SlideShare una empresa de Scribd logo
1 de 16
Descargar para leer sin conexión
SECURING - INDUSTRIAL
CONTROL SYSTEMS
HOW SECURING INDUSTRIAL CONTROL SYSTEMS ARE DIFFERENT
FROM NORMAL IT SYSTEMS.
INDUSTRIAL CONTROL SYSTEMS AND SCADA
• Industrial Control Systems (ICSs) and Supervisory Control & Data Accusation
(SCADA) Systems are the backbone of any major infrastructures of every city
in the world. Protecting these systems and preventing security breaches has
become a priority for all governments.
• A simple breach can shut down a power grids, disturb traffic control system,
cause major aviation disasters and contaminate the water supply.
• Industrial Control Systems (ICSs) were originally built as stand-alone systems
that were not interconnected and had little in the way of security protections.
The internet and ubiquitous internet protocol networks have changed the
design of many ICS such that the control network is now often a protected
extension of the corporate network. This means that these delicate ICSs are
potentially reachable from the Internet by malicious and skilled adversaries.
DIFFERENCES BETWEEN IT AND OT SYSTEMS
ATTRIBUTE IT SYSTEMS OT SYSTEMS
MESSAGE INTEGRITY LOW-MEDIUM VERY HIGH
SYSTEM AVAILABILITY LOW-MEDIUM VERY HIGH
TIME CRITICALITY DAYS TOLERATED CRITICAL
SYSTEM DOWNTIME TOLERATED NOT ACCEPTABLE
SYSTEM LIFE CYCLE 3-5 YEARS 15-25 YEARS
INTEROPERABILITY NOT CRITICAL CRITICAL
COMPUTING RESOURCES "ALMOST UNLIMITED" VERY LIMITED ESPECIALLY WITH
LEGACY SYSTEMS
SOFTWARE CHANGES FREQUENT RARE
WORST CASE IMPACTS LOSS OF DATA EQUIPMENT DESTRUCTION /
INJURIES / LOSS OF LIFE
NEED FOR CONVERGENCE ?
Traditionally OT systems were passively
secured by AIR GAP, that is OT systems
were not connected like IT systems
thereby reducing the exposure to risk. OT
systems were protected majorly by
physical security.
However Industrial Revolution 4.0 is
changing this, now there is a strong need
to connect OT with IT for better productivity
and increasing efficiency of overall system.
Businesses always trade convenience to
security/privacy.
This convergence of OT with IT has
leveled the attack surface and OT systems
are more vulnerable due to the difference
of context, especially in System Life Cycle
and Worst Case Impacts.
CONVERGENCE TIMELINE AND REACTION SPEED
HOW AN ATTACK PROCEEDS
ICS SECURITY CHALLENGES
• SCADA systems and PLC software are developed by engineering companies with very
limited experience of securing system development and are developed under guidance
of domain experts who may have not had any training on security techniques.
• Lack of processing power in legacy systems makes it challenging to install anti-virus
protection.
• Security testing on ICS systems must be approached with caution as it can seriously
affect the operation of many control devices.
• Not only the process runs on legacy systems but the standard fieldbus protocols like
modbus lack basic encryption and authentication.
• Longer life cycle gives enough time for an hacker to plan and design an intrude.
• Fewer opportunities to take the system offline for routine testing, patching and
maintenance.
PURDUE MODEL – TYPICAL ICS ARCHITECTURE
The Purdue model divides this
ICS architecture into three zones
and six levels.
Level 5: Enterprise network
Level 4: Site business and
logistics
Industrial Demilitarized zone.
Manufacturing zone (also called
the Industrial zone):
Level 3: Site operations
Level 2: Area supervisory control
Level 1: Basic control
Level 0: The process
PURDUE MODEL
• In between the enterprise zone and systems and the Industrial zone lies the
Industrial Demilitarized Zone or IDMZ. Much like a traditional (IT) DMZ, the OT-oriented
IDMZ allows you to securely connect networks with different security requirements.
• The IDMZ is the result of the efforts taken to create security standards such as the NIST
Cybersecurity Framework and NERC CIP. The IDMZ is an information sharing layer between the
business or IT systems in levels 4 and 5 and the production or OT systems in levels 3 and lower.
• By preventing direct communication between IT and OT systems and having a broker service in
the IDMZ relay the communications, an extra layer of separation and inspection is added to the
overall architecture. Systems in the lower layers are not directly exposed to attacks or
compromise. If something were to compromise a system at some point in the IDMZ, the IDMZ
could be shut down, the compromise could be contained, and production could continue.
• Trust Zones :
Enterprise Zone: Low trust ,Industrial DMZ: Medium trust, Industrial Zone: High trust,
Subzones of the Industrial Zone : High trust.
ICS RISK ASSESSMENT PROCESS
Process IT systems OT system
Asset identification and system
characterization
Discovery of assets is often
accomplished with scanning tools,
running ping sweeps and ARP scans
ICS networks are often more sensitive to
active scanning techniques will result in
performance degradation and if any
single one of those devices fails, the
entire process fails. Active scanning is
done when systems are out of production
or passive scanning techniques are used.
Vulnerability identification and
threat modeling
By Scanning using industry standard
tools.
By comparison. The comparison method
