SlideShare a Scribd company logo
1 of 44
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Embedded systems,
a hidden security threat?
Jaap van Ekris, Delta Pi
J.vanEkris@Delta-Pi.nl
2
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Jaap van Ekris
3
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Agenda
• What are embedded systems?
• What makes them different?
• How can they disturb my business?
• What to do about it?
4
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
In the beginning…
• Mechanical control
• Electromechanical Relays
• PLC Controllers
5
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Drivers for introduction
• More flexible technology
• More complex functionality
• Remote management reduces labour cost
6
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Embedded systems…
• “Traditional” industrial
automation
• Deep integration with
controlled hardware
– Production lines
– Robots
7
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Moving into the cockpit…
• Control by operator
moves to “fly by wire”
• Strong move to
virtualization of all
controls:
– Control rooms
– Airplanes
– Ships
8
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Into the consumer space…
• Point Of Sales and
checkout Systems:
– Cash registers
– ATM’s
– OV Chipkaart
• connected for
additional services
9
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Deep into our lives
• Management systems
to improves safety and
security:
– Offices
– Hospitals
– Tunnels
– Public spaces
• Tightly connected with
energy management
and HR
10
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Definition (sort of)
• Control a physical
object
• Used to control
equipment in a
process
• Usually a PLC or small
barebone
11
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Distinguishing properties
• Part of a 24x7 solution
• Controlling long-lived
expensive equipment
• Difficult to update or
replace
• Large number of
sensors and actuators
12
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Distinguishing properties
• Geographic distribution
• Easily accessible for
hackers
• Proprietary protocols
• Usually not designed
for defense-in-depth
13
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A frequent target
• Protection is
inadequate
• Security is not on the
management agenda
• Hackers do know their
way around
14
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Deeper impact
• Physical damage is
possible
• Physical process
often is fragile
• Locally updating
hardware takes ages
15
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A recent example
• Widely used in US, UK,
France, China and
Canada
• Typical replacement
technology, retrofitted
into existing roads
• Encryption and
authentication
removed upon
customer request
16
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A question of time…
17
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Can we fix this?
• Huge number of traffic
lights
• Replacement takes
days per crossing, with
traffic interruptions
• When will the disease
be worse than the
cure?
18
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
The mindset hasn’t kept up…
• IT is introduced as a
technical replacement,
a silent killer
• Designed with a
mechanical 1960’s
mindset, not a 2010’s
security mindset
19
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Small errors, large consequences…
• Petrobas 36
• Software omission
missed overpressure
event
• Losses
– 11 people died
– Spillage: 1500 ton crude
– Oil Rig: $350 million
– Production loss (84.000 barrels of
oil a day)
20
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Safety systems…
• Most embedded systems
have safety
consequences
• Are required to check
their integrity frequently
• Are not allowed to have
configuration changes
• Exhibit fail-to-safe
behaviour
21
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Politicians have become aware…
• Smart metering rollout
starts in 2015
• There are serious
scenario’s
• “Kill Switch” has to be
removed
22
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Industry should be aware
IEC 61508-1:2010
23
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Traditional measures
• Build a big firewall
• Disregard the human
element:
– a technician brings
along infected
equipment
– Operators using
personal USB sticks or
laptops
24
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
What about the owner?
• Deliver maximum
performance on a
shoestring budget
• Extremely aware of
operational risks
threatening services
• Risk management often
is a core competence
25
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Balancing risk as a way of life
Availability of
the service
Safety of
the installation
vs.
26
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Quantitative risk analysis
• “Unplanned
unavailability” is the
term
• For every intrinsic failure
a chance and impact are
determined
• The biggest availability
killers are dealt with
27
