SlideShare una empresa de Scribd logo
1 de 44
Descargar para leer sin conexión
Improving Control System Security



     by Chaiyakorn Apiwathanokul
          CISSP, GCFA, IRCA:ISMS
           Chief Security Officer
         PTT ICT Solutions Co., Ltd.
           A Company of PTT Group

                  July 2010
About Speaker
                   Name:           Chaiyakorn Apiwathanokul
                                   ไชยกร อภิวัฒโนกุล
                   Title:          Chief Security Officer (CSO)
                   Company:        PTT ICT Solutions Company Limited
                                   A Company of PTT Group
                   Certificates:   ISC2:CISSP, IRCA:ISMS (ISO27001), SANS:GCFA




• Contribute to Thailand Cyber Crime Act B.E.2550
• Security Sub-commission under Thailand Electronic Transaction Commission
  (ET Act B.E. 2544)
• Workgroup for CA service standard development
• Committee of national standard adoption of ISO27001/ISO27002
• Committee of Thailand Information Security Association (TISA)
• Committee of Cybersecurity taskforce development, Division of Skill
  Development, Ministry of Labour
Sub Topic:
   Examining current security trends and their
    impact for SCADA systems
   Increasing the security and usability of SCADA
    systems
   Understanding tools and techniques to
    mitigate SCADA security risk
See Videos

1. DHS experiment on hacking to destroy a
   generator
2. US Power Grid under attack - Clarke
Malicious code/
                   Virus/Worm
                                     Adversary/
Terrorist/                           Disgruntled
 Hacker                               employee


                 Vulnerabilities/
                  Weaknesses


                          has       Manufacture
   National
    Critical                          Plant
Infrastructure      Control         Operation
                    Systems




                        Law/
                                      Industry-
 Government         Compliance/
                                       specific
                     Standard/        Regulator
                     Guideline
Simplification



                      Not only
                      someone     Someone
Someone   Someone                 (and someone
                         but           else)
  hate    develop a
                      someone      has to do
someone    weapon
                       else got   something
                       trouble
Is the system integrator
                                      has security in mind?


• Is all possible condition properly handled?
• Is the program running in the controller a security-
  aware by design?
• The more security, the harder for UAT and
  commissioning, thus it may cause the delay of project
  payment. Guess what!!! They don’t do it only unless
  explicitly required or asked for.
• Is it in the TOR?
Is the system integrator
                                            has security in mind? (cont.)


“None of the industrial control systems used to monitor
and operate the nation's utilities and factories were
designed with security in mind. Moreover, their very
nature makes them difficult to secure. Linking them to
networks and the public Internet only makes them
harder to protect.”
Said by Joseph Weiss, executive consultant for KEMA
Consulting
http://www.memagazine.org/backissues/dec02/features/scadavs/scadavs.html
For your TOR/RFP
Educating the Engineering Department
Normal Operation




      HMI Web & DB                      Operator
                     Operator Workstation
PLC      Server
Hacking on Operator workstation

Scenario #1.1 Known local admin password




                  HMI Web & DB            Operator Workstation           Operator
  PLC                Server



                                 Connected                Connect to
                                 GUI‘s Server             Remote desktop

                    Remotely control GUI
                    Add new user
                    Open Share folder
                                     Hacker knows local admin password
Hacking on Operator workstation

Summary Scenario #1.1 Known local admin password

Required condition:
       Local admin password is known (default password)
       Remote Desktop is opened
 Consequence:
      Attacker can take over the system
           Attacker can take over GUI
           Attacker can add new user
           Attacker can open share folder
 Remediation:
       Change default password
       Restrict access to Remote Desktop
Hacking on Operator workstation

Scenario #1.2 unpatched




                HMI Web & DB                Operator
  PLC                                                                 Operator
                   Server                  Workstation
                                           Unpatched

                                GUI‘s Server                    Exploited server


                   Remotely control GUI
                   Add new user
                   Open Share folder

                                   Hacker attack on vulnerability’s server
Hacking on Operator workstation

Summary Scenario #1.2 unpatched
   Required condition:
             Operator workstation is not patched
  Consequence:
        Attacker can take over the system
             Attacker can take over GUI
             Attacker can add new user
             Attacker can open share folder
   Remediation:
         Regularly update the workstation
         Monitor the system integrity
         Consider intrusion detection system
         Consider security perimeter
Hacking on Operator workstation

Scenario #1.3 Password Sniffing



                                                 password

   PLC             HMI Web & DB Server            Operator Work station   Operator




                                         Sniff password
                                         in the network
Hacking on Operator workstation

Summary Scenario #1.3 Password Sniffing
   Required condition:
             Web-based HMI
             Operator sends login password via HTTP
    Consequence:
          Password is known to hacker
          Hacker can login to Web-based HMI
    Remediation:
          Use HTTPS instead of HTTP
          Consider detection measure
Hacking on Operator workstation

Scenario #1.4 Remember password



   PLC          HMI Web & DB Server           Operator Work station     Operator

                                            Remember password




                         Dump “remember password”                Plug USB U3
                                                                 Thumb drive
Hacking on Operator workstation