takes all the running software, firmware,
and OS versions and compares them to
online vulnerability databases, searching
for known vulnerabilities. Ex. ICS – CERT
vulnerability database.
Risk calculation and mitigation Quantify the risk by assigning a risk
score to every risk scenario
Quantify the risk by assigning a risk
score to every risk scenario
ICS SECURITY RESTRICTIONS
Segment Restrictions
Device related restrictions Resource restrained ICS control and automation devices prevents the manufacturer
from implementing power hungry and resource demanding security controls like
authentication or encryption. Extremely long life span makes them more fragile.
Network related restrictions Many ICS run critical functions, where continuous, real-time communications and
connection to process values is a must. The latency or delay network firewall and
NIDS introduce can be enough to bring a process down.
Safety related restrictions 18-character randomly generated password or password lockout systems can
prevent an operator from logging in to a system to make changes or interact,
resulting in an unsafe situation like loss of life or process meltdown.
Runtime and
uptime requirements
Many ICS run processes and production systems with extremely high uptime
requirements. There is simply no time to do any maintenance, patching, or security
related activities on systems with these kinds of uptime requirements. Compounding
the matter is the fact that many ICS have strict integrity requirements. The slightest
change in the ICS setup or configuration will trigger a mandatory revalidation
process for the entire ICS.
DEFENDING AN ICS ?
Strategy Explanation
Security by obscurity  The idea is that by hiding or obscuring the ICS network, an attacker will not be able to
find the network, and one cannot attack what one cannot find. To a degree, this strategy
actually worked when the ICS protocols and communication media were proprietary and
restrive or limited in what they could achieve
Perimeter defense With perimeter defense, a security appliance such as a firewall is placed at the edge or
perimeter of a network to inspect and filter all ingress and sometimes egress traffic.
What this model doesn’t take into consideration is the state of the systems inside the
network that is being protected. If systems that are already compromised are introduced
in that network (think infected laptops), a perimeter defense strategy is useless.
By nature ICS are very defensible Because ICS systems tend to be stagnant in configuration it is easier to detect
anomalies. For example, it is relatively easy to establish a standard traffic pattern on a controls network and start
looking for deviations from normal. Also, because ICS don't change very often, the environment they are in is easier
to secure. An example to that point is that a PLC can be placed in a locked cabinet with it's program locked into
run mode, because once a PLC is running changes are hardly ever necessary. If changes are needed, a change
control program should secure the proper management of those changes.
SECURING ICS - DEFENSE-IN-DEPTH MODEL
Area zone/Cell Actions that can be taken during Design phase of an ICS
Physical Security Limit physical access for authorized personnel to cell/area zones, control
panels, devices, cabling, and control rooms, through the use of
locks, gates, key cards, and biometrics
Network Security Security framework for example, firewall policies, ACL policies for switches
and routers, AAA, intrusion detection systems. Network segmentation and
establishing Zones and Conduits. Note: It is not advisable for IPS as it
hinders availability, which is the key factor of any ICS.
Computer Security Patch management, anti-malware software, removal of unused
applications/protocols/services, closing unnecessary logical ports, and
protecting physical ports.
Application Security Authentication, authorization and accounting (AAA) as well as
vulnerability management, patch management and secure development
life cycle management.
Device Security Device hardening, communication encryption and restrictive access as
well as patch management, device life cycle management, and
configuration and change management.
Policies,
procedures, and
awareness
Finally, gluing all the security controls together are policies, procedures,
and awareness. Policies are a high-level guideline on what the expected
security stance is for ICS systems and devices.
Awareness (training) helps get and keep attention on security-related
aspects of the ICS and its operation
SECURING ICS - SAFETY INSTRUMENTED SYSTEMS
Safety instrumented systems, or SIS,
are dedicated safety monitoring
systems. They are there to safely and
gracefully shut down the monitored
system or bring that system to a
predefined safe state in case of a
hardware malfunction. An SIS uses a
set of voting systems to determine
whether a system is performing
normally.
SECURING ICS - DATA DIODE
IEC 62443 (ISA99) zoning requires creating boundaries between IT and
OT systems requiring a range of measures covering differing information
exchange requirements between domains.
Next generation data diode offers guarded one-way feeds across zones
THANK YOU!!!
HEMANTH KUMAR MAHADEVA
Hemanth.itsme@gmail.com
+91 7899788088

