Does Aligning Cyber Security and Process Safety Reduce Risk?



Similar documents
1 ISA Security Compliance Institute

ISA Security Compliance Institute

ISA Security Compliance Institute

ISA Security Compliance Institute ISASecure IACS Certification Programs

ISA Security. Compliance Institute. Role of Product Certification in an Overall Cyber Security Strategy

The rocky relationship between safety and security

ISA Security Compliance Institute. ISASecure Embedded Device Security Assurance Certification

SSA-312. ISA Security Compliance Institute System Security Assurance Security development artifacts for systems

Controlling Risks Safety Lifecycle

What is CFSE? What is a CFSE Endorsement?

Is your current safety system compliant to today's safety standard?

Performing a Cybersecurity Risk Assessment on an IACS or SIS. Marco Ayala, aesolutions John Cusimano, aesolutions

Safety Requirements Specification Guideline

Industrial Control Systems Security Guide

Industrial Cyber Security 101. Mike Spear

Industrial Control System Cyber Security

Safety Integrated. SIMATIC Safety Matrix. The Management Tool for all Phases of the Safety Lifecycle. Brochure September Answers for industry.

Cybersecurity Training

Version: 1.0 Last Edited: Guideline

Safety controls, alarms, and interlocks as IPLs

Ernie Hayden CISSP CEH GICSP Executive Consultant

This is a preview - click here to buy the full publication

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

EDSA-300. ISA Security Compliance Institute Embedded Device Security Assurance ISASecure certification requirements

CSSC-CL Announces ISASecure Certification of Hitachi and Yokogawa Industrial Control Devices. ~For More Globally Competitive Control System Devices ~

SAFETY LIFECYCLE WORKBOOK FOR THE PROCESS INDUSTRY SECTOR

Bellevue University Cybersecurity Programs & Courses

Microsoft s cybersecurity commitment

A PROCESS ENGINEERING VIEW OF SAFE AUTOMATION

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Selecting Sensors for Safety Instrumented Systems per IEC (ISA )

Version: 1.0 Latest Edition: Guideline

IEC Overview Report

NIST Cybersecurity Framework Manufacturing Implementation

White Paper. 7 Steps to ICS and SCADA Security. Tofino Security exida Consulting LLC. Contents. Authors. Version 1.0 Published February 16, 2012

The President s Critical Infrastructure Protection Board. Office of Energy Assurance U.S. Department of Energy 202/

Industrial Security for Process Automation

Cybersecurity Training

Industrial Control Security

State Agency Cyber Security Survey v October State Agency Cybersecurity Survey v 3.4

Why SIL3? Josse Brys TUV Engineer

Defense-in-Depth Strategies for Secure, Open Remote Access to Control System Networks

Planning Your Safety Instrumented System

Frequently Asked Questions

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

ABB Automation Days, Madrid, May 25 th and 26 th, Patrik Boo What do you need to know about cyber security?

Fire and Gas Solutions. Improving Safety and Business Performance

Title: Rio Tinto management system

A DEVELOPMENT FRAMEWORK FOR SOFTWARE SECURITY IN NUCLEAR SAFETY SYSTEMS: INTEGRATING SECURE DEVELOPMENT AND SYSTEM SECURITY ACTIVITIES

White Paper: Librestream Security Overview

FREQUENTLY ASKED QUESTIONS

TECHNICAL SPECIFICATION

Dr. Markus Braendle, Head of Cyber Security, ABB Group 10 Steps on the Road to a Successful Cyber Security Program Asia Pacific ICS Security SUMMIT

SAFETY LIFE-CYCLE HOW TO IMPLEMENT A

Effective Software Security Management

Applying ISA/IEC to Control Systems MESAKNOWS. Graham Speake. Principal Systems Architect Yokogawa. Do you know MESA? Additional partner logos

Enterprise Security Tactical Plan

Security all around. Industrial security for your plant at all levels. siemens.com/industrialsecurity. Answers for industry.

Security Controls for the Autodesk 360 Managed Services

Security Services. A Solution for Providing BPM of Security Services within the Enterprise Environment.