Summary Scenario #1.4 Remember password
   Required condition:
          Physically access to system
          Autorun enabled
    Consequence:
          Password is stolen
    Remediation:
          Limit physical access to system
          Disable Autorun (all drive)
          Don’t use remember password feature
Hacking on HMI Web & DB server

Scenario #2 SQL Injection



                                HMI Web & DB Server       Operator Work Operator
    PLC
                                Injection flaw!              station


                                          SQL Injection



   Delete table
   Modify data in table
      Insert, Delete, Update
Hacking on HMI Web & DB Server

Summary Scenario #2 SQL Injection
   Required condition:
             Web-based HMI
             SQL Injection flaw
    Consequence:
          Direct database manipulation
    Remediation:
          Input validation
          Web Application security assessment
          Web Application Firewall (WAF)
Hacking on PLC

Scenario #3 Direct PLC Manipulation




          PLC                      HMI Web & DB Server   Operator Work station   Operator


  Open port 2222/TCP   !
                        Control valve/pump
                        Change PLC Mode  system halt


                        Take control of PLC
                        Modify PLC data
                        Disrupt PLC operation
Hacking on PLC
Summary Scenario #3 Direct PLC Manipulation
   Required condition:
            Port 2222/TCP is opened (Allen Bradley)
            No authentication
            Network routable
    Consequence:
            Access PLC’s data table
   Remediation:
            Enable authentication where possible
            Routing control/ Network isolation (verify)
Qualified professional undersupply




IT Professional


                            Control
                  Infosec
                            System
                   Prof.
                             Prof.




                                    Control System
                                  Cybersecurity Prof.
The Implication

• Only small number of professional with right
  competency to help you out
• Collaboration and support from professional
  community is highly needed
Available Guidelines


• 21 Steps to Improve Cyber Security of SCADA
  Networks, US-DOE
• Roadmap to Secure Control Systems in the Chemical
  Sector, US-DHS
• Security Vulnerability Assessment Methodology for
  the Petroleum and Petrochemical Industries, API
• ISA99 - Control Systems Security Model
• ISO27001, ISO27002 (ISO17799)
21 Steps to Improve Cyber Security
                                      of SCADA Networks, US-DOE
1. Identify all connections to SCADA networks               12. Clearly define cyber security roles, responsibilities, and
2. Disconnect unnecessary connections to the SCADA               authorities for managers, system administrators, and
     network                                                     users
3. Evaluate and strengthen the security of any remaining    13. Document network architecture and identify systems that
     connections to the SCADA network                            serve critical functions or contain sensitive information
4. Harden SCADA networks by removing or disabling                that require additional levels of protection
     unnecessary services                                   14. Establish a rigorous, ongoing risk management process
5. Do not rely on proprietary protocols to protect your     15. Establish a network protection strategy based on the
     system                                                      principle of defense-in-depth
6. Implement the security features provided by device       16. Clearly identify cyber security requirements
     and system vendors                                     17. Establish effective configuration management processes
7. Establish strong controls over any medium that is used   18. Conduct routine self-assessments
     as a backdoor into the SCADA network                   19. Establish system backups and disaster recovery plans
8. Implement internal and external intrusion detection      20. Senior organizational leadership should establish
     systems and establish 24-hour-a-day incident                expectations for cyber security
     monitoring.                                            •    performance and hold individuals accountable for their
9. Perform technical audits of SCADA devices and                 performance
     networks, and any other connected networks, to         21. Establish policies and conduct training to minimize the
     identify security concerns                                  likelihood that organizational personnel will inadvertently
10. Conduct physical security surveys and assess all             disclose sensitive information regarding SCADA system
     remote sites connected to the SCADA network to              design, operations, or security controls.
     evaluate their security
11. Establish SCADA “Red Teams” to identify and evaluate
     possible attack scenarios
NIST SP800-82
     NIST Special Publication 800-82: Guide to Industrial
     Control Systems (ICS) Security

    Executive Summary
    1. Introduction
    2. Overview of Industrial Control Systems
    3. ICS Characteristics, Threats and Vulnerabilities
    4. ICS Security Program Development and Deployment
    5. Network Architecture
         ICS Security Controls


http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf
What is Industrial Control Systems                 (ICS),
                                                        SCADA and DCS?


Industrial Control Systems are computer-based
systems that are used by many infrastructures and industries to monitor
and control sensitive processes and physical functions. Typically, control
systems collect sensor measurements and operational data from the
field, process and display this information, and relay control commands
to local or remote equipment.
              There are two primary types of Control Systems.

                  – Distributed Control Systems (DCS) typically are used
                    within a single processing or generating plant or over a
                    small geographic area.

                  – Supervisory Control and Data Acquisition (SCADA)
                    systems typically are used for large, geographically
                    dispersed distribution operations.