Más contenido relacionado

La actualidad más candente

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityPECB
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloudsagaroceanic11
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Richard Hudson
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
 
Guide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityGuide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityericv83
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT SecurityCAS
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themRadouane Mrabet
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine TechnologySamip jain
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITYThe Avi Sharma
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoTVishnupriya T H
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case studyAntonio Fontes
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPTUpender Upr
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT securityPriyab Satoshi
 

La actualidad más candente (20)

The difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information SecurityThe difference between Cybersecurity and Information Security
The difference between Cybersecurity and Information Security
 
Evolution of the cloud
Evolution of the cloudEvolution of the cloud
Evolution of the cloud
 
Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1Introduction to Operational Technology 0.1
Introduction to Operational Technology 0.1
 
Iot(security)
Iot(security)Iot(security)
Iot(security)
 
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...
 
Guide to industrial control systems (ics) security
Guide to industrial control systems (ics) securityGuide to industrial control systems (ics) security
Guide to industrial control systems (ics) security
 
Introduction to IoT Security
Introduction to IoT SecurityIntroduction to IoT Security
Introduction to IoT Security
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
IoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address themIoT security and privacy: main challenges and how ISOC-OTA address them
IoT security and privacy: main challenges and how ISOC-OTA address them
 
M2M - Machine to Machine Technology
M2M - Machine to Machine TechnologyM2M - Machine to Machine Technology
M2M - Machine to Machine Technology
 
Presentation on IOT SECURITY
Presentation on IOT SECURITYPresentation on IOT SECURITY
Presentation on IOT SECURITY
 
Security challenges in IoT
Security challenges in IoTSecurity challenges in IoT
Security challenges in IoT
 
Threat modeling web application: a case study
Threat modeling web application: a case studyThreat modeling web application: a case study
Threat modeling web application: a case study
 
Big Data & The Cloud
Big Data & The CloudBig Data & The Cloud
Big Data & The Cloud
 
The Future of Cloud Computing in 2021
The Future of Cloud Computing in 2021The Future of Cloud Computing in 2021
The Future of Cloud Computing in 2021
 
Grid computing Seminar PPT
Grid computing Seminar PPTGrid computing Seminar PPT
Grid computing Seminar PPT
 
Introduction to IOT security
Introduction to IOT securityIntroduction to IOT security
Introduction to IOT security
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
Architectural reference model
Architectural reference modelArchitectural reference model
Architectural reference model
 
Introduction to ICS/SCADA security
Introduction to ICS/SCADA securityIntroduction to ICS/SCADA security
Introduction to ICS/SCADA security
 

Similar a Securing Industrial Control System

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetIvan Carmona
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTRAJESHWARI M
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksGeorge Wainblat
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)Ivan Carmona
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution briefNozomi Networks
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesNir Cohen
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327vimal Kumar Gupta
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects inVishnu Suresh
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfPrabaKaran649935
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture Symantec
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_finalCMR WORLD TECH
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceAustin Eppstein
 

