18
1 Industrial Control System Cybersecurity Overview

aeSolutions IC Overview r2

Embed Size (px)

Citation preview

Page 1: aeSolutions IC Overview r2

1

Industrial Control System

Cybersecurity

Overview

Page 2: aeSolutions IC Overview r2

2

About aeSolutions

• Engineering and consulting services for process safety, industrial cybersecurity and critical automation systems since 1998

• Core Competencies:

• Process Safety• Industrial Cybersecurity• SIS Engineering• SIS, BMS, F&G Integration• Alarm Management• Automation System Engineering• Process Safety Lifecycle Software

• 170 employees across 3 offices, with additional satellite presence across the nation in 21 states.

• Comprehensive project lifecycle services

• 14,000 sq ft FM-Approved/UL 508a-certified panel fabrication

facility

• Siemens, Rockwell and Schneider Electric Partner

Page 3: aeSolutions IC Overview r2

3

John A. Cusimano

• Director of ICS Cybersecurity Solutions for aeSolutions

• 25 years experience in industrial automation

• Kodak, Moore Products, Siemens, exida, aeSolutions

• Specialization in:

• Process Safety

• Safety Instrumented Systems (BMS, F&G)

• High-availability systems

• Industrial Networking

• ICS Cybersecurity

• Certifications:

• CFSE, Certified Functional Safety Expert

• CISSP, Certified Information Systems Security Professional

• GICSP, Global Industrial Control Security Professional

• ISA99/IEC 62443 Cybersecurity Fundamentals Specialist

Page 4: aeSolutions IC Overview r2

4

Industry Associations

• ISA S99 Committee

− WG4 TG3 Chair (62443-3-2 Security Risk Assessment)

− TG6 Co-Chair (62443-4-1 Product Development)

• ISA S84 Committee, WG9 (TR84.00.09)

• US Expert to IEC TC65 WG10 (62443-2-4)

• Lead developer/instructor for ISA IC32 Training Course

• ISA Security Compliance Institute, technical steering committee

• ISA Safety & Security Division – Security Co-chair

• ICSJWG Workforce Development & Vendor Subgroups

• Author of Public Safety Canada “TR12-002 Industrial Control

System (ICS) Cyber Security: Recommended Best Practices”

Page 5: aeSolutions IC Overview r2

5

Our Approach

Page 6: aeSolutions IC Overview r2

6

Understanding Risk is Fundamental to Determining How to

Best Protect Our Systems

• We must first understand the risk• Identify the critical assets

• Determine the realistic threats

• Identify existing vulnerabilities

• Understand the consequence of compromise

• Assess effectiveness of current safeguards

• Develop a plan to address unacceptable risk• Recommend existing countermeasures

• Recommend additional countermeasures

• Recommend changes to current policies and procedures

• Prioritize recommendations (based upon relative risk)

• Evaluate cost / complexity versus effectiveness

Cyber security is all about RISK MANAGEMENT!!!

Page 7: aeSolutions IC Overview r2

7

Cybersecurity Program

Cybersecurity Philosophy

Cybersecurity Culture

Strategic Plan

Policy & Procedures Awareness & Training Compliance & Audit

Site Vulnerability Assessments Risk Assessments Evaluate Mitigations Engineering Standards

Implementation Plan

Do

AssessAdjust

Plan

Page 8: aeSolutions IC Overview r2

8

Basic Process

• Scope and document system(s)

• Vulnerability/gap assessment

• Partition the system

• Risk assessment workshop

• Prioritization of recommendations

• Implementation roadmap Polic

ies,

pro

ced

ure

s,

stan

dar

ds,

tra

inin

g

Page 9: aeSolutions IC Overview r2

9

“Cyber PHA” Risk Assessment Methodology

• Builds upon well-established PHA (e.g. HAZOP / LOPA) methodologies

• Leverages existing PHAs

– Extract cyber initiating events and associated consequences

– Identify cyber vulnerable IPLs and safeguards

• Aligns with corporate risk matrix

• Being documented in ISA 62443-3-2

Page 10: aeSolutions IC Overview r2

10

Cyber PHA Example

FS-PES

`

BPCS

Engineering

Workstation

Control PES

Operator

Consoles

Operator

Consoles

Corporate

WAN

Business LAN

PCN

Business

LAN

`

SIS

Engineering

Workstation

BPCS HMI

PCN

PCN

DCS Server DCS Server

Equipment Room

Field

Control Room

IT Data Center

Data

Historian

Domain

Controller

Enterprise

Firewall

Page 11: aeSolutions IC Overview r2

11

Cyber PHA Example

Example © aeSolutions 2014

Page 12: aeSolutions IC Overview r2

12

Initial Zone & Conduit Diagram

Page 13: aeSolutions IC Overview r2

13

Cybersecurity Strategy Considerations

• Assemble Core Team

– Internal• Cross functional (IT, Operations, Engineering, HSE, Corp Security)

– External Partner• Experience , Reputation

• External benchmarks, Independent view

• Core