ICS-SCADA testing and patching: Recommendations for Europe



Similar documents
CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Cyber Security in EU: ENISA approach

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

UMHLABUYALINGANA MUNICIPALITY PATCH MANAGEMENT POLICY/PROCEDURE

Best Practices in ICS Security for Device Manufacturers. A Wurldtech White Paper

Cisco Security Optimization Service

Cyber Security in Europe

Cyber Security in EU: ENISA approach

How To Write A Cybersecurity Framework

NERC CIP VERSION 5 COMPLIANCE

Supporting CSIRTs in the EU Marco Thorbruegge Head of Unit Operational Security European Union Agency for Network and Information Security

Secure Content Automation Protocol (SCAP): How it is increasingly used to automate enterprise security management activities

NIST Cybersecurity Initiatives. ARC World Industry Forum 2014

i-pcgrid Workshop 2015 Cyber Security for Substation Automation The Jagged Line between Utility and Vendors

Patching & Malicious Software Prevention CIP-007 R3 & R4

Achieving Global Cyber Security Through Collaboration

Security and privacy standardization for the SME community

North American Electric Reliability Corporation (NERC) Cyber Security Standard

Prof. Udo Helmbrecht

Cyber Resilience Implementing the Right Strategy. Grant Brown Security specialist,

MEMORANDUM. Date: October 28, Federally Regulated Financial Institutions. Subject: Cyber Security Self-Assessment Guidance

Industrial Control Systems Security Guide

Deep Security Vulnerability Protection Summary

The Value of Vulnerability Management*

The Protection Mission a constant endeavor

Vulnerability management lifecycle: defining vulnerability management

External Supplier Control Requirements

THE TOP 4 CONTROLS.

Best Practices in ICS Security for System Operators. A Wurldtech White Paper

Dr. Vangelis OUZOUNIS Senior Expert Security Policies ENISA.

ENISA What s On? ENISA as facilitator for enhanced Network and Information Security in Europe. CENTR General Assembly, Brussels October 4, 2012

Staying Secure After Microsoft Windows Server 2003 Reaches End of Life. Trevor Richmond, Sales Engineer Trend Micro

The State of Industrial Control Systems Security and National Critical Infrastructure Protection

Cisco Advanced Services for Network Security

How To Write An Article On The European Cyberspace Policy And Security Strategy

State of Oregon. State of Oregon 1

Actions and Recommendations (A/R) Summary

GOVERNMENT USE OF MOBILE TECHNOLOGY

National Cyber Security Policy -2013

Procuring Penetration Testing Services

Cyber Security and Privacy - Program 183

Domain 1 The Process of Auditing Information Systems

Protecting Your Organisation from Targeted Cyber Intrusion

EU Priorities in Cybersecurity. Steve Purser Head of Core Operations Department June 2013

Which cybersecurity standard is most relevant for a water utility?

Goals. Understanding security testing

Technology and Cyber Resilience Benchmarking Report December 2013

Security Patch Management

Information Security and Risk Management

Juniper Networks Secure

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

Defending Against Data Beaches: Internal Controls for Cybersecurity

Closing the Vulnerability Gap of Third- Party Patching

Suzanne B. Schwartz, MD, MBA Director Emergency Preparedness/Operations & Medical Countermeasures (EMCM Program) CDRH/FDA

Introduction to the ITS Project Management Methodology

CONTROL SYSTEM VENDOR CYBER SECURITY TRENDS INTERIM REPORT

Sustainability & Transferability Plan

Sample Vulnerability Management Policy

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Information security due diligence

Cyber Security :: Insights & Recommendations for Secure Operations. N-Dimension Solutions, Inc.

Smart Security. Smart Compliance.

Lot 1 Service Specification MANAGED SECURITY SERVICES

Deloitte Cyber Risk Services Providing trust in a digital world

Technical Guideline on Security Measures

micros MICROS Systems, Inc. Enterprise Information Security Policy (MEIP) August, 2013 Revision 8.0 MICROS Systems, Inc. Version 8.