             NIST SP800-82 Final Public DRAFT (Sep. 2008)
             http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf
Major ICS Security Objectives

• Restricting logical access to the ICS network and network
  activity
   – This includes using a demilitarized zone (DMZ) network architecture
     with firewalls to prevent network traffic from passing directly
     between the corporate and ICS networks, and having separate
     authentication mechanisms and credentials for users of the
     corporate and ICS networks. The ICS should also use a network
     topology that has multiple layers, with the most critical
     communications occurring in the most secure and reliable layer.
• Restricting physical access to the ICS network and devices
   – Unauthorized physical access to components could cause serious
     disruption of the ICS’s functionality. A combination of physical
     access controls should be used, such as locks, card readers, and/or
     guards.
Key Take Away to Securing ICS

The most successful method for securing an ICS is to:
• Gather industry recommended practices
• Engage in a proactive, collaborative effort between
  management, the controls engineer and operator, the
  IT department, the physical security department, and a
  trusted automation advisor
• Draw upon the wealth of information available from
  ongoing federal government, industry group, vendor
  and standards organizational activities.
ISA 99
ISA SP-99 – Manufacturing and Control Systems Security
 Scope - A Broad View
 • ISA has taken a broad view:
     – Based on function, not industry, type of control or other limited
       views
 • Includes
     –   SCADA/EMS
     –   DCS
     –   PLCs
     –   RTUs/IEDs
     –   Transmitters, meters, control valves, to enterprise wide HMIs, …
     –   Enterprise applications, to the extent they can affect control
 • Not limited to one or a few industries or technologies
     – In other words, a very broad encompassing definition
Scope of Security Standards

                                               Company Management                       Company Management




                                                                                                                     IT Security Policies and Practices
                                                 Data Presentation                          Information
                                     Level 5




                                                                                                                                (ISO 17799)
                                                Company Production
                                                                                         Company Production
                                               Assignment Scheduling
                                                                                        Scheduling Assignment
                                                    Supervision
     Purdue reference Model Levels




                                                                                        Production Scheduling
                                     Level 4   Operational & Production
                                                                                            & Operational
                                                     Supervision
                                                                                            Management


                                     Level 3    Supervisor’s Console                    Inter-Area Coordination




                                                                                                                                                          Mfg Security Policies
                                                Supervisor’s Console




                                                                                                                                                             and Practices
                                     Level 2                                             Supervisory Control




                                                                                                                                                                (ISA 99)
                                     Level 1     Operator’s Console                      Direct Digital Control




                                                                                                                  Process Safety


                                                                                                                   IEC 61511)
                                                                                                                   IEC 61508,
                                                                                                                     (ISA 84,
                                                                          Controllers

                                                                                          Process


33
ISA SP-99 Part 1

• What is included in SP-99 Part 1:
     – Definitions of Manufacturing and Control Systems
       security terms
     – Description of the terminology used in security as it
       applies to Manufacturing and Control Systems
     – A Common Model for specifying security requirements
       for Manufacturing and Control Systems program
     – Covers reference architecture for describing the
       security environment
     – The standard is not specific to vendors, customers, or
       any particular aspect of Manufacturing and Control
       Systems security
• First ballot expected by Q1 2006



34
ISA SP-99 Part 2
•    What is included in SP-99 Part 2:
      – Activity 1 – Develop a Business Case
      – Activity 2 – Obtain Leadership Commitment, Support, and
        Funding
      – Activity 3 – Define the Charter and Scope of M&CS Security
        for Your Company
      – Activity 4 – Form a Team of Stakeholders
      – Activity 5 – Raise Staff Cyber Security Capability Through
        Training
      – Activity 6 – Characterize the Key M&CS Risks
      – Activity 7 – Define the Corporate Risk Tolerance Level
      – Activity 8 – Establish High-Level Cyber Security Policies that
        Support the Risk Tolerance Level
      – Activity 9 – Perform a Screening Assessment
      – Activity 10 – Organize for Security
      – Activity 11 – Prioritize Systems and Conduct a Detailed
        Security Assessment

35
ISA SP-99 Part 2, continued

• What is included in SP-99 Part 2, continued:
      – Activity 12 – Develop Detailed M&CS Cyber Security Policies
        & Procedures
      – Activity 13 – Define Standard Set of M&CS Security Risk
        Mitigation Controls
      – Activity 14 – Develop Integrated Cyber Security
        Management System Plan
      – Activity 15 – Quick Fix
      – Activity 16 – Charter, Design, & Execute Cyber Security Risk
        Mitigation Projects
      – Activity 17 – Refine and Implement Cyber Security
        Management System
      – Activity 18 – Adopt Continuous Improvement Operational
        Measures
• First ballot is expected by Q3 2006
 36
TR99.00.01 - Technology Areas


• Authentication and Authorization
• Filtering/Blocking/Access Control
• Encryption and Data Validation
• Audit, Measurement, Monitoring and
  Detection Tools
• Operating Systems
• Physical Security

37
TR99.00.01 Authentication and Authorization




• Role Based Authorization Tools
• Password Authentication
• Challenge Response Authentication
• Physical/Token Authentication
• Smart Card Authentication
• Biometric Authentication
• Location Based Authentication
• Password Distribution and Management
  Technologies
• Device to Device Authentication

38
TR99.00.01 Filtering/Blocking/Access Control




• Dedicated Firewalls (Hardware Based)
• Host-based Firewalls (Software Based)
• Virtual Local Area Networks (VLANs)




