20

2 S.panzieri

  • Upload
    bvg07

  • View
    212

  • Download
    0

Embed Size (px)

Citation preview

Page 1: 2 S.panzieri

MANAGEMENTDE EVENIMENT

PARTENER PRINCIPAL

CU SPRIJINUL

Bucuresti, 24 Mai 2012- Cooperarea dintre Sectorul Public, Mediul de Afaceri şi Societatea Civilă -

PROTECŢIA INFRASTRUCTURILOR CRITICE ÎN SECTORUL TRANSPORTURILOR

PARTENERI

ORGANIZATORI EVENIMENT

Page 2: 2 S.panzieri

Prof. Stefano Panzieri 1

A PUBLIC PRIVATE PARTNERSHIP FOR A NATIONAL CERT: EVALUATING THE CYBER-RISK IN CIP

Prof. Stefano Panzieri

Dept. of Computer Science & Automation

Italian Association for Critical Infrastructures

Study Group on National Cyber Security Strategies of Prime Minister Council

Italian Association for Critical Infrastructures

Study Group on National Cyber Security

Prof. Stefano Panzieri

Dept. of Computer Science & AutomationDept. of Computer Science & Automation

Page 3: 2 S.panzieri

Prof. Stefano Panzieri 2

• Strategies• Methodologies • Tools • Technologies

A I I C (Associazione Italiana esperti Infrastrutture Critiche) scientific association born in 2006 to promote an interdisciplinary culture able to develop:

for the Protection of Critical Infrastructures in Italy

Page 4: 2 S.panzieri

Prof. Stefano Panzieri 3

AIIC Associate Companies

Page 5: 2 S.panzieri

Prof. Stefano Panzieri 4

Physical Security

Logical Security

Safety

Business continuity

CIP

Sectorial Security Strategies

Transversal & Multi-domain

Approach

Which Security?

Physical Security

LogicalSecurity

CIP

LogicalSecurity

Sectorial Security Strategies

Which Security?

Sectorial Security

Page 6: 2 S.panzieri

Prof. Stefano Panzieri 5

New Technol

ogies

Training

Organization

Direct terrorist attacks and natural, manmade, or technological hazards could produce catastrophic losses …. Attacks using components of CI/KR as weapons could have even more devastating physical and psychological consequences

European Directive 2008/114/EC

on the identification and designation of European critical

infrastructures and the assessment of the need to improve their protection

January 12, 2009

(in Italy ratified on April 2011 DL 11/4/2011, n. 61 )

Physicalsecurity

Logicalsecurity

Emergency preparedness

Businesscontinuity

CIP

Energ

y

Finan

ce

Transp

ortq

ation

Sector specific security strategies

Orizontal strategies

Multi-domains, transversal approach

Multidisciplinary and global

view

Protezione delle Infrastrutture Critiche

Logicalsecurity

Emergency preparedness

CIP

Multidisciplinary and global

preparedness

continuity

transversal approach

Emergency preparedness

CIP

Energ

y

Finan

ce

Transp

ortq

ation

Orizontal strategies

domains,

CIPCIP

domains, transversal

Public Private Partnership 2006

Page 7: 2 S.panzieri

Prof. Stefano Panzieri 6

known unknown

local

global

Digitlal

signatureFirewall

Cryptography

Automatic actions

VPN

Cultural actions

Information about threds

Inp

ac

t o

f th

red

s

A collaborative security culture is

mandatory !

Required Synergy

Institutions

Stakeholders

Technology providers

Academia Information about threats

Impa

ct o

f thr

eats

EVOLUTION OF RESPONCE

Page 8: 2 S.panzieri

Prof. Stefano Panzieri 7

CIIP

• COM(2009) 149. – COMMUNICATION FROM THE COMMISSION TO THE

EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS: Protection of Critical Information Infrastructure

– Guarantee the maximum of security and resilience

– Shared responsibility: no one has alone the required instruments

Page 9: 2 S.panzieri

Prof. Stefano Panzieri 8

Digital Agenda

• COM(2010) 245

– COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS: A Digital Agenda for Europe.

– A great obstacle among others: the increasing of cyber crime

• Within 2012: National CERTs

• Within 2013: European Center for Cyber Crime

• A great discussion in Italy in this moment for the formulation of Italian Digital Agenda in June that will be mainly related to

– Hi-capacity telecommunication networks

– Cloud Computing / Data Centers

With, we hope, some attention to cyber security…

(Study Group on NCSS)

Page 10: 2 S.panzieri

Prof. Stefano Panzieri 9

National/Governmental CERTs

• COM(2011)163 • COMMUNICATION FROM THE COMMISSION TO THE EUROPEAN PARLIAMENT, THE

COUNCIL, THE EUROPEAN ECONOMIC AND SOCIAL COMMITTEE AND THE COMMITTEE OF THE REGIONS on Critical Information Infrastructure Protection ‘Achievements and next steps: towards global cyber-security’

• CIIP ACTION PLAN: Action for Preparedness and prevention: • The European Public-Private Partnership for Resilience (EP3R): it aims at fostering

the cooperation between the public and the private sectors on strategic EU security and resilience policy issues. ENISA played a facilitating role for the activities of EP3R.

• [Have been developed] the minimum set of baseline capabilities and services and related policy recommendations for National/Governmental CERTs to function effectively and act as the key component of national capability for preparedness, information sharing, coordination and response. These results will be a building block to establish, with the support of ENISA, a network of well-functioning National/Governmental CERTs in all Member States by 2012. Such a network will be the backbone of the European Information Sharing and Alert System (EISAS) for citizens and SMEs, to be built with national resources and capabilities by 2013.