Industrial Cyber Security. Complete Solutions to Protect Availability, Safety and Reliability of Industrial Facilities

Enterprise Cybersecurity: Building an Effective Defense

TÜV Rheinland Functional Safety Program Functional Safety Engineer Certification

An IACS user viewpoint for Cyber Security Management System

Application Functional Safety IEC 61511

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Reduce Medical Device Compliance Costs with Best Practices.

GoodData Corporation Security White Paper

The Advantages of an Integrated Factory Acceptance Test in an ICS Environment

INTRODUCTION TO NETWORK SECURITY. Nischit Vaidya, CISSP Instructor

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Mitigating safety risk and maintaining operational reliability

Aligning Cyber-Physical System Safety and Security

TECHNICAL REPORT IEC TR Security for industrial automation and control systems Part 2-3: Patch management in the IACS environment

CLOUD FRAMEWORK & SECURITY OVERVIEW

NSA/DHS Centers of Academic Excellence for Information Assurance/Cyber Defense

Obtaining Enterprise Cybersituational

Lifecycle Solutions & Services. Managed Industrial Cyber Security Services

TÜV FS Engineer Certification Course Being able to demonstrate competency is now an IEC requirement:

Management (CSM) Capability

The Electronic Arms Race of Cyber Security 4.2 Lecture 7

N-Dimension Solutions Cyber Security for Utilities

Adobe Systems Incorporated

ESTIMATION AND EVALUATION OF COMMON CAUSE FAILURES IN SIS

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

IT Professional Standards. Information Security Discipline. Sub-discipline 605 Information Security Testing and Information Assurance Methodologies

Cyber Security focus in ABB: a Key issue. 03 Luglio 2014, Roma 1 Conferenza Nazionale Cyber Security Marco Biancardi, ABB SpA, Power System Division

High Level Cyber Security Assessment 2/1/2012. Assessor: J. Doe

The Protection Mission a constant endeavor

USING INSTRUMENTED SYSTEMS FOR OVERPRESSURE PROTECTION. Dr. Angela E. Summers, PE. SIS-TECH Solutions, LLC Houston, TX

Agency for State Technology

Cisco Security Optimization Service

Functional Safety Management: As Easy As (SIL) 1, 2, 3

Logical Operations CyberSec First Responder: Threat Detection and Response (CFR) Exam CFR-110

Transcription:

Does Aligning Cyber Security and Process Safety Reduce Risk? How can we align them to protect Operational Integrity? Schneider Electric September 15, 2015 Hosted by Greg Hale, Founder & Editor of Industrial Safety & Security Source www.isssource.com 1

Host: Greg Hale ISS Source Over 30 years in the publishing industry covering manufacturing automation 10 years as the Chief Editor of InTech magazine Formerly Editor in Chief at Post Newsweek s Reseller Management magazine co-author of the book, Automation Made Easy Everything You Wanted to Know About Automation and Need to Ask Confidential Property of Schneider Electric 2

Both disciplines aim to protect Operational Integrity Process Safety > Prevent or minimize risk of personnel injury & damage to plant, property, environment Cyber Security > Prevent or minimize risk of personnel injury & damage to plant, property, environment > Applied through: > Standards & regulations > Process & system design > Plant hardware & software > Procedures & controls > Shared knowledge & experience > Regular reviews & updates > Applied through: > Standards & regulations > Process & system design > Plant hardware & software > Procedures & controls > Shared knowledge & experience > Regular reviews & updates Confidential Property of Schneider Electric 3

With key differences.. Process Safety Cyber Security > Primary focus is on internal processes > Mature discipline Safety always an issue > Standards & regulations quite rigorous > Widespread adoption common practice > Knowledge widely shared to apply new lessons > Issues and sources relatively stable and well understood Confidential Property of Schneider Electric Applied Rigor > Primary focus is on external threats > Relatively new field > Limited standards, spotty regulations > Varied application and attention > Information less likely to be shared > Issues and sources continually changing and not well understood > A Cyber incident can cause a safety incident Controlled Reaction 4

Operational Integrity depends on: Asset Owners > Responsible to operate & maintain systems Automation Equipment Suppliers > Deliver safe, secure & reliable products System Integrators > Engineer & implement safe, secure & reliable systems Confidential Property of Schneider Electric 5