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
RAMS and CIA
• Reliability
• Availability
• Maintainability
• Safety +
--------------------------------
Deaths and Dollars
• Confidentiality
• Availability
• Integrity
+
--------------------------------
Make you look bad?
28
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
RAMS versus Security
RAMS
• Intrinsic failure of a
system
• Calculates missed
business revenue
• Has a SLA with
penalties/bonus
• Is responsibility of a
business manager
Security
• Extrinsic attack on a
system
• Talks about threats
• Has a SLA with best
effort
• Is a problem of the IT
department
29
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Is a security risk a safety risk?
• Security does affect
“Deaths and Dollars”
• Can we express
security in a
quantitative way?
30
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
An example
• National infrastructure
• Effect of long failure is devastating for the national
economy
• Five control-rooms, operated 24x7
• One unsegmented network, allows for redundancy
• Filled with fail-to-safe components based on
Windows® controllers
• Repairmen are very frequent visitors
31
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A scenario
• A repairman or operator introduces virus or worm
by day
• The virus will spread to the entire network easily
within hours
• Overnight 70% of the infrastructure will perform an
emergency shutdown due to a fail-to-safe reaction
• Unaffected (Unix) stations will have to follow due to
physical interactions of emergency shutdowns
32
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A quantitative view
• Chance of occurrence (guestimate)
– Once every 100 years
• Impact (scenario analysis)
– Safe but unavailable
– Life expectancy all equipment shortened by a year
– Recovery
• Recovery of essential backbone: week 6
• Recovery of secondary lines: week 14
• Complete recovery: week 26
• Chance of regression: high
• Estimated loss: €1010 (catastrophic)
33
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Sensitivity analysis
• What are values ranges
and effects?
Example:
– Chance is quite
dominant
– Recovery time is driven
by geographical spread
of repairmen
34
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Segmenting a network
• Prevent or limit the
spread of a worm/virus
• Would concentrate the
recovery effort
• Reduces recovery time
significantly
35
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
A reference Architecture (CIM)
• Levels 0 and 1 are
challenging
• Level 2 is achievable
and wise
• Level 3 would be
foolish not to do
Business
planning
& logistics
(level 4)
Operations &
planning
(level 3)
Process Supervisory
Control (level 2)
Process Control (level 1)
Field (level 0)
36
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
The quantitative impact
• Chance of occurrence (guestimate)
– Once every 1000 years
• Impact (scenario analysis)
– Safe but unavailable
– Life expectancy some equipment shortened by a year
– Recovery
• Recovery of essential backbone: day 3
• Recovery of secondary lines: day 7
• Complete recovery: day 15
• Chance of regression: medium/low
• Estimated loss: €107 (survivable)
37
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Some RAMS-questions…
• Increase of “unplanned unavailability” due to
– False positives on the firewall disrupting the process
– Failure of the hardware
• Increase of maintenance effort
– More updates needed
– Some might even lead to planned maintenance
• Limitation of flexibility in crisis situations
38
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Can we answer quantitative questions?
• IT Hardware reliability is
a “soft number”
• Not many statistical
data about false
positives
• Proprietary protocol
performance is
uncharted territory
39
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Competing in the same field
Fixing security
problems
Fixing operational
problems
VS.
40
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Competing in the same field
• Security usually becomes a High Impact Low
Probabily (HILP) event
• Opens the debate about the impact of security on
company performance: “what risk is the biggest
threat to out performance”
• Does release budget for fixing problems
41
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Work to be done…
• Systematically describing attack vectors in
scenario’s, relating to FTA, is achievable
• Quantifying attack vectors is difficult
• Quantifying positive and negative consequences of
measures is a challenge
42
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Conclusion
• Embedded systems are everywhere
• They are:
– An easy attack vector
– One of our biggest assets
• We have to learn from each other
– As security experts we have to learn talk about lost
dollars and lives
– As embedded system owners we have to see security as
a real threat inside their domain
43
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved
Questions?
© Copyright 1989 – 2014, (ISC)2 All Rights Reserved