Cloud Computing and Security Risk Analysis Qing Liu Technology Architect STREAM Technology Lab

ASEAN Regional Forum Cyber Incident Response Workshop Republic of Singapore 6-7 September Co-Chair s Summary Report

Cloak and Secure Your Critical Infrastructure, ICS and SCADA Systems

IoT & SCADA Cyber Security Services

GSN Cloud Contact Centre Partnership Datasheet

Manage Release and Deployment

DOD Medical Device Cybersecurity Considerations

Viewfinity Privilege Management Integration with Microsoft System Center Configuration Manager. By Dwain Kinghorn

N-Dimension Solutions Cyber Security for Utilities

Legislative Council Panel on Information Technology and Broadcasting. Hacking and Virus Activities and Preventive Measures

DIVISION OF INFORMATION SECURITY (DIS) Information Security Policy Threat and Vulnerability Management V1.0 April 21, 2014

How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1

UoD IT Job Description

defense through discovery

How To Secure Your System From Cyber Attacks

Announcement of a new IAEA Co-ordinated Research Programme (CRP)

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

Analysis of ICS-SCADA Cyber Security Maturity Levels in Critical Sectors

FAQ to ENISA s report on technologies to improve the resilience of communication networks

Total Protection for Compliance: Unified IT Policy Auditing

Vulnerability Management

Seven Strategies to Defend ICSs

Mapping the Technical Dependencies of Information Assets

Transcription:

ICS-SCADA testing and patching: Recommendations for Europe Adrian Pauna adrian.pauna@enisa.europa.eu European Union Agency for Network and Information Security www.enisa.europa.eu

Agenda ENISA previous works on ICS SCADA security 2013 s projects Recommendations for Harmonized ICS Testing Capability in the EU Window of Exposure a real problem for SCADA systems? Q&A European Union Agency for Network and Information Security www.enisa.europa.eu 2

1. ICS Security Study 2011 Aim/Scope of the Study ICS Security panorama Threats, risks, challenges National and pan-european initiatives Identification of gaps Recommendations Draft Report: ENISA Recommendations on ICS Security Workshop 16 Sep, 2011 ENISA Recommendations National and Pan-European ICS Security Strategies Good Practices Guide for ICS Security ICS Security Plan Templates Awareness and Training Common Test Bed or ICS Security Certification Framework National ICS CERTs Research in ICS Security The needs of research in the area of Patching and updating equipment without disruption of service and tools European Union Agency for Network and Information Security www.enisa.europa.eu 3

2013 s projects in the area of ICS SCADA security Can we learn from SCADA security Incidents? Ex-post incident analysis aims primarily at investigating a security incident. This report attempts to cover some basic ground by providing recommendations towards the implementation of a proactive environment that will facilitate agile and integrated response to incidents and their ex post analysis. Recommendations for Harmonized ICS Testing Capability in the EU (cont.) Window of Exposure a real problem for SCADA systems(cont.) ICS certification(small study) European Union Agency for Network and Information Security www.enisa.europa.eu 4

Recommendations for Harmonized ICS Testing Capability in the EU The objectives of the work (from ENISAs Tender P/26/12/TCD): Assess the need among the Member States for a national ICS-SCADA testing framework. Identify the gaps between different (if any) MSs and the challenges involved in developing ICS-SCADA testing capabilities. Produce guidance for both the development of new and harmonization of current ICS-SCADA test beds frameworks (if any) among Member States. Research and develop good practices on developing a European ICS- SCADA test bed program/framework. Desktop Research Questionnaires answered by experts for easy to analyse data Interviews for deeper understanding Questions categorized by Topics Experts categorised by «Stakeholder Type» and «Sector» Analysis of the results: Final Workshop and Review European Union Agency for Network and Information Security www.enisa.europa.eu 5

Short introduction on the Status, Gaps and Challenges of ICS SCADA testing identified in the Report Key Findings grouped by the following categories : Current status of ICS Testing Objectives for a European ICS Testing Capability Consideration about the model and methodologies Overview of Available Resources Major Constraints, Risks, Threats and Limitations Relationships with other Stakeholders European Union Agency for Network and Information Security www.enisa.europa.eu 6

Current status of ICS Testing Not harmonized situation for ICS Testing No real "ICS Security educational environment" in the EU Low Maturity Level of ICS Security Testing methodologies and initiatives in Europe Interest in a Certification Framework European Union Agency for Network and Information Security www.enisa.europa.eu 7

Objectives for a European ICS Testing Capability Several drivers show the need of a European Testing Capability, being independent is the main one Political Will has been necessary in similar experiences abroad Get aligned with already existent standards is preferred to develop new ones Offer value to all stakeholders considered key for success A systemic or holistic approach is recommended but is more difficult to standardize Debate regarding the adequacy of making testing mandatory Means to enforce vulnerability resolutions to be considered European Union Agency for Network and Information Security www.enisa.europa.eu 8

