Cyber Security in a Nuclear Context



Similar documents
THE AUSTRALIAN SIGNALS DIRECTORATE (ASD) STRATEGIES TO MITIGATE TARGETED CYBER INTRUSIONS

for Critical Infrastructure Protection Supervisory Control and Data Acquisition SCADA SECURITY ADVICE FOR CEOs

Application White Listing and Privilege Management: Picking Up Where Antivirus Leaves Off

Cyber Security Design Methodology for Nuclear Power Control & Protection Systems. By Majed Al Breiki Senior Instrumentation & Control Manager (ENEC)

Down the SCADA (security) Rabbit Hole. Alberto Volpatto

Protecting Your Organisation from Targeted Cyber Intrusion

Cyber Security for Nuclear Power Plants Matthew Bowman Director of Operations, ATC Nuclear IEEE NPEC Meeting July 2012

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Are you prepared to be next? Invensys Cyber Security

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

SIMPLIFYING THE PATCH MANAGEMENT PROCESS

Specific recommendations

Keeping the Lights On

Seven Strategies to Defend ICSs

UNCLASSIFIED. Briefing to Critical Infrastructure Sector Organizations on the Canadian Cyber Incident Response Centre (CCIRC)

AN ANALYSIS OF TECHNICAL SECURITY CONTROL REQUIREMENTS FOR DIGITAL I&C SYSTEMS IN NUCLEAR POWER PLANTS

MANAGE VULNERABILITIES

Cyber Security and the Canadian Nuclear Industry a Canadian Regulatory Perspective

SCADA Security Training

OPC & Security Agenda

Cyber security: A growing threat to the energy sector

PROTECTION FOR SERVERS, WORKSTATIONS AND TERMINALS ENDPOINT SECURITY NETWORK SECURITY I ENDPOINT SECURITY I DATA SECURITY

SECURING YOUR SMALL BUSINESS. Principles of information security and risk management

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

A Decision Maker s Guide to Securing an IT Infrastructure

AUDITOR GENERAL S REPORT. Protection of Critical Infrastructure Control Systems. Report 5 August 2005

New Zealand National Cyber Security Centre

CYBER SECURITY Is your Industrial Control System prepared? Presenter: Warwick Black Security Architect SCADA & MES Schneider-Electric

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

Pragmatic Metrics for Building Security Dashboards

Critical Controls for Cyber Security.

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Resilient and Secure Solutions for the Water/Wastewater Industry

Are controls to prevent, detect and respond to security breaches effective? Is the risk to business continuity being managed appropriately?

Information System Audit Guide

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

ESKISP Conduct security testing, under supervision

How To Manage Risk On A Scada System

The Protection Mission a constant endeavor

Working Practices for Protecting Electronic Information

Code of Practice for Cyber Security in the Built Environment

Additional Security Considerations and Controls for Virtual Private Networks

COMPUTER SECURITY OF INSTRUMENTATION AND CONTROL SYSTEMS AT NUCLEAR FACILITIES

Cyber security and critical national infrastructure

Protecting Organizations from Cyber Attack

CYBER SECURITY. Is your Industrial Control System prepared?

ABB s approach concerning IS Security for Automation Systems

Options for Cyber Security. Reactors. April 9, 2015

Integrating Cyber Security into Nuclear Power Plant Safety Systems Design

Cloud Computing Security Considerations

A New Layer of Security to Protect Critical Infrastructure from Advanced Cyber Attacks. Alex Leemon, Sr. Manager

Seven Things To Consider When Evaluating Privileged Account Security Solutions

RADIOACTIVE WASTE MANAGEMENT PROGRAMMES IN OECD/NEA MEMBER COUNTRIES AUSTRALIA NATIONAL NUCLEAR ENERGY CONTEXT

S a f e t y & s e c u r i t y a l i g n m e n t b e n e f i t s f o r h i g h e r o p e r a t i o n a l i n t e g r i t y R A H U L G U P TA

Nuclear Plant Information Security A Management Overview

Critical Infrastructure & Supervisory Control and Data Acquisition (SCADA) CYBER PROTECTION

Multi-factor authentication

N-Dimension Solutions Cyber Security for Utilities

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

The Protection and Security of Electronic Information Held by Australian Government Agencies