But. If everything is not working together, with the same goals in mind.. Disaster can occur e.g. Turkish pipeline blast CAPECO fire (Caribbean Petroleum Corp.) Link to CSB Report Confidential Property of Schneider Electric 6 "Caribbean Petroleum Corporation Disaster" by CSB

From the boardroom down companies must ask themselves these three questions: 1 Do we understand what could go wrong? 2 Do we know what systems we have in place to prevent this from happening? 3 Do we have the information to assure us they are working effectively? Confidential Property of Schneider Electric 7 Health and Safety Executive (HSE)

All roles need to work together with Security AND Safety in mind Suppliers Design and Manufacture COTS Control Systems Asset Owners Operate and Maintain Site Specific Systems Integrators/Asset Owners Engineer and Integrate COTS into Site Specific Systems Confidential Property of Schneider Electric 8

Steve Elliott Andre Ristaino John Cusimano Asset Owner Supplier Integrator 9

Process Design Identify Hazards Consequence Analysis Layer of Protection Analysis Develop Non-SIS Layers Define Target SIL Document Requirements Process Hazards Analysis (PHA) Allocate Safety Functions and Protection Layers Safety Requirements Specification Management of Functional Safety Systems Lifecycle Management Confidential Property of Schneider Electric 10

Process Design Identify Hazards Consequence Analysis Layer of Protection Analysis Develop Non-SIS Layers Define Target SIL Document Requirements Unmitigated Risk Mitigated Risk Confidential Property of Schneider Electric 11

Supplier SDLA Phasesfor design and manufacture Supplier SDLA Phases Security Development Lifecycle Assurance for design and manufacture Design & Assess 1. Security Management Process 2. Security Requirements Specification 3. Security Architecture Design 4. Security Risk Assessment (Threat Model) 5. Detailed Software Design 6. Document Security Guidelines 7. Module Implementation & Verification 8. Security Integration Testing 9. Security Process Verification 10. Security Response Planning 11. Security Validation Testing 12. Security Response Execution Confidential Property of Schneider Electric 12

Detects & Avoids systematic design faults Audit development and maintenance processes Ensure a robust, secure development process Detects Implementation Errors / Omissions Audit components security functionality Identifies vulnerabilities in networks and devices Test components communication robustness Test for vulnerabilities Embedded Device Security Assurance (EDSA) Software Development Security Assessment (SDSA) Functional Security Assessment (FSA) Communications Robustness Testing (CRT) Confidential Property of Schneider Electric 13

Many companies don t have a true understanding of their cyber risk There is a lot that can be learned from process safety risk management Integrating cybersecurity into process safety is key Understanding cyber risk starts with a risk assessment Process Safety Lifecycle (ISA 84 / IEC 61511) Analysis Implementation Operation Cybersecurity Lifecycle (ISA / IEC 62443) Assess Implement Maintain Confidential Property of Schneider Electric 14

Help is on the way: ISA 62443-3-2 Security Risk Assessment and System Design ICS Cybersecurity Risk Assessment (a.k.a. Cyber PHA) ISA-TR84.00.09-2013 Security Countermeasures Related to Safety Instrumented Systems (SIS) & Associated IACS Illustration aesolutions 2014 Confidential Property of Schneider Electric 15

Summary: 1 2 3 Do we understand what could go wrong? Do we know what systems we have in place to prevent this from happening? Do we have the information to assure us they are working effectively? Asset Owner: Understand the Risk; Learn What to Protect Supplier: Create Threat Model System Integrator: Risk Assessment Confidential Property of Schneider Electric 16

2 Do we know what systems we have in place to prevent this from happening? Select SIS Architecture Systems Detailed Design Hardware Build Software Programming Testing Systems Installation Commissioning Full System Validation Design & Engineering Layers of Protection & Safe Guards Testing of Systems Prior to Installations Factory Acceptance Test (FAT) Systems Installation and Commissioning Systems Safety Validation Management of Functional Safety Systems Lifecycle Management Confidential Property of Schneider Electric 17

2 Do we know what systems we have in place to prevent this from happening? Supplier SDLA Phases Security Development Lifecycle Assurance for design and manufacture Build 1. Security Management Process 2. Security Requirements Specification 3. Security Architecture Design 4. Security Risk Assessment (Threat Model) 5. Detailed Software Design 6. Document Security Guidelines 7. Module Implementation & Verification 8. Security Integration Testing 9. Security Process Verification 10. Security Response Planning 11. Security Validation Testing 12. Security Response Execution Confidential Property of Schneider Electric 18