Similar a Securing Industrial Control System (20)

Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoTIII SEM MCA-Module 4 -Ch2.pdf- Securing IoT
III SEM MCA-Module 4 -Ch2.pdf- Securing IoT
 
Cybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA NetworksCybridge Secure Content Filter for SCADA Networks
Cybridge Secure Content Filter for SCADA Networks
 
White paper scada (2)
White paper scada (2)White paper scada (2)
White paper scada (2)
 
Industrial networks safety & security - e+h june 2018 ben murphy
Industrial networks safety & security - e+h june 2018   ben murphyIndustrial networks safety & security - e+h june 2018   ben murphy
Industrial networks safety & security - e+h june 2018 ben murphy
 
Nozomi networks-solution brief
Nozomi networks-solution briefNozomi networks-solution brief
Nozomi networks-solution brief
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Robust Cyber Security for Power Utilities
Robust Cyber Security for Power UtilitiesRobust Cyber Security for Power Utilities
Robust Cyber Security for Power Utilities
 
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
6. Cybersecurity for Industrial Ethernet - Dr Paul Comerford
 
10. industrial networks safety and security tom hammond
10. industrial networks safety and security   tom hammond10. industrial networks safety and security   tom hammond
10. industrial networks safety and security tom hammond
 
Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327Secure architecture-industrial-control-systems-36327
Secure architecture-industrial-control-systems-36327
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
Computer security aspects in
Computer security aspects inComputer security aspects in
Computer security aspects in
 
introduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdfintroduction to #OT cybersecurity for O&M teams.pdf
introduction to #OT cybersecurity for O&M teams.pdf
 
Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices Augmentation of a SCADA based firewall against foreign hacking devices
Augmentation of a SCADA based firewall against foreign hacking devices
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Unit_3.pptx
Unit_3.pptxUnit_3.pptx
Unit_3.pptx
 
An Internet of Things Reference Architecture
An Internet of Things Reference Architecture An Internet of Things Reference Architecture
An Internet of Things Reference Architecture
 
Darktrace white paper_ics_final
Darktrace white paper_ics_finalDarktrace white paper_ics_final
Darktrace white paper_ics_final
 
ICS_WhitePaper_Darktrace
ICS_WhitePaper_DarktraceICS_WhitePaper_Darktrace
ICS_WhitePaper_Darktrace
 

Último

Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goasexy call girls service in goa
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceDelhi Call girls
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445ruhi
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersDamian Radcliffe
 

Último (20)

Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In South Ex 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In South Ex 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goahorny (9316020077 ) Goa  Call Girls Service by VIP Call Girls in Goa
horny (9316020077 ) Goa Call Girls Service by VIP Call Girls in Goa
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort ServiceEnjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
Enjoy Night⚡Call Girls Dlf City Phase 3 Gurgaon >༒8448380779 Escort Service
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
All Time Service Available Call Girls Mg Road 👌 ⏭️ 6378878445
 
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providersMoving Beyond Twitter/X and Facebook - Social Media for local news providers
Moving Beyond Twitter/X and Facebook - Social Media for local news providers
 