External Supplier Control Requirements

Security Controls What Works. Southside Virginia Community College: Security Awareness

Protecting productivity with Plant Security Services

Third Party Identity Services Assurance Framework. Information Security Registered Assessors Program Guide

The State-of-the-State of Control System Cyber Security

Security for. Industrial. Automation. Considering the PROFINET Security Guideline

What is Cyber Liability

Using Remote Desktop Clients

Security Testing in Critical Systems

Cyber Security Risk Mitigation Checklist

CESG Certification of Cyber Security Training Courses

Information Security Policy

Innovative Defense Strategies for Securing SCADA & Control Systems

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

CYBER SECURITY: A REPORT FROM THE TRENCHES 2015 AGC NATIONAL & CHAPTER LEADERSHIP CONFERENCE MIKE.ZUSMAN@CARVESYSTEMS.COM

Cyber Security Evaluation of the Wireless Communication for the Mobile Safeguard Systems in uclear Power Plants

Malicious Mitigation Strategy Guide

Practical Steps To Securing Process Control Networks

Cyber Essentials Scheme

WEST LOTHIAN COUNCIL INFORMATION SECURITY POLICY

The Need to Be Innovative and Agile. Bridging the IT/OT Divide Using Software-defined Solutions

Cyber Security for NERC CIP Version 5 Compliance

SUPPLIER SECURITY STANDARD

Technology Risk Management

IT Security Risks & Trends

How To Protect Decd Information From Harm

Corporate Account Takeover (CATO) Risk Assessment

Northwestern University Dell Kace Patch Management

Transcription:

Cyber Security in a Nuclear Context Mitchell Hewes & Nick Howarth UNCLASSIFIED

Who are we?

Our Facilities Synchrotron Accelerators Cyclotron OPAL

Lucas Heights Campus

Some Considerations

We have an interesting regulatory framework UNCLASSIFIED

especially the pharmaceuticals

Control Systems & Computer Security

So what is Security? risk = likelihood x impact Mathematically security controls address risks by minimising the likelihood or impact. How we see a risk is weighted by our perception of the threat and our own historical experiences. Schneier, B.: The Psychology of Security (2008)

Computer Security Application of security controls to a set of very complex programmable electronic devices. Digital Assets encompassing the hardware, software, and information. Photo by yellowcloud (flickr) / CC BY

Makeup of a Control System Field Devices Field Controllers SCADA, HMI

Cyber Attacks Shamoon Stuxnet Siberian pipeline sabotage 1982, way before stuxnet

Protect the Process Confidentiality: Unauthorised logic changes must be prevented. Integrity: Field Device Outputs/Inputs must remain immutable throughout their usable lifetime. Availability: Everything should remain in an operable state.

How? Personnel Security Physical Security Controls Perimeter is not enough. Network Segregation It Works! (if you do it properly) Ensure Authenticity (users, communications) Change Control Vendor & Supply Chain Security (vendors, and their products)

Air Gap Physical isolation of a network from unsecured networks. Provable unidirectional communication data diode. Reduces the attack surface. Is it really possible to isolate a control system? Software patches. Engineering and maintenance updates. Each transfer/modification comes with a risk Policy around transfers. Technical security controls to identify, isolate, and monitor what is allowed.

Computer Security at Nuclear Facilities

Priorities Plant Equipment fits into one of three categories. 1. Essential for Nuclear Safety. 2. Significant additional contribution to Nuclear Safety. 3. All other plant systems. Nuclear safety and nuclear security have a common purpose the protection of people, society and the environment. INTERNATIONAL NUCLEAR SAFETY GROUP, The Interface Between Safety and Security at Nuclear Power Plants, INSAG-24, IAEA, Vienna (2010).

Design Problems Risks to a safety or safety related system could have significant impact on the levels of defense in depth for the facility. Lifecycle of a typical Nuclear Facility is considerable. Reactor design to decommission can be 50-80 years. A waste storage facility -??? We are the custodians of these facilities and this material for our generation.

Technical Guidance Produced by the IAEA in consultation with states, regulators, and facility operators. NSS 17 Computer Security at Nuclear Facilities NST047 Computer Security Techniques for Nuclear Facilities NST036 Computer Security for I&C systems at Nuclear Facilities Openly available and offer advice that is relevant for even nonnuclear facilities.