2 Do we know what systems we have in place to prevent this from happening? Asset Discovery Scan scan to discover network components Communications Robustness Test verify operation under high network load and malformed packets Network Stress Test verify that essential functions continue to operate under high network load Vulnerability Identification Test scan for the presence of known vulnerabilities using NESSUS and US Cert national vulnerability database Confidential Property of Schneider Electric 19

2 Do we know what systems we have in place to prevent this from happening? One of the biggest challenges industry faces is a insufficient integration of security into systems (e.g. defense-in-depth) Concepts are well recognized Slow process Engineering, implementation and testing Defense-in-Depth Confidential Property of Schneider Electric 20

Summary: 1 2 3 Do we understand what could go wrong? Do we know what systems we have in place to prevent this from happening? Do we have the information to assure us they are working effectively? Asset Owner: Full System Validation Supplier: Test, Test, Test System Integrator: Integration of Security; Defense in Depth Confidential Property of Schneider Electric 21

Startup System Operation Bypassing & MOC Maintenance Periodic Proof Tests Modifications Systems Operation and Maintenance Systems Modification Systems Decommissioning Management of Functional Safety Systems Lifecycle Management Confidential Property of Schneider Electric 22

Startup System Operation Bypassing & MOC Maintenance Periodic Proof Tests Modifications Unmitigated Risk Overdue maintenance Bypass Mitigated Risk Confidential Property of Schneider Electric 23

Supplier SDLA Phases Security Development Lifecycle Assurance for design and manufacture Run 1. Security Management Process 2. Security Requirements Specification 3. Security Architecture Design 4. Security Risk Assessment (Threat Model) 5. Detailed Software Design 6. Document Security Guidelines 7. Module Implementation & Verification 8. Security Integration Testing 9. Security Process Verification 10. Security Response Planning 11. Security Validation Testing 12. Security Response Execution Confidential Property of Schneider Electric 24

Suppliers Design and Manufacture COTS Control Systems Asset Owners Operate and Maintain Site Specific Systems Integrators/Asset Owners Engineer and Integrate COTS into Site Specific Systems Confidential Property of Schneider Electric 25

There are plenty of security monitoring tools available Most are designed for enterprise IT Need to be tested and carefully applied to ICS systems Plant personnel need to be trained on how to use these tools to effectively detect and respond to security incidents Security Tools > Network monitoring > Host intrusion detection > Endpoint threat detection > Network intrusion detection > Network access control > Security information and event management > Application control / whitelisting > Vulnerability scanners Confidential Property of Schneider Electric 26

Summary: 1 2 3 Do we understand what could go wrong? Do we know what systems we have in place to prevent this from happening? Do we have the information to assure us they are working effectively? Asset Owner: Use Risk Matrix Supplier: Security Process Verification System Integrator: Train Personnel on How to Use Monitoring Tools Confidential Property of Schneider Electric 27

Aligning Cyber Security and Process Safety Reduces Risk Prevent More similar than different Stronger Together Control Mitigate Safety Prevent Emergency Security Control Mitigate Approach security the same way that you do safety Emergency Confidential Property of Schneider Electric 28

Takeaways. What are some specific actions you can take to: Better align Cyber Security & Process Safety approaches? Confidential Property of Schneider Electric 29

Q & A 30

Where to get more information Schneider Electric www.real-time-answers.com/ ISSSource www.isssource.com ISA Secure www.isasecure.org ae Solutions www.aesolns.com Confidential Property of Schneider Electric 31

John Cusimano Director of Industrial Cybersecurity aesolutions john.cusimano@aesolns.com Contacts Glen Bounds Global Director, Cyber Security Services Schneider Electric glen.bounds@schneider-electric.com Andre Ristaino Managing Director Automation Standards Compliance Institute aristaino@isa.org Steve Elliott Senior Director, Offer Marketing Schneider Electric steve.j.elliott@schneider-electric.com Farshad Hendi Safety Services Practice Leader Schneider Electric farshad.hendi@schneider-electric.com Confidential Property of Schneider Electric 32

33