Securing Industrial Control System

  • 1. SECURING - INDUSTRIAL CONTROL SYSTEMS HOW SECURING INDUSTRIAL CONTROL SYSTEMS ARE DIFFERENT FROM NORMAL IT SYSTEMS.
  • 2. INDUSTRIAL CONTROL SYSTEMS AND SCADA • Industrial Control Systems (ICSs) and Supervisory Control & Data Accusation (SCADA) Systems are the backbone of any major infrastructures of every city in the world. Protecting these systems and preventing security breaches has become a priority for all governments. • A simple breach can shut down a power grids, disturb traffic control system, cause major aviation disasters and contaminate the water supply. • Industrial Control Systems (ICSs) were originally built as stand-alone systems that were not interconnected and had little in the way of security protections. The internet and ubiquitous internet protocol networks have changed the design of many ICS such that the control network is now often a protected extension of the corporate network. This means that these delicate ICSs are potentially reachable from the Internet by malicious and skilled adversaries.
  • 3. DIFFERENCES BETWEEN IT AND OT SYSTEMS ATTRIBUTE IT SYSTEMS OT SYSTEMS MESSAGE INTEGRITY LOW-MEDIUM VERY HIGH SYSTEM AVAILABILITY LOW-MEDIUM VERY HIGH TIME CRITICALITY DAYS TOLERATED CRITICAL SYSTEM DOWNTIME TOLERATED NOT ACCEPTABLE SYSTEM LIFE CYCLE 3-5 YEARS 15-25 YEARS INTEROPERABILITY NOT CRITICAL CRITICAL COMPUTING RESOURCES "ALMOST UNLIMITED" VERY LIMITED ESPECIALLY WITH LEGACY SYSTEMS SOFTWARE CHANGES FREQUENT RARE WORST CASE IMPACTS LOSS OF DATA EQUIPMENT DESTRUCTION / INJURIES / LOSS OF LIFE
  • 4. NEED FOR CONVERGENCE ? Traditionally OT systems were passively secured by AIR GAP, that is OT systems were not connected like IT systems thereby reducing the exposure to risk. OT systems were protected majorly by physical security. However Industrial Revolution 4.0 is changing this, now there is a strong need to connect OT with IT for better productivity and increasing efficiency of overall system. Businesses always trade convenience to security/privacy. This convergence of OT with IT has leveled the attack surface and OT systems are more vulnerable due to the difference of context, especially in System Life Cycle and Worst Case Impacts.
  • 5. CONVERGENCE TIMELINE AND REACTION SPEED
  • 6. HOW AN ATTACK PROCEEDS
  • 7. ICS SECURITY CHALLENGES • SCADA systems and PLC software are developed by engineering companies with very limited experience of securing system development and are developed under guidance of domain experts who may have not had any training on security techniques. • Lack of processing power in legacy systems makes it challenging to install anti-virus protection. • Security testing on ICS systems must be approached with caution as it can seriously affect the operation of many control devices. • Not only the process runs on legacy systems but the standard fieldbus protocols like modbus lack basic encryption and authentication. • Longer life cycle gives enough time for an hacker to plan and design an intrude. • Fewer opportunities to take the system offline for routine testing, patching and maintenance.
  • 8. PURDUE MODEL – TYPICAL ICS ARCHITECTURE The Purdue model divides this ICS architecture into three zones and six levels. Level 5: Enterprise network Level 4: Site business and logistics Industrial Demilitarized zone. Manufacturing zone (also called the Industrial zone): Level 3: Site operations Level 2: Area supervisory control Level 1: Basic control Level 0: The process
  • 9. PURDUE MODEL • In between the enterprise zone and systems and the Industrial zone lies the Industrial Demilitarized Zone or IDMZ. Much like a traditional (IT) DMZ, the OT-oriented IDMZ allows you to securely connect networks with different security requirements. • The IDMZ is the result of the efforts taken to create security standards such as the NIST Cybersecurity Framework and NERC CIP. The IDMZ is an information sharing layer between the business or IT systems in levels 4 and 5 and the production or OT systems in levels 3 and lower. • By preventing direct communication between IT and OT systems and having a broker service in the IDMZ relay the communications, an extra layer of separation and inspection is added to the overall architecture. Systems in the lower layers are not directly exposed to attacks or compromise. If something were to compromise a system at some point in the IDMZ, the IDMZ could be shut down, the compromise could be contained, and production could continue. • Trust Zones : Enterprise Zone: Low trust ,Industrial DMZ: Medium trust, Industrial Zone: High trust, Subzones of the Industrial Zone : High trust.
  • 10. ICS RISK ASSESSMENT PROCESS Process IT systems OT system Asset identification and system characterization Discovery of assets is often accomplished with scanning tools, running ping sweeps and ARP scans ICS networks are often more sensitive to active scanning techniques will result in performance degradation and if any single one of those devices fails, the entire process fails. Active scanning is done when systems are out of production or passive scanning techniques are used. Vulnerability identification and threat modeling By Scanning using industry standard tools. By comparison. The comparison method takes all the running software, firmware, and OS versions and compares them to online vulnerability databases, searching for known vulnerabilities. Ex. ICS – CERT vulnerability database. Risk calculation and mitigation Quantify the risk by assigning a risk score to every risk scenario Quantify the risk by assigning a risk score to every risk scenario