Page 11: 2 S.panzieri

Prof. Stefano Panzieri 10

Public Private Partnership

• A Public Private Partnership can be the answer for:

– Developing of common intelligence models (how manage data)

– Information sharing

– Definition of common (hence effective) answers to cyber threat

– Managing a CERT able to give early warnings (easier if participated by private sector)

– Information exchange about governmental studies as well as industrial vulnerabilities

– Definition of prevention actions in the private sector

– Divulgation of best practices in private sector

– Evaluation of economic losses

– Public opinion

– Education

Page 12: 2 S.panzieri

Prof. Stefano Panzieri 11

ENISA Good practice guide on PPP

• ENISA, Cooperative Models for Effective Public Private Partnership – Good Practice Guide, 2011.

• Some good reasons to participate in a PPP for the private sector:

– The organization recognize that the impact of a problem goes beyond the boundaries of the organization itself

– Non senior management in the organization to tackle with security problems

– The National (Cyber) Security Strategy is not adequate

– The organization want influence the upcoming N(C)SS or on the sector regulation

– An organization want to better understand its vulnerabilities

– The organization recognize that the information sharing is too low

– There is a lack of trust between companies of the same sector

Page 13: 2 S.panzieri

Prof. Stefano Panzieri 12

FP7 - CockpitCI

• CockpitCI aims to improve the resilience and dependability of Critical Infrastructures (CIs) by the automatic detection of cyber threats and the sharing of real-time information about attacks among CI owners. This objective highlights the importance of achieving cyber awareness and to achieve it beyond the boundary of the single CI. A particular importance is given to the sharing of real-time information among CI

aims to improve the resilience and dependability of Critical Infrastructures (CIs) by the automatic detection of cyber threats and the sharing of real-time information about attacks among CI owners. This objective highlights the importance of achieving cyber awareness and to achieve it beyond the boundary of the single CI. A particular importance is given to the

Page 14: 2 S.panzieri

Prof. Stefano Panzieri 13

• CockpitCI aims to identify, in real time, the CI functionalities impacted by cyber-attacks and assess the degradation of CI delivered services. This information should be conveyed to SCADA and security operators to greatly increase their awareness of the situation and improve their capability to handle the situation

FP7 - CockpitCI

Page 15: 2 S.panzieri

Prof. Stefano Panzieri 14

THE MIXED HOLISTIC-REDUCTIONISTIC MODELLING PERSPECTIVE

Prof. Stefano Panzieri

Inter-Infrastructure Homogeneous layer capturing interdependencies

Expressions of both holistic and red. models

Behaviours (physical or logical or political) not emerging fro R layer

Page 16: 2 S.panzieri

Prof. Stefano Panzieri 15

Internet IT Network

Field Network 1 (AS)

Field Network N (AS)

HMIConsole

HIDS

Operations Network

Correlator

Main Correlator

HoneyPot RDBMS

HIDS

Master Stations

HIDS

HoneyPot

NIDSField

HMIConsole

HIDS

HB

RTU N

RTU 1

FieldbusHoneyPot

HB

RTU N

RTU 1

FieldbusHoneyPot

NIDSIT

NIDSOP

Security Management Platfortm

NIDSField

FSM

Shadow RTU 1

Shadow RTU 1

Shadow RTU 1

Shadow RTU 1

BMSCorr.

B.RulesHB

Corr.

BMSCorr.

B.RulesHB

Corr.Correlator

HB

AS – Autonomous SystemBMS – Backup Master StationFSM – Field Security ManagementHB – HeartBeatHIDS – Host Intrusion Detection SystemHMI – Human Machine InterfaceNIDS – Network Intrusion Detection SystemRTU – Remote Terminal Unit

FSM

SCADA cyber attack detection

Page 17: 2 S.panzieri

Prof. Stefano Panzieri 16

FROM OLISTIC ASSESSMENT TO IMPACT EVALUATION

DOS ATTACK (PATHS and TARGETS)

FAULTED ELEMENT (LOAD FLOW SIMULATOR)

IMPACT ASSESSMENT (CISIA – NS2 – I2SIM - ???)

EXTENDED S.AW.

WORMS (SIR PROPAGATION)

POSSIBLE EFFECTS

HONEYPOT (NETWORK UNDER ATTACK)

SHADOW RTUs (RTU ATTACKED)

RISK LEVEL

SCADA Operator

SECURITY Operator

NATIONAL CONTROL

ROOM (CERT)

OTHER CIs

OPERATIVE LEVEL EVALUATION

CYBER DETECTION

CYBER DETECTION

CYBER DETECTION

CYBER DETECTION

FIELD ADAPTORS

FIELD ADAPTORS

NATIONAL CERT

PHYSICAL SECURITY (DATA MINING)

FIELD ADAPTORS

Page 18: 2 S.panzieri

Prof. Stefano Panzieri 17

• CockpitCI aims to leverage the ability of field equipment to counteract cyber-attacks by deploying preservation and shielding strategies able to guarantee the required safety. This capability should be carefully evaluated because CI operators fear that “local automatic reactions may happen during “normal” activities inducing catastrophic behaviour”.

• CockpitCI aims to classify the associated risk level, broadcast an alert at different security levels and activate a strategy of containment of the possible consequences of cyber-attacks.

FP7 - CockpitCI

Page 19: 2 S.panzieri

Prof. Stefano Panzieri 18

IMPROVED RTU AWARENESS

• RTUs can be puzzled because they have no idea of • what they are doing

• why

• with whom

• We need to increase the awareness of RTUs or build for them the required awareness • Local misuse/anomaly detection

• Process modeling

• Central warning dispatching

• Hence, some special behaviors could bet triggered • Normal operation

• Alerted

• Double check commands

• Disconnected for a time (fail safe outputs)

• BMS (extended emergency shutdown)

• […]

Page 20: 2 S.panzieri

Prof. Stefano Panzieri 19