More Related Content

What's hot

DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
Marina Krotofil
 
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Living Online
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
Marina Krotofil
 
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Mike Boudreaux
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
Living Online
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
Mowaten Masry
 

What's hot (20)

DefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_LarsenDefCon_2015_Slides_Krotofil_Larsen
DefCon_2015_Slides_Krotofil_Larsen
 
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
If I Were MITRE ATT&CK Developer: Challenges to Consider when Developing ICS ...
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
 
presentation_sas2016_V3
presentation_sas2016_V3presentation_sas2016_V3
presentation_sas2016_V3
 
Safety system
Safety systemSafety system
Safety system
 
S4x16_Europe_Krotofil
S4x16_Europe_KrotofilS4x16_Europe_Krotofil
S4x16_Europe_Krotofil
 
Sil presentation
Sil presentationSil presentation
Sil presentation
 
CS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsevCS3STHLM_2019_krotofil_kopeytsev
CS3STHLM_2019_krotofil_kopeytsev
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
 
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
 
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S..."Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
"Man-in-the-SCADA": Anatomy of Data Integrity Attacks in Industrial Control S...
 
Improving SCADA Security
Improving SCADA SecurityImproving SCADA Security
Improving SCADA Security
 
S4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsicsS4x16 europe krotofil_granular_dataflowsics
S4x16 europe krotofil_granular_dataflowsics
 
American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009American Bar Assoc. ISC 2009
American Bar Assoc. ISC 2009
 
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 6 of 6 - Operation Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
 
Safety Instrumentation
Safety Instrumentation Safety Instrumentation
Safety Instrumentation
 
35958867 safety-instrumented-systems
35958867 safety-instrumented-systems35958867 safety-instrumented-systems
35958867 safety-instrumented-systems
 
Safety and security in distributed systems
Safety and security in distributed systemsSafety and security in distributed systems
Safety and security in distributed systems
 
Key Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation ProjectsKey Considerations for Scoping Reinstrumentation Projects
Key Considerations for Scoping Reinstrumentation Projects
 
Safety and security in mission critical IoT systems
Safety and security in mission critical IoT systemsSafety and security in mission critical IoT systems
Safety and security in mission critical IoT systems
 

Viewers also liked

Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)
AndrewRJamieson
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
team-WIBU
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
Malachi Jones
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
manish katara
 

Viewers also liked (19)

2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
2011-03-12 - PDAtotaal Usergroup meeting - Ervaringen met Windows Phone 7 in ...
 
2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid2016 11-15 - nvrb - software betrouwbaarheid
2016 11-15 - nvrb - software betrouwbaarheid
 
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
2011-04-29 - Risk management conference - Technische IT risico's in de praktijk
 
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...
2016 02-15 -  IASTED Innsbruck 2016 - the role and decompesition of delivery ...2016 02-15 -  IASTED Innsbruck 2016 - the role and decompesition of delivery ...
2016 02-15 - IASTED Innsbruck 2016 - the role and decompesition of delivery ...
 
What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)What the hack happened to digi notar (28-10-2011)
What the hack happened to digi notar (28-10-2011)
 
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
2010-09-21 - (ISC)2 - Protecting patient privacy while enabling medical re…
 
2016-05-30 risk driven design
2016-05-30 risk driven design2016-05-30 risk driven design
2016-05-30 risk driven design
 
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
Windows Phone 7 and the cloud, the good, the bad and the ugly (17-06-2011, SDN)
 
Making and breaking security in embedded devices
Making and breaking security in embedded devicesMaking and breaking security in embedded devices
Making and breaking security in embedded devices
 
Securing embedded systems (for share)
Securing embedded systems (for share)Securing embedded systems (for share)
Securing embedded systems (for share)
 
Embedded based home security system
Embedded based home security systemEmbedded based home security system
Embedded based home security system
 
Enabling embedded security for the Internet of Things
Enabling embedded security for the Internet of ThingsEnabling embedded security for the Internet of Things
Enabling embedded security for the Internet of Things
 
Security in embedded systems
Security in embedded systemsSecurity in embedded systems
Security in embedded systems
 
Embedded Systems Security
Embedded Systems Security Embedded Systems Security
Embedded Systems Security
 
Embedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure DeviceEmbedded Systems Security: Building a More Secure Device
Embedded Systems Security: Building a More Secure Device
 
Security in Embedded systems
Security in Embedded systems Security in Embedded systems
Security in Embedded systems
 
introduction to Embedded System Security
introduction to Embedded System Securityintroduction to Embedded System Security
introduction to Embedded System Security
 
ppt on embedded system
ppt on embedded systemppt on embedded system
ppt on embedded system
 
Polytronics
PolytronicsPolytronics
Polytronics
 

Similar to Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotterdam)

Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
Nikandrov Maxim
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapalibuildersreviews
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
Shah Sheikh
 

Similar to Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotterdam) (20)

Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...
 
Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)Cyber Security in Substation Automation (IEC 61850)
Cyber Security in Substation Automation (IEC 61850)
 
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim[CLASS2014] Palestra Técnica - Franzvitor Fiorim
[CLASS2014] Palestra Técnica - Franzvitor Fiorim
 
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
Foxboro Evo DCS - Εκδήλωση Explore Innovation - Αθήνα, Ιούνιος 2016
 
Intro720T5.pptx
Intro720T5.pptxIntro720T5.pptx
Intro720T5.pptx
 
[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares[CLASS 2014] Palestra Técnica - Samuel Linares
[CLASS 2014] Palestra Técnica - Samuel Linares
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx18CS44-MODULE3-PPT.pptx
18CS44-MODULE3-PPT.pptx
 
ICS case studies v2
ICS case studies v2ICS case studies v2
ICS case studies v2
 
amrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdfamrapali builders -- maroochy water-services-case-study briefing.pdf
amrapali builders -- maroochy water-services-case-study briefing.pdf
 
MIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets SecurityMIT Bitcoin Expo 2018 - Hardware Wallets Security
MIT Bitcoin Expo 2018 - Hardware Wallets Security
 
LCD PROJECT.pptx
LCD PROJECT.pptxLCD PROJECT.pptx
LCD PROJECT.pptx
 
DDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT DevicesDDoS Attack on DNS using infected IoT Devices
DDoS Attack on DNS using infected IoT Devices
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation2012 02 14 Afcom Presentation
2012 02 14 Afcom Presentation
 
Project_updated
Project_updatedProject_updated
Project_updated
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Break trough effectivness for the maintenance
Break trough effectivness for the maintenanceBreak trough effectivness for the maintenance
Break trough effectivness for the maintenance
 
Ensuring your plant is secure
Ensuring your plant is secureEnsuring your plant is secure
Ensuring your plant is secure
 

More from Jaap van Ekris

More from Jaap van Ekris (17)

2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
2021 08-28, QONFEST 2021 - Reliability cenetered maintenance for sleeping giants
 
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
2020 09-08 - sdn - waarom klanten een hekel aan software ontwikkelaars hebben
 
2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival2018-11-08 risk and reslience festival
2018-11-08 risk and reslience festival
 
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties2015 10-08 Uitwijken, het hoe, waarom en de consequenties
2015 10-08 Uitwijken, het hoe, waarom en de consequenties
 
TOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleidingTOPAAS Versie 2.0, een praktische inleiding
TOPAAS Versie 2.0, een praktische inleiding
 
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
Testing safety critical systems: Practice and Theory (14-05-2013, VU Amsterdam)
 
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
Cloud Security (11-09-2012, (ISC)2 Secure Amsterdam)
 
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 72010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
2010-04-17 - PDAtotaal Usergroup meeting - Introductie in Windows Phone 7
 
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
2010-03-31 - VU Amsterdam - Experiences testing safety critical systems
 
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
2009-07-09 - DNV - Risico en betrouwbaarheid van ICT systemen
 
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
2009-02-18 - IASTED Innsbruck 2009 - Factors in project management influencin...
 
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2009-02-12 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
 
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
2008-10-09 - Bits and Chips Conference - Embedded Systemen Architecture patterns
 
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
2008-07-15 - (ISC)2 - Mobile Phone Security, you have to let go in order t…
 
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
2008-06-23 - SDN - Kwaliteit van software, wat is dat nu eigenlijk?
 
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
2008-02-14 - IASTED Innsbruck 2008 - Customer Retention and Delivery Quality ...
 
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
2008-02-07 - VU Amsterdam - Customer Satisfaction and dealing with customers ...
 