Consideration about the model and methodologies Need for both Testing facilities and a Certification Framework Debate concerning if Certification and Compliance are adequate for improving security Unclear which should be the subject of certification Stakeholder roles for definition and operation will require common agreement and public leadership "Acceptance of the results" and "Comprehensiveness of tests" are the best measure of success EU complexity makes desirable a "Distributed Model" with an Accreditation Organism on top Segmentation by business is the most recommended European Union Agency for Network and Information Security www.enisa.europa.eu 9

Overview of Available Resources Public Private Partnership as the most accepted Financing Model Strong Initial Public Investment has been needed in similar initiatives abroad Multiple Reasons for Success identified in existing initiatives abroad Not advisable to publish product comparative charts Work in multidisciplinar teams needed Engage expertise from the industry recommended European Union Agency for Network and Information Security www.enisa.europa.eu 10

Major Constraints, Risks, Threats and Limitations Achieve trust is the most challenging Organization Issue Strategies identified to grant trust are related with Test bed Independency Diversity is the biggest technical challenge Difficult agreement for testing methodologies is foreseen Complexity of the Legal environment among biggest challenges Need for an accurate Economic Model for Public Private Partnership European Union Agency for Network and Information Security www.enisa.europa.eu 11

Relationships with other Stakeholders Representative Composition of the Executive Board Fluent communications with CERTs recommended Debate regarding Vulnerability Disclosures Handling Vulnerability Resolution Enforcement recommended by Security Test Lab Experts Involve stakeholders in dissemination activities Testing Environment useful for Educational purposes European Union Agency for Network and Information Security www.enisa.europa.eu 12

Overview: 7 Recommendations European Union Agency for Network and Information Security www.enisa.europa.eu 13

Recommendation 1: The creation of a Testing Capability under Public European ownership and leadership An entity called Supervisor, should foster Public Support for the initiative and involve other public and private organizations to cooperate in the early stages of the initiative. Quick Win 1: The Supervisor for the Testing Capability would become contact relevant Stakeholders and become a clear Point of Contact for any interested entity. European Union Agency for Network and Information Security www.enisa.europa.eu 14

Recommendation 2: The establishment of a trusted and functional Executive Board Then, this stakeholders, by their representatives and always under the lead of the Supervisor, would create a Working Group that would become the Executive Board, able to define the strategy and further steps in the definition of the Testing Capability. Quick Win 2: The Supervisor would state clear participation rules for the Testing Capability. Quick Win 3: Stakeholder representatives would be engaged for the Executive Board working group. Quick Win 4: The Executive Board will define a common strategy for the Testing Capability. European Union Agency for Network and Information Security www.enisa.europa.eu 15

Recommendation 3: On the creation or involvement of working groups for specific activities The Executive Board then would create or engage already existing experts in order to create thematic Working Groups for technical, financial, legal, research, educational or communications issues. Quick Win 5: Current initiatives in ICS Security Testing will be officialy contacted in order to stablish more specific cooperation tasks. Quick Win 6: Working Groups would define the testing methodologies and criteria that are more alligned with the strategy. European Union Agency for Network and Information Security www.enisa.europa.eu 16

Recommendation 4: The definition of a Financial Model realistic with the European situation The working group in charge of the Financial Model, by now called Advisory Financial Board would have to create a realistic business definition able to guarantee both sustainability and independence. Quick Win 7: Involved working groups will identify potential sources of funding and develop a business plan. European Union Agency for Network and Information Security www.enisa.europa.eu 17

Recommendation 5: Making a study of feasibility for a Distributed Model Within the responsibilities of the Technical Board, supported by the Executive Board, it would be the study of feasibility of a distributed model of operation. Test methodologies and standards, and a clear accreditation model designed to engage current test beds and certification institutions would have to be developed. Quick Win 8: ICS Security Testing accreditation criteria will be defined. European Union Agency for Network and Information Security www.enisa.europa.eu 18

Recommendation 6: Establish collaboration agreements with other organisations dealing with ICS security Other entities such as CERTs, other international ICS Security Testing initiatives and, in general, any stakeholder has to have clear communication processed with the Testing Capability. The communications group would have design these protocols and operate them Quick Win 9: Non Disclosure Agreements and other legal requirements will be elaborated. Quick Win 10: Current CERTs would be contacted for specific cooperation, including Vulnerability Disclosures and incident response. European Union Agency for Network and Information Security www.enisa.europa.eu 19