39
TR99.00.01 Encryption Technologies
                                     and Data Validation


•    Symmetric (Private) Key Encryption
•    Public Key Encryption and Key Distribution
•    Virtual Private Networks (VPNs)
•    Digital Certificates




40
TR99.00.01 Audit, Measurement,
                    and Monitoring and Detection Tools


•    Log Auditing Utilities
•    Virus/Malicious Code Detection
•    Intrusion Detection Systems
•    Network Vulnerability Scanners
•    Network Forensics and Analysis Tools
•    Host Configuration Management Tools
•    Automated Software Management Tools

41
TR99.00.01 Computer Software


• Server and Workstation Operating Systems
• Real-time and Embedded Operating Systems
• Web and Internet Technologies




42
Summary

• Guidelines and best practices are
  available
• Study and apply those related to your
  specific requirement and circumstances
• Keep update
44

Más contenido relacionado

La actualidad más candente

The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101Wavestone
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsAleksandr Timorin
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration TestingAhmed Sherif
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsAleksandr Timorin
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overviewpgmaynard
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseChris Sistrunk
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014iotisrael
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 NetworksChris Sistrunk
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security PresentationFilip Maertens
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Honeywell
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentestersAleksandr Timorin
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale funJan Seidl
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Chris Sistrunk
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...arnaudsoullie
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMarina Krotofil
 

La actualidad más candente (20)

The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101BruCON 2015 - Pentesting ICS 101
BruCON 2015 - Pentesting ICS 101
 
Scada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanismsScada deep inside: protocols and security mechanisms
Scada deep inside: protocols and security mechanisms
 
Scada Security & Penetration Testing
Scada Security & Penetration TestingScada Security & Penetration Testing
Scada Security & Penetration Testing
 
SCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanismsSCADA deep inside: protocols and security mechanisms
SCADA deep inside: protocols and security mechanisms
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
BSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA DefenseBSidesAugusta ICS SCADA Defense
BSidesAugusta ICS SCADA Defense
 
Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014Securing Critical Iot Infrastructure, IoT Israel 2014
Securing Critical Iot Infrastructure, IoT Israel 2014
 
Protecting Your DNP3 Networks
Protecting Your DNP3 NetworksProtecting Your DNP3 Networks
Protecting Your DNP3 Networks
 
SCADA Security Presentation
SCADA Security PresentationSCADA Security Presentation
SCADA Security Presentation
 
ICS security
ICS securityICS security
ICS security
 
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
Yokogawa & NextNine – Lessons Learned: Global Cybersecurity Management System...
 
SCADA Security
SCADA SecuritySCADA Security
SCADA Security
 
Industrial protocols for pentesters
Industrial protocols for pentestersIndustrial protocols for pentesters
Industrial protocols for pentesters
 
SCADA hacking industrial-scale fun
SCADA hacking industrial-scale funSCADA hacking industrial-scale fun
SCADA hacking industrial-scale fun
 
Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?Blackhat USA 2016 - What's the DFIRence for ICS?
Blackhat USA 2016 - What's the DFIRence for ICS?
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 
Mission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control SystemsMission Impact Assessment for Industrial Control Systems
Mission Impact Assessment for Industrial Control Systems
 

Destacado

Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Ahmed Al Enizi
 
Cyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control SystemsCyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control SystemsDavid Spinks
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
7-Eleven store in PTT gas station reduces air-con cost with Planet Supra
7-Eleven store in PTT gas station reduces air-con cost with Planet Supra7-Eleven store in PTT gas station reduces air-con cost with Planet Supra
7-Eleven store in PTT gas station reduces air-con cost with Planet SupraTrading Green Ltd.
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonPatricia M Watson
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsJames Arlen
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systemsItex Solutions
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksMaurice Dawson
 
Notacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsNotacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsJames Arlen
 
Curso de Comunicaciones para Sistema SCADA Caracas de Hidrocapital
Curso de Comunicaciones para Sistema SCADA Caracas de HidrocapitalCurso de Comunicaciones para Sistema SCADA Caracas de Hidrocapital
Curso de Comunicaciones para Sistema SCADA Caracas de HidrocapitalJuan Manuel Fleitas
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 Derek Harp
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
การวิเครา Swot
การวิเครา Swotการวิเครา Swot
การวิเครา Swotjanjirapansri
 
ปตท จำกัด(มหาชน)
ปตท จำกัด(มหาชน)ปตท จำกัด(มหาชน)
ปตท จำกัด(มหาชน)Love Plukkie Zaa
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...Eran Goldstein
 

Destacado (19)

Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
Managing The Security Risks Of Your Scada System, Ahmad Alanazy, 2012
 
Scada security
Scada securityScada security
Scada security
 
Cyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control SystemsCyber Security Threats to Industrial Control Systems
Cyber Security Threats to Industrial Control Systems
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
7-Eleven store in PTT gas station reduces air-con cost with Planet Supra
7-Eleven store in PTT gas station reduces air-con cost with Planet Supra7-Eleven store in PTT gas station reduces air-con cost with Planet Supra
7-Eleven store in PTT gas station reduces air-con cost with Planet Supra
 