  • 11. ICS SECURITY RESTRICTIONS Segment Restrictions Device related restrictions Resource restrained ICS control and automation devices prevents the manufacturer from implementing power hungry and resource demanding security controls like authentication or encryption. Extremely long life span makes them more fragile. Network related restrictions Many ICS run critical functions, where continuous, real-time communications and connection to process values is a must. The latency or delay network firewall and NIDS introduce can be enough to bring a process down. Safety related restrictions 18-character randomly generated password or password lockout systems can prevent an operator from logging in to a system to make changes or interact, resulting in an unsafe situation like loss of life or process meltdown. Runtime and uptime requirements Many ICS run processes and production systems with extremely high uptime requirements. There is simply no time to do any maintenance, patching, or security related activities on systems with these kinds of uptime requirements. Compounding the matter is the fact that many ICS have strict integrity requirements. The slightest change in the ICS setup or configuration will trigger a mandatory revalidation process for the entire ICS.
  • 12. DEFENDING AN ICS ? Strategy Explanation Security by obscurity  The idea is that by hiding or obscuring the ICS network, an attacker will not be able to find the network, and one cannot attack what one cannot find. To a degree, this strategy actually worked when the ICS protocols and communication media were proprietary and restrive or limited in what they could achieve Perimeter defense With perimeter defense, a security appliance such as a firewall is placed at the edge or perimeter of a network to inspect and filter all ingress and sometimes egress traffic. What this model doesn’t take into consideration is the state of the systems inside the network that is being protected. If systems that are already compromised are introduced in that network (think infected laptops), a perimeter defense strategy is useless. By nature ICS are very defensible Because ICS systems tend to be stagnant in configuration it is easier to detect anomalies. For example, it is relatively easy to establish a standard traffic pattern on a controls network and start looking for deviations from normal. Also, because ICS don't change very often, the environment they are in is easier to secure. An example to that point is that a PLC can be placed in a locked cabinet with it's program locked into run mode, because once a PLC is running changes are hardly ever necessary. If changes are needed, a change control program should secure the proper management of those changes.
  • 13. SECURING ICS - DEFENSE-IN-DEPTH MODEL Area zone/Cell Actions that can be taken during Design phase of an ICS Physical Security Limit physical access for authorized personnel to cell/area zones, control panels, devices, cabling, and control rooms, through the use of locks, gates, key cards, and biometrics Network Security Security framework for example, firewall policies, ACL policies for switches and routers, AAA, intrusion detection systems. Network segmentation and establishing Zones and Conduits. Note: It is not advisable for IPS as it hinders availability, which is the key factor of any ICS. Computer Security Patch management, anti-malware software, removal of unused applications/protocols/services, closing unnecessary logical ports, and protecting physical ports. Application Security Authentication, authorization and accounting (AAA) as well as vulnerability management, patch management and secure development life cycle management. Device Security Device hardening, communication encryption and restrictive access as well as patch management, device life cycle management, and configuration and change management. Policies, procedures, and awareness Finally, gluing all the security controls together are policies, procedures, and awareness. Policies are a high-level guideline on what the expected security stance is for ICS systems and devices. Awareness (training) helps get and keep attention on security-related aspects of the ICS and its operation
  • 14. SECURING ICS - SAFETY INSTRUMENTED SYSTEMS Safety instrumented systems, or SIS, are dedicated safety monitoring systems. They are there to safely and gracefully shut down the monitored system or bring that system to a predefined safe state in case of a hardware malfunction. An SIS uses a set of voting systems to determine whether a system is performing normally.
  • 15. SECURING ICS - DATA DIODE IEC 62443 (ISA99) zoning requires creating boundaries between IT and OT systems requiring a range of measures covering differing information exchange requirements between domains. Next generation data diode offers guarded one-way feeds across zones
  • 16. THANK YOU!!! HEMANTH KUMAR MAHADEVA Hemanth.itsme@gmail.com +91 7899788088