Download Cyber Security Education Consortium 2008 Retreat

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Distributed firewall wikipedia , lookup

Information security wikipedia , lookup

Unix security wikipedia , lookup

Access control wikipedia , lookup

Mobile security wikipedia , lookup

Cyber-security regulation wikipedia , lookup

Cyberattack wikipedia , lookup

Computer security wikipedia , lookup

Security-focused operating system wikipedia , lookup

Transcript
Critical Infrastructure and
Automated Control Systems
Security: A Strategy for Securing
Against Cyber Attacks
Dr. Thomas L. Pigg
Director of the Tennessee CSEC
CSEC
Mission
• The Cyber Security Education
Consortium is a National Science
Foundation ATE Regional Center of
Excellence dedicated to building an
information security workforce who
will play a critical role in implementing
the national strategy to secure
cyberspace.
CSEC Sites
Tennessee CSEC
Mission
• Phase 1
– Train the trainer
• Phase 2
– Develop Student
Curriculum/Courses/Concentrations
• Phase 3
– Develop Partnerships with Business,
Industry and Government
Core Train the
Trainer Workshops
• Principles of Information Assurance
• Network Security
• Enterprise Security Management
• Secure E-Commerce
• Digital Forensics
New CSEC Courses
• Automation and Control Systems
– Control Systems Architecture
– Control Systems Software Applications
– Control Systems Security I and II
• Mobile Communications Devices
– Mobile Device Architecture
– Mobile Device Programming
– Mobile Device Hardware
• Secure Coding
– Secure Programming I and II
– Software Testing
– Software Security
What are Control
Systems
• SCADA
(Supervisory Control and Data Acquisition)
• DCS (Distributed Control Systems)
• ICS (Industrial Control Systems)
• BAS (Building Automation Systems)
• PLC (Programmable Logic Controllers)
• Smart Grid
Critical
Infrastructures
• Agriculture & Food
• Banking & Finance
• Chemical
• Commercial Facilities
• Communications
• Critical Manufacturing
Critical
Infrastructures
• Dams
• Defense Industrial Base
• Emergency Services
• Energy
• Government Facilities
• Healthcare & Public Health
Critical
Infrastructures
• Information Technology
• National Monuments & Icons
• Nuclear Reactors, Materials & Waste
• Postal & Shipping
• Transportation Systems
• Water
Key Critical
Infrastructures
• Key Sectors for Control Systems Security
• Energy (Electricity, Oil, and Natural Gas)
• Water & Wastewater
• Nuclear
• Chemical
• Dams
• Transportation
• Critical Manufacturing
Current Trends in
Control Systems
• Continued move to open protocols
• Continued move to more COTS
operating systems & applications
• More remote control & management
• More network access to systems
• More widespread use of wireless
Current State of
Security
• Control Systems protocols with little or no security
• Migration to TCP/IP networks with its inherent
vulnerabilities
• Interconnection with enterprise networks
• Old operating systems & applications with poor
patching practices
• Little monitoring of Control Systems for attacks
being done
• Vendors not securing their product offerings
adequately
Current State of
Security
• Increased risk of insider attacks by outsourced IT
services
• Experts seeing increased interest in Control
Systems by terrorists & foreign governments
• Evidence that nation-states have been taking
remote control of Control Systems
• Denial by some companies that there is a problem
• Some companies are now starting to see the need
and address the issues
Real Control System
Security Breaches
• Diamler-Chrysler Plant Shutdown
– Zotob worm – August 2005
• First Energy’s Nuclear Plant
Infestation
– Slammer worm – January 2003
• Maroochy Shire Sewage
– Release of millions of gallons of sewage January 2000 – Perpetrator accessed
system 46 times
Real Control System
Security Breaches
• Hacking the Industrial Network
– http://www.isa.org/FileStore/Intech/White
Paper/Hacking-the-industrial-networkUSversion.pdf
• DHS Video – Idaho National
Laboratory – AURORA Test
– http://www.cnn.com/2007/US/09/26/power.
at.risk/index.html#cnnSTCVideo
AURORA Test
Real Control System
Security Breaches
• Stuxnet
– http://www.tofinosecurity.com/stuxnetcentral
– http://www.exida.com/images/uploads/The
_7_Things_Every_Plant_Manager_Should
_Know_About_Control_System_Security.p
df
Current Threats
• Internet Based Threats
• Worms
• Viruses
• Denial of Service Attacks
• Targeted Attacks
• Terrorist
• Foreign Nation
• Former Insider
Current Threats
• Physical Threats
• Natural Disasters
• Man-made Disasters (War, Riots,
etc.)
• Terrorist Attacks
Current Threats
• Internal Threats
• Disgruntled employee
• On-site contractor
• Unintentional attack
• IT worker
• Curious Employee
Current Threats
• Targeted Attacks
• Can use any threat & threat agent
• Internet
• Internal
• Physical
• Social Engineering
• Etc.
IT Security for
Control Systems
• CIA
• Confidentiality
• Integrity
• Availability
IT Security for
Control Systems
• Technical Controls
• Firewalls
• IDS
• Smart Cards
• Access Controls
IT Security for
Control Systems
• Administrative Controls
• Security Policies & Procedures