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia WatsonSCADA Cyber Sec | ISACA 2013 | Patricia Watson
SCADA Cyber Sec | ISACA 2013 | Patricia Watson
 
BlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security ExpertsBlackHat Europe 2010: SCADA and ICS for Security Experts
BlackHat Europe 2010: SCADA and ICS for Security Experts
 
18188206 sistema-scada
18188206 sistema-scada18188206 sistema-scada
18188206 sistema-scada
 
Cybersecurity for modern industrial systems
Cybersecurity for modern industrial  systemsCybersecurity for modern industrial  systems
Cybersecurity for modern industrial systems
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Protecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber AttacksProtecting Infrastructure from Cyber Attacks
Protecting Infrastructure from Cyber Attacks
 
Notacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security ExpertsNotacon 7 - SCADA and ICS for Security Experts
Notacon 7 - SCADA and ICS for Security Experts
 
Curso de Comunicaciones para Sistema SCADA Caracas de Hidrocapital
Curso de Comunicaciones para Sistema SCADA Caracas de HidrocapitalCurso de Comunicaciones para Sistema SCADA Caracas de Hidrocapital
Curso de Comunicaciones para Sistema SCADA Caracas de Hidrocapital
 
ปตท
ปตทปตท
ปตท
 
SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016 SANS ICS Security Survey Report 2016
SANS ICS Security Survey Report 2016
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
การวิเครา Swot
การวิเครา Swotการวิเครา Swot
การวิเครา Swot
 
ปตท จำกัด(มหาชน)
ปตท จำกัด(มหาชน)ปตท จำกัด(มหาชน)
ปตท จำกัด(มหาชน)
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 

Similar a Improving Control System Security

Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorunNimrod Levy
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copyNimrod Levy
 
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008ClubHack
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learnedamiable_indian
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessEC-Council
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008ClubHack
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008ClubHack
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CDamiable_indian
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Managementdavidzucker
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersITExamAnswers.net
 
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...PROIDEA
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Centerdavidzucker
 
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...Clever Consulting
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...Area41
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Controlzayedalji
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMITamas K Lengyel
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 

Similar a Improving Control System Security (20)

Duck Hunter - The return of autorun
Duck Hunter - The return of autorunDuck Hunter - The return of autorun
Duck Hunter - The return of autorun
 
Nimrod duck hunter copy
Nimrod duck hunter   copyNimrod duck hunter   copy
Nimrod duck hunter copy
 
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
Chris - Network Vulnerability Assessments: Lessons Learned - ClubHack2008
 
Network Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons LearnedNetwork Vulnerability Assessments: Lessons Learned
Network Vulnerability Assessments: Lessons Learned
 
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote AccessHacker Halted 2014 - Post-Exploitation After Having Remote Access
Hacker Halted 2014 - Post-Exploitation After Having Remote Access
 
Advanced persistent threats
Advanced persistent threatsAdvanced persistent threats
Advanced persistent threats
 
Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008Kunal - Introduction to BackTrack - ClubHack2008
Kunal - Introduction to BackTrack - ClubHack2008
 
Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008Kunal - Introduction to backtrack - ClubHack2008
Kunal - Introduction to backtrack - ClubHack2008
 
Workshop on BackTrack live CD
Workshop on BackTrack live CDWorkshop on BackTrack live CD
Workshop on BackTrack live CD
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Remote Access Management
Remote Access ManagementRemote Access Management
Remote Access Management
 
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam AnswersIT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
IT Essentials (Version 7.0) - ITE Chapter 13 Exam Answers
 
Srs
SrsSrs
Srs
 
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...CONFidence 2015: SCADA and mobile: security assessment of the applications th...
CONFidence 2015: SCADA and mobile: security assessment of the applications th...
 
Minicom in the Data Center
Minicom in the Data CenterMinicom in the Data Center
Minicom in the Data Center
 
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
ObserveIT whitepaper: "Log Blindspots" > generare i Log in automatico per un ...
 
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
hashdays 2011: Felix 'FX' Lindner - Targeted Industrial Control System Attack...
 
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access ControlWallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
 
Cloud Security with LibVMI
Cloud Security with LibVMICloud Security with LibVMI
Cloud Security with LibVMI
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 

Más de Narinrit Prem-apiwathanokul (14)

How to address C-Level properly?
How to address C-Level properly?How to address C-Level properly?
How to address C-Level properly?
 