Recently uploaded

Recently uploaded (20)

2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 

Embedded Systems, Asset or Security Threat? (6 May 2014, (ICS)2 Secure Rotterdam)

  • 1. © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Embedded systems, a hidden security threat? Jaap van Ekris, Delta Pi J.vanEkris@Delta-Pi.nl
  • 2. 2 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Jaap van Ekris
  • 3. 3 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Agenda • What are embedded systems? • What makes them different? • How can they disturb my business? • What to do about it?
  • 4. 4 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved In the beginning… • Mechanical control • Electromechanical Relays • PLC Controllers
  • 5. 5 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Drivers for introduction • More flexible technology • More complex functionality • Remote management reduces labour cost
  • 6. 6 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Embedded systems… • “Traditional” industrial automation • Deep integration with controlled hardware – Production lines – Robots
  • 7. 7 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Moving into the cockpit… • Control by operator moves to “fly by wire” • Strong move to virtualization of all controls: – Control rooms – Airplanes – Ships
  • 8. 8 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Into the consumer space… • Point Of Sales and checkout Systems: – Cash registers – ATM’s – OV Chipkaart • connected for additional services
  • 9. 9 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Deep into our lives • Management systems to improves safety and security: – Offices – Hospitals – Tunnels – Public spaces • Tightly connected with energy management and HR
  • 10. 10 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Definition (sort of) • Control a physical object • Used to control equipment in a process • Usually a PLC or small barebone
  • 11. 11 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Distinguishing properties • Part of a 24x7 solution • Controlling long-lived expensive equipment • Difficult to update or replace • Large number of sensors and actuators
  • 12. 12 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Distinguishing properties • Geographic distribution • Easily accessible for hackers • Proprietary protocols • Usually not designed for defense-in-depth
  • 13. 13 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A frequent target • Protection is inadequate • Security is not on the management agenda • Hackers do know their way around
  • 14. 14 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Deeper impact • Physical damage is possible • Physical process often is fragile • Locally updating hardware takes ages
  • 15. 15 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A recent example • Widely used in US, UK, France, China and Canada • Typical replacement technology, retrofitted into existing roads • Encryption and authentication removed upon customer request
  • 16. 16 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A question of time…
  • 17. 17 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Can we fix this? • Huge number of traffic lights • Replacement takes days per crossing, with traffic interruptions • When will the disease be worse than the cure?
  • 18. 18 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved The mindset hasn’t kept up… • IT is introduced as a technical replacement, a silent killer • Designed with a mechanical 1960’s mindset, not a 2010’s security mindset
  • 19. 19 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Small errors, large consequences… • Petrobas 36 • Software omission missed overpressure event • Losses – 11 people died – Spillage: 1500 ton crude – Oil Rig: $350 million – Production loss (84.000 barrels of oil a day)
  • 20. 20 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Safety systems… • Most embedded systems have safety consequences • Are required to check their integrity frequently • Are not allowed to have configuration changes • Exhibit fail-to-safe behaviour
  • 21. 21 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Politicians have become aware… • Smart metering rollout starts in 2015 • There are serious scenario’s • “Kill Switch” has to be removed
  • 22. 22 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Industry should be aware IEC 61508-1:2010
  • 23. 23 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Traditional measures • Build a big firewall • Disregard the human element: – a technician brings along infected equipment – Operators using personal USB sticks or laptops
  • 24. 24 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved What about the owner? • Deliver maximum performance on a shoestring budget • Extremely aware of operational risks threatening services • Risk management often is a core competence
  • 25. 25 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Balancing risk as a way of life Availability of the service Safety of the installation vs.
  • 26. 26 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Quantitative risk analysis • “Unplanned unavailability” is the term • For every intrinsic failure a chance and impact are determined • The biggest availability killers are dealt with