• Security Awareness
• People
IT Security for
Control Systems
• TCP/IP
• Patches & Updates
• Intrusion Detection Systems
• Control Systems Monitoring
• Signatures for Control Systems
• Anti-Virus Software
IT Security for
Control Systems
• Access Control Methods
• Passwords
• Multi-Factor
• Smart Cards
• RFID
• Proximity
• Biometric
IT Security for
Control Systems
• Authentication
• Active Directory
• Control Systems Integration
• Certificates
IT Security for
Control Systems
• Authorization
• Role Based
• Area of Responsibility
• Station Access Control
Using an IDS with a
Control System
• Network based
• Inspects all network traffic on that
segment (incoming & outgoing)
• Uses pattern based signatures
• Anomaly based uses baseline
• Uses network tap or mirrored port
• Monitors multiple hosts
Using an IDS with a
Control System
• Host based
• Inspects network traffic for a
specific host
• Better at protecting a machines
specific function
• Misses LAN based attacks
Using an IDS with a
Control System
• Commercial
• Pre-configured fee based IDS
• CA eTrust
• McAfee IntruShield & Entercept
• SonicWall
• StillSecure Strata Guard
Using an IDS with a
Control System
• Open Source
• Snort
• Base
• Sguil – Real-time GUI interface
• OSSEC (Open Source Host-based
Intrusion Detection System)
Using an IDS with a
Control System
• IPS
• Intrusion Prevention System
• Automated Response
• Dynamically change firewall
ruleset
• NIST IDS Guide (SP800-94)
Security Solutions
• Network Segmentation
• DMZ Design
• Can use ISA S99 standard as guide
• Design to protect each segment
• Allows for centralized services
Security Solutions
• Network Segmentation
• Centralized Services
• Anti-Virus
• Updates & Patches
• Active Directory Services
• Data Historians
• System Management
Security Solutions
• Secure Remote Access
• Secured VPN connections
• Escorted Access for vendors
• Require secured tokens
• Call in by vendor with request
• Issue 1-time code for access
Security Solutions
• IDS/IPS for Control Systems
• Which one to use?
• Where to use?
• HIDS or Application Whitelisting?
• UTM – Unified Threat Management
Security Solutions
• Security Event Monitoring & Logging
• Network Devices
• Switches, Routers, Firewalls, IDS
• Computing Devices
• Historians, Servers, Operator consoles
• Field Devices
• RTU, PLC, Telemetry Devices, Embedded
Devices
Security Solutions
• Security Framework
• NIPP
• NERC CIP
• CSSP DHS
• NIST
Security Solutions
• Policy & Guidance
• Developing Good Policies
• Track Data
• Points of Contact
• Areas of Concern
• Data Risk Assessment
• Evaluate the Impact of Data Loss
• Available Controls
• Technical, Administrative, & Compensating
Security Solutions
• Policy & Guidance
• Implementation
• Roles & Responsibilities
• Security Requirements
• Change Management Process
• Backup & Redundancy
• Self Assessments
Control Systems
Security Initiatives
• NIPP (National Infrastructure Protection Plan)
• CIPAC (Critical Infrastructure Partnership
Advisory Council)
• ICSJWG (Industrial Control Systems Joint
Working Group)
• ICS-Cert (Industrial Control Systems Cyber
Emergency Response Team)
• Strategy for Securing Control Systems
Control Systems
Security Initiatives
• CSSP (Control Systems Security Program)
• Idaho National Laboratory
• National SCADA Test Bed Program
• SCADA & Control Systems Procurement Project
• Smart Grid Interoperability Standards Project
• UK NISCC - Now CPNI (Centre for the Protection
of National Infrastructure)
• PCSF/SCySAG (SCADA Cyber Self Assessment
Working Group) - Historical
Control Systems
Regulations
• NERC (North American Electric Reliability
Council)
• Develop & enforce reliability standards
• CIDX/ACC – Now ChemITC (American Chemistry
Council)
• CFATS guidance & assessment tools
Control Systems
Regulations
• ISA SP99 (Industrial Automation & Control
System Security) – International Society of
Automation
• Part 1 Standard: Concepts, Terminology &
Models
• Part 2 Standard: Establishing an Industrial
Automation & Control Systems Security
Program
• Part 3 Standard: Technical Requirements for
Industrial Control Systems (Currently in
development
Control Systems
Regulations
• AGA 12 – Discontinued and used in IEEE 1711
Trial Standard
• Encryption of Serial Communications
• Serial Encrypting Transceivers now available
• API Standard 1164 (American Petroleum Institute)
• Standard on SCADA security for pipelines
• NIST – National Institute of Standards and
Technology
Control Systems
Regulations
• SP800-82 – Guide to Industrial Control
Systems (ICS) Security
• NIST initiative on Critical Infrastructure
Protection (CIP)
• Uses ISO 15408 Common Criteria methodology
Control System
Security Takeaway
• The 7 Things Every Plant Manager Should Know
About Control System Security – John Cusimano –
Director of Security Solutions for exida
– http://www.exida.com/images/uploads/The_7_Things_Every
_Plant_Manager_Should_Know_About_Control_System_Sec
urity.pdf
Contact Information
Dr. Thomas L. Pigg
Professor of Computer Information Systems
Jackson State Community College
2046 N. Parkway
Jackson, TN 38305
(731) 424-3520 Ext. 201
[email protected]