IMC: risk base security
IMC: risk base securityIMC: risk base security
IMC: risk base security
 
Cloud Security by CK
Cloud Security by CKCloud Security by CK
Cloud Security by CK
 
Tt 06-ck
Tt 06-ckTt 06-ck
Tt 06-ck
 
U S Embassy Event - Today’S Cyber Threats
U S  Embassy  Event - Today’S  Cyber  ThreatsU S  Embassy  Event - Today’S  Cyber  Threats
U S Embassy Event - Today’S Cyber Threats
 
Introduction to INFOSEC Professional
Introduction to INFOSEC ProfessionalIntroduction to INFOSEC Professional
Introduction to INFOSEC Professional
 
Infosec Workforce Development Framework For Thailand
Infosec Workforce Development Framework For ThailandInfosec Workforce Development Framework For Thailand
Infosec Workforce Development Framework For Thailand
 
Addressing CIP
Addressing CIPAddressing CIP
Addressing CIP
 
SCADA Security in CDIC 2009
SCADA Security in CDIC 2009SCADA Security in CDIC 2009
SCADA Security in CDIC 2009
 
S C A D A Security Keynote C K
S C A D A  Security  Keynote  C KS C A D A  Security  Keynote  C K
S C A D A Security Keynote C K
 
SecurityExchange2009-Key Note
SecurityExchange2009-Key NoteSecurityExchange2009-Key Note
SecurityExchange2009-Key Note
 
Chaiyakorn
ChaiyakornChaiyakorn
Chaiyakorn
 
CCA Preparation for Organization
CCA Preparation for OrganizationCCA Preparation for Organization
CCA Preparation for Organization
 
IT Security EBK2008 Summary
IT Security EBK2008 SummaryIT Security EBK2008 Summary
IT Security EBK2008 Summary
 

