIGN Security planning and Functional design 29

Thank you www.honeywell.com/ps 30