  • 27. 27 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved RAMS and CIA • Reliability • Availability • Maintainability • Safety + -------------------------------- Deaths and Dollars • Confidentiality • Availability • Integrity + -------------------------------- Make you look bad?
  • 28. 28 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved RAMS versus Security RAMS • Intrinsic failure of a system • Calculates missed business revenue • Has a SLA with penalties/bonus • Is responsibility of a business manager Security • Extrinsic attack on a system • Talks about threats • Has a SLA with best effort • Is a problem of the IT department
  • 29. 29 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Is a security risk a safety risk? • Security does affect “Deaths and Dollars” • Can we express security in a quantitative way?
  • 30. 30 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved An example • National infrastructure • Effect of long failure is devastating for the national economy • Five control-rooms, operated 24x7 • One unsegmented network, allows for redundancy • Filled with fail-to-safe components based on Windows® controllers • Repairmen are very frequent visitors
  • 31. 31 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A scenario • A repairman or operator introduces virus or worm by day • The virus will spread to the entire network easily within hours • Overnight 70% of the infrastructure will perform an emergency shutdown due to a fail-to-safe reaction • Unaffected (Unix) stations will have to follow due to physical interactions of emergency shutdowns
  • 32. 32 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A quantitative view • Chance of occurrence (guestimate) – Once every 100 years • Impact (scenario analysis) – Safe but unavailable – Life expectancy all equipment shortened by a year – Recovery • Recovery of essential backbone: week 6 • Recovery of secondary lines: week 14 • Complete recovery: week 26 • Chance of regression: high • Estimated loss: €1010 (catastrophic)
  • 33. 33 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Sensitivity analysis • What are values ranges and effects? Example: – Chance is quite dominant – Recovery time is driven by geographical spread of repairmen
  • 34. 34 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Segmenting a network • Prevent or limit the spread of a worm/virus • Would concentrate the recovery effort • Reduces recovery time significantly
  • 35. 35 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved A reference Architecture (CIM) • Levels 0 and 1 are challenging • Level 2 is achievable and wise • Level 3 would be foolish not to do Business planning & logistics (level 4) Operations & planning (level 3) Process Supervisory Control (level 2) Process Control (level 1) Field (level 0)
  • 36. 36 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved The quantitative impact • Chance of occurrence (guestimate) – Once every 1000 years • Impact (scenario analysis) – Safe but unavailable – Life expectancy some equipment shortened by a year – Recovery • Recovery of essential backbone: day 3 • Recovery of secondary lines: day 7 • Complete recovery: day 15 • Chance of regression: medium/low • Estimated loss: €107 (survivable)
  • 37. 37 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Some RAMS-questions… • Increase of “unplanned unavailability” due to – False positives on the firewall disrupting the process – Failure of the hardware • Increase of maintenance effort – More updates needed – Some might even lead to planned maintenance • Limitation of flexibility in crisis situations
  • 38. 38 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Can we answer quantitative questions? • IT Hardware reliability is a “soft number” • Not many statistical data about false positives • Proprietary protocol performance is uncharted territory
  • 39. 39 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Competing in the same field Fixing security problems Fixing operational problems VS.
  • 40. 40 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Competing in the same field • Security usually becomes a High Impact Low Probabily (HILP) event • Opens the debate about the impact of security on company performance: “what risk is the biggest threat to out performance” • Does release budget for fixing problems
  • 41. 41 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Work to be done… • Systematically describing attack vectors in scenario’s, relating to FTA, is achievable • Quantifying attack vectors is difficult • Quantifying positive and negative consequences of measures is a challenge
  • 42. 42 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Conclusion • Embedded systems are everywhere • They are: – An easy attack vector – One of our biggest assets • We have to learn from each other – As security experts we have to learn talk about lost dollars and lives – As embedded system owners we have to see security as a real threat inside their domain
  • 43. 43 © Copyright 1989 – 2014, (ISC)2 All Rights Reserved Questions?
  • 44. © Copyright 1989 – 2014, (ISC)2 All Rights Reserved

Editor's Notes

  1. InfoPlus sign shown is part of GSM-R, the same network used for controlling trains
  2. Major challenge is “frequent checking”: what if all my systems are infected and then fail to safe?
  3. Once had a customer where 70% of all support calls were people using private laptops during nightshifts and couldn’t get the internet to work!
  4. Odd thing is: they talk about the same effects! Losing the power to do business!