Improving Control System Security

  • 1. Improving Control System Security by Chaiyakorn Apiwathanokul CISSP, GCFA, IRCA:ISMS Chief Security Officer PTT ICT Solutions Co., Ltd. A Company of PTT Group July 2010
  • 2. About Speaker Name: Chaiyakorn Apiwathanokul ไชยกร อภิวัฒโนกุล Title: Chief Security Officer (CSO) Company: PTT ICT Solutions Company Limited A Company of PTT Group Certificates: ISC2:CISSP, IRCA:ISMS (ISO27001), SANS:GCFA • Contribute to Thailand Cyber Crime Act B.E.2550 • Security Sub-commission under Thailand Electronic Transaction Commission (ET Act B.E. 2544) • Workgroup for CA service standard development • Committee of national standard adoption of ISO27001/ISO27002 • Committee of Thailand Information Security Association (TISA) • Committee of Cybersecurity taskforce development, Division of Skill Development, Ministry of Labour
  • 3. Sub Topic:  Examining current security trends and their impact for SCADA systems  Increasing the security and usability of SCADA systems  Understanding tools and techniques to mitigate SCADA security risk
  • 4. See Videos 1. DHS experiment on hacking to destroy a generator 2. US Power Grid under attack - Clarke
  • 5. Malicious code/ Virus/Worm Adversary/ Terrorist/ Disgruntled Hacker employee Vulnerabilities/ Weaknesses has Manufacture National Critical Plant Infrastructure Control Operation Systems Law/ Industry- Government Compliance/ specific Standard/ Regulator Guideline
  • 6. Simplification Not only someone Someone Someone Someone (and someone but else) hate develop a someone has to do someone weapon else got something trouble
  • 7. Is the system integrator has security in mind? • Is all possible condition properly handled? • Is the program running in the controller a security- aware by design? • The more security, the harder for UAT and commissioning, thus it may cause the delay of project payment. Guess what!!! They don’t do it only unless explicitly required or asked for. • Is it in the TOR?
  • 8. Is the system integrator has security in mind? (cont.) “None of the industrial control systems used to monitor and operate the nation's utilities and factories were designed with security in mind. Moreover, their very nature makes them difficult to secure. Linking them to networks and the public Internet only makes them harder to protect.” Said by Joseph Weiss, executive consultant for KEMA Consulting http://www.memagazine.org/backissues/dec02/features/scadavs/scadavs.html
  • 11. Normal Operation HMI Web & DB Operator Operator Workstation PLC Server
  • 12. Hacking on Operator workstation Scenario #1.1 Known local admin password HMI Web & DB Operator Workstation Operator PLC Server Connected Connect to GUI‘s Server Remote desktop  Remotely control GUI  Add new user  Open Share folder Hacker knows local admin password
  • 13. Hacking on Operator workstation Summary Scenario #1.1 Known local admin password Required condition:  Local admin password is known (default password)  Remote Desktop is opened Consequence: Attacker can take over the system  Attacker can take over GUI  Attacker can add new user  Attacker can open share folder Remediation:  Change default password  Restrict access to Remote Desktop
  • 14. Hacking on Operator workstation Scenario #1.2 unpatched HMI Web & DB Operator PLC Operator Server Workstation Unpatched GUI‘s Server Exploited server  Remotely control GUI  Add new user  Open Share folder Hacker attack on vulnerability’s server
  • 15. Hacking on Operator workstation Summary Scenario #1.2 unpatched Required condition:  Operator workstation is not patched Consequence: Attacker can take over the system  Attacker can take over GUI  Attacker can add new user  Attacker can open share folder Remediation:  Regularly update the workstation  Monitor the system integrity  Consider intrusion detection system  Consider security perimeter
  • 16. Hacking on Operator workstation Scenario #1.3 Password Sniffing password PLC HMI Web & DB Server Operator Work station Operator Sniff password in the network
  • 17. Hacking on Operator workstation Summary Scenario #1.3 Password Sniffing Required condition:  Web-based HMI  Operator sends login password via HTTP Consequence:  Password is known to hacker  Hacker can login to Web-based HMI Remediation:  Use HTTPS instead of HTTP  Consider detection measure
  • 18. Hacking on Operator workstation Scenario #1.4 Remember password PLC HMI Web & DB Server Operator Work station Operator Remember password Dump “remember password” Plug USB U3 Thumb drive
  • 19. Hacking on Operator workstation Summary Scenario #1.4 Remember password Required condition:  Physically access to system  Autorun enabled Consequence:  Password is stolen Remediation:  Limit physical access to system  Disable Autorun (all drive)  Don’t use remember password feature
  • 20. Hacking on HMI Web & DB server Scenario #2 SQL Injection HMI Web & DB Server Operator Work Operator PLC Injection flaw! station SQL Injection  Delete table  Modify data in table  Insert, Delete, Update
  • 21. Hacking on HMI Web & DB Server Summary Scenario #2 SQL Injection Required condition:  Web-based HMI  SQL Injection flaw Consequence:  Direct database manipulation Remediation:  Input validation  Web Application security assessment  Web Application Firewall (WAF)
  • 22. Hacking on PLC Scenario #3 Direct PLC Manipulation PLC HMI Web & DB Server Operator Work station Operator Open port 2222/TCP !  Control valve/pump  Change PLC Mode  system halt  Take control of PLC  Modify PLC data  Disrupt PLC operation
  • 23. Hacking on PLC Summary Scenario #3 Direct PLC Manipulation Required condition:  Port 2222/TCP is opened (Allen Bradley)  No authentication  Network routable Consequence:  Access PLC’s data table Remediation:  Enable authentication where possible  Routing control/ Network isolation (verify)
  • 24. Qualified professional undersupply IT Professional Control Infosec System Prof. Prof. Control System Cybersecurity Prof.
  • 25. The Implication • Only small number of professional with right competency to help you out • Collaboration and support from professional community is highly needed
  • 26. Available Guidelines • 21 Steps to Improve Cyber Security of SCADA Networks, US-DOE • Roadmap to Secure Control Systems in the Chemical Sector, US-DHS • Security Vulnerability Assessment Methodology for the Petroleum and Petrochemical Industries, API • ISA99 - Control Systems Security Model • ISO27001, ISO27002 (ISO17799)
  • 27. 21 Steps to Improve Cyber Security of SCADA Networks, US-DOE 1. Identify all connections to SCADA networks 12. Clearly define cyber security roles, responsibilities, and 2. Disconnect unnecessary connections to the SCADA authorities for managers, system administrators, and network users 3. Evaluate and strengthen the security of any remaining 13. Document network architecture and identify systems that connections to the SCADA network serve critical functions or contain sensitive information 4. Harden SCADA networks by removing or disabling that require additional levels of protection unnecessary services 14. Establish a rigorous, ongoing risk management process 5. Do not rely on proprietary protocols to protect your 15. Establish a network protection strategy based on the system principle of defense-in-depth 6. Implement the security features provided by device 16. Clearly identify cyber security requirements and system vendors 17. Establish effective configuration management processes 7. Establish strong controls over any medium that is used 18. Conduct routine self-assessments as a backdoor into the SCADA network 19. Establish system backups and disaster recovery plans 8. Implement internal and external intrusion detection 20. Senior organizational leadership should establish systems and establish 24-hour-a-day incident expectations for cyber security monitoring. • performance and hold individuals accountable for their 9. Perform technical audits of SCADA devices and performance networks, and any other connected networks, to 21. Establish policies and conduct training to minimize the identify security concerns likelihood that organizational personnel will inadvertently 10. Conduct physical security surveys and assess all disclose sensitive information regarding SCADA system remote sites connected to the SCADA network to design, operations, or security controls. evaluate their security 11. Establish SCADA “Red Teams” to identify and evaluate possible attack scenarios