Recommendation 7: Establish a knowledge management programme Knowledge and expertise in ICS security testing is still scarce and has to be fostered by involving professionals from the industry, research and education. This can be addressed altogether under an umbrella of Knowledge Management programmes. Quick Win 11: Experts from the industry would be engaged. Quick Win 12: A base of knowledge with testing cases will be created. European Union Agency for Network and Information Security www.enisa.europa.eu 20

Window of exposure a real problem for SCADA systems? The Window of exposure is considered to be the time between the moment a vulnerability is disclosed and the moment a patch is available. From the perspective of an organization the moment a window of exposure is closed, is considered to be the moment all the affected systems have been patched. DISCOVERY DISCLOSURE Patch Available Patch Installed EXPLOIT Window of exposure Window of exposure (organization level) European Union Agency for Network and Information Security www.enisa.europa.eu 21

Status The need of research in the area of Patching and updating equipment without disruption of service and tools (ENISA s 2011 report on Protecting Industrial Control Systems) In 2011, ICS-CERT saw a 60% failure rate in patches fixing the reported vulnerability in control system products. (Kevin Hemsley ICS-CERT) <50% of the 364 public vulnerabilities recorded at ICS-CERT had patches available at that time. (SCADA Security Scientific Symposium (S4) in January 2012, Sean McBride) A draft of ISA-TR62443-2-3: Patch Management in the IACS Environment was released for review. (ISA 99) European Union Agency for Network and Information Security www.enisa.europa.eu 22

Paradigm EU level Different approaches for the patching analysis. Different patching management strategies/methodologies in place. Existing ICS-SCADA patch management programs used. Different issues which affect the ICS-SCADA patching process and at least one way to mitigate them. Legal issues of patching/non-patching an ICS-SCADA system. European Union Agency for Network and Information Security www.enisa.europa.eu 23

ENISA - Expectations Provide the reader with examples and good practices for key technical aspects; Different patching techniques and standards, relationships between them and gaps; The role of virtualization in the patching process, Key elements of an ICS-SCADA patching management methodology; Good practice on developing a patching management methodology for ICS and SCADA systems; The validation of the results will be based on the feedback taken by the experts who participated in the consultation European Union Agency for Network and Information Security www.enisa.europa.eu 24 24

Challenges related to SCADA patching: A. Procedural challenges: Appropriate boundaries for the service agreement Vulnerabilities are rated with the use of the classic IT scoring method CVSS Patch confidentiality Vulnerability discovery B.Technical challanges Transferring and obtaining patches Patch deployment intervals Legacy systems C.Legal challenges : International business - Most SCADA vendors serve a worldwide market Use of open source software (OSS) Vendor warranty Asset management - Asset management is an important part of patch management Procurement and design for patch ability European Union Agency for Network and Information Security www.enisa.europa.eu 25 25

Good practices and recommendations A. Compensating controls : Create awareness and understanding in the organizations as to what failure of the SCADA systems could mean Hardening the SCADA systems, hardening the system means removing unnecessary features Firewalls should be configured in a way that only allows connections between trusted machines to trusted ports. Increase defense in depth through network segmentation. Conducting regular risk and security assessments to reduce potential security risks. Application White Listing (AWL) to compensate for malware code injection and execution B. Establishing a patch management program and service contract: Asset owners should establish a patch management program Asset owners should have a well-designed policy in place so to reduce the effort of patch management and the risk of making mistakes Asset owners should also establish a patch management service contract European Union Agency for Network and Information Security www.enisa.europa.eu 26 26

Good practices and recommendations (cont.) C. Testing patches : Asset owners should always conduct their own tests. The test environment should closely simulate the operational environment Redundant systems could be used to deploy the patch on D. Distributing patches : Locate the patch management within an enclave that already has open Internet access The patch management system is responsible for downloading and testing patches If required, implement two instances of the patch management system Evaluate patches and updates in a test environment in order to asses the risk of deployment Utilize digital signatures on patches or do hash verification where possible/feasible E. Patch scheduling: Patch scheduling and deployment can be done after a patch has been tested thoroughly Depending on the chosen distribution method the approval of production managers is necessary Preferably the deployment is incorporated into regular maintenance schedules, European Union Agency for Network and Information Security www.enisa.europa.eu 27 27

Thank you! Q&A European Union Agency for Network and Information Security www.enisa.europa.eu 28

Thank you for your attention Follow ENISA: European Union Agency for Network and Information Security www.enisa.europa.eu