A Graded Approach Many systems in a Nuclear Facility Protection System Physical Access Control System Reactor Control System Email All separate systems Consider and characterize risks to each individually Segregate and apply security controls to reduce risk

Don t bolt it on UNCLASSIFIED

UNCLASSIFIED

Cyber Security at the OPAL Research Reactor UNCLASSIFIED

A brief Introduction to OPAL

A brief introduction to OPAL Open Pool Australian Light Water Reactor 20MW Thermal Utilisation: Radiopharmaceutical Production Silicon Doping (NTD) Neutron Beams (Bragg Institute) Other Irradiations UNCLASSIFIED

A brief introduction to OPAL 1997 Replacement Research Reactor Project (RRRP) first funded 2000 Contract signed with INVAP 2001 License to construct issued 2006 Operating license issued 12 August 2006 First Criticality April 2007 Official Opening UNCLASSIFIED

UNCLASSIFIED

UNCLASSIFIED

UNCLASSIFIED

UNCLASSIFIED

UNCLASSIFIED

Systems

Protection Systems First Reactor Protection System Second Reactor Protection System UNCLASSIFIED

Control Systems Reactor Control and Monitoring System Other PLCs UNCLASSIFIED

Cyber Security

A Disclaimer This is what we do at OPAL This may or may not be suitable for your own facilities and organisations UNCLASSIFIED

Organisational Dedicated IT people for the plant Not corporate IT Not I&C Engineers UNCLASSIFIED

Physical Protected site Protected building Secure rooms and cabinets Monitoring UNCLASSIFIED

Physical No wireless No exceptions UNCLASSIFIED

Physical Keep contractor s IT assets away Maintain a dedicated computer for each contractor They ll complain, but they ll comply Keep corporate IT assets away Dedicated engineering workstations and laptops UNCLASSIFIED

Physical Don t leave boxes lying around Stand alone systems rot Consolidate and virtualise whatever you can Vendors wont always appreciate it UNCLASSIFIED

Physical Keep your plant offline, use data diodes if you really must have real time access to data Physical media controls Physically block USB and other media, remove external media drives UNCLASSIFIED

Logical Use data diodes to control what data is coming to/from the plant Physical media control software, for instances where you really must have physical media UNCLASSIFIED

Logical Conventional cyber security controls UNCLASSIFIED

How did we get there?

How did we get there? Australian Government Information Security Manual (ISM), from the Australian Signals Directorate http://asd.gov.au UNCLASSIFIED

The ISM in Context UNCLASSIFIED

From high level controls UNCLASSIFIED

to low level controls UNCLASSIFIED

Process Security Policy High level 1 pager Security Risk Management Plan What are the risks, and how bad are they? What controls will mitigate those risks, and how good are they? System Security Plan How are we implementing those controls? SOPs and other lower level Docs e.g. training material, checklists, forms UNCLASSIFIED

SRMP You already do HAZOPs and CHAZOPs, now do the same for IT security Generic SCADA Risk Management Framework For Australian Critical Infrastructure Developed by the IT Security Expert Advisory Group (ITSEAG) (Revised March 2012) http://www.tisn.gov.au/documents/scada-generic-risk-management-framework.pdf UNCLASSIFIED

But that s too much!

The Top 35 Strategies to Mitigate Targeted Cyber Intrusions http://www.asd.gov.au/infosec/top35mitigationstrategies.htm If you don t want the whole ISM, do the Top 35 UNCLASSIFIED

UNCLASSIFIED

The Top 4 1. Application whitelisting of permitted/trusted programs, to prevent execution of malicious or unapproved programs including.dll files, scripts and installers. 2. Patch applications e.g. Java, PDF viewer, Flash, web browsers and Microsoft Office. Patch/mitigate systems with "extreme risk" vulnerabilities within two days. Use the latest version of applications. 3. Patch operating system vulnerabilities. Patch/mitigate systems with "extreme risk" vulnerabilities within two days. Use the latest suitable operating system version. Avoid Microsoft Windows XP. 4. Restrict administrative privileges to operating systems and applications based on user duties. Such users should use a separate unprivileged account for email and web browsing. UNCLASSIFIED

Questions