  • 28. NIST SP800-82 NIST Special Publication 800-82: Guide to Industrial Control Systems (ICS) Security Executive Summary 1. Introduction 2. Overview of Industrial Control Systems 3. ICS Characteristics, Threats and Vulnerabilities 4. ICS Security Program Development and Deployment 5. Network Architecture ICS Security Controls http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf
  • 29. What is Industrial Control Systems (ICS), SCADA and DCS? Industrial Control Systems are computer-based systems that are used by many infrastructures and industries to monitor and control sensitive processes and physical functions. Typically, control systems collect sensor measurements and operational data from the field, process and display this information, and relay control commands to local or remote equipment. There are two primary types of Control Systems. – Distributed Control Systems (DCS) typically are used within a single processing or generating plant or over a small geographic area. – Supervisory Control and Data Acquisition (SCADA) systems typically are used for large, geographically dispersed distribution operations. NIST SP800-82 Final Public DRAFT (Sep. 2008) http://csrc.nist.gov/publications/drafts/800-82/draft_sp800-82-fpd.pdf
  • 30. Major ICS Security Objectives • Restricting logical access to the ICS network and network activity – This includes using a demilitarized zone (DMZ) network architecture with firewalls to prevent network traffic from passing directly between the corporate and ICS networks, and having separate authentication mechanisms and credentials for users of the corporate and ICS networks. The ICS should also use a network topology that has multiple layers, with the most critical communications occurring in the most secure and reliable layer. • Restricting physical access to the ICS network and devices – Unauthorized physical access to components could cause serious disruption of the ICS’s functionality. A combination of physical access controls should be used, such as locks, card readers, and/or guards.
  • 31. Key Take Away to Securing ICS The most successful method for securing an ICS is to: • Gather industry recommended practices • Engage in a proactive, collaborative effort between management, the controls engineer and operator, the IT department, the physical security department, and a trusted automation advisor • Draw upon the wealth of information available from ongoing federal government, industry group, vendor and standards organizational activities.
  • 32. ISA 99 ISA SP-99 – Manufacturing and Control Systems Security Scope - A Broad View • ISA has taken a broad view: – Based on function, not industry, type of control or other limited views • Includes – SCADA/EMS – DCS – PLCs – RTUs/IEDs – Transmitters, meters, control valves, to enterprise wide HMIs, … – Enterprise applications, to the extent they can affect control • Not limited to one or a few industries or technologies – In other words, a very broad encompassing definition
  • 33. Scope of Security Standards Company Management Company Management IT Security Policies and Practices Data Presentation Information Level 5 (ISO 17799) Company Production Company Production Assignment Scheduling Scheduling Assignment Supervision Purdue reference Model Levels Production Scheduling Level 4 Operational & Production & Operational Supervision Management Level 3 Supervisor’s Console Inter-Area Coordination Mfg Security Policies Supervisor’s Console and Practices Level 2 Supervisory Control (ISA 99) Level 1 Operator’s Console Direct Digital Control Process Safety IEC 61511) IEC 61508, (ISA 84, Controllers Process 33
  • 34. ISA SP-99 Part 1 • What is included in SP-99 Part 1: – Definitions of Manufacturing and Control Systems security terms – Description of the terminology used in security as it applies to Manufacturing and Control Systems – A Common Model for specifying security requirements for Manufacturing and Control Systems program – Covers reference architecture for describing the security environment – The standard is not specific to vendors, customers, or any particular aspect of Manufacturing and Control Systems security • First ballot expected by Q1 2006 34
  • 35. ISA SP-99 Part 2 • What is included in SP-99 Part 2: – Activity 1 – Develop a Business Case – Activity 2 – Obtain Leadership Commitment, Support, and Funding – Activity 3 – Define the Charter and Scope of M&CS Security for Your Company – Activity 4 – Form a Team of Stakeholders – Activity 5 – Raise Staff Cyber Security Capability Through Training – Activity 6 – Characterize the Key M&CS Risks – Activity 7 – Define the Corporate Risk Tolerance Level – Activity 8 – Establish High-Level Cyber Security Policies that Support the Risk Tolerance Level – Activity 9 – Perform a Screening Assessment – Activity 10 – Organize for Security – Activity 11 – Prioritize Systems and Conduct a Detailed Security Assessment 35
  • 36. ISA SP-99 Part 2, continued • What is included in SP-99 Part 2, continued: – Activity 12 – Develop Detailed M&CS Cyber Security Policies & Procedures – Activity 13 – Define Standard Set of M&CS Security Risk Mitigation Controls – Activity 14 – Develop Integrated Cyber Security Management System Plan – Activity 15 – Quick Fix – Activity 16 – Charter, Design, & Execute Cyber Security Risk Mitigation Projects – Activity 17 – Refine and Implement Cyber Security Management System – Activity 18 – Adopt Continuous Improvement Operational Measures • First ballot is expected by Q3 2006 36
  • 37. TR99.00.01 - Technology Areas • Authentication and Authorization • Filtering/Blocking/Access Control • Encryption and Data Validation • Audit, Measurement, Monitoring and Detection Tools • Operating Systems • Physical Security 37
  • 38. TR99.00.01 Authentication and Authorization • Role Based Authorization Tools • Password Authentication • Challenge Response Authentication • Physical/Token Authentication • Smart Card Authentication • Biometric Authentication • Location Based Authentication • Password Distribution and Management Technologies • Device to Device Authentication 38
  • 39. TR99.00.01 Filtering/Blocking/Access Control • Dedicated Firewalls (Hardware Based) • Host-based Firewalls (Software Based) • Virtual Local Area Networks (VLANs) 39
  • 40. TR99.00.01 Encryption Technologies and Data Validation • Symmetric (Private) Key Encryption • Public Key Encryption and Key Distribution • Virtual Private Networks (VPNs) • Digital Certificates 40
  • 41. TR99.00.01 Audit, Measurement, and Monitoring and Detection Tools • Log Auditing Utilities • Virus/Malicious Code Detection • Intrusion Detection Systems • Network Vulnerability Scanners • Network Forensics and Analysis Tools • Host Configuration Management Tools • Automated Software Management Tools 41
  • 42. TR99.00.01 Computer Software • Server and Workstation Operating Systems • Real-time and Embedded Operating Systems • Web and Internet Technologies 42
  • 43. Summary • Guidelines and best practices are available • Study and apply those related to your specific requirement and circumstances • Keep update
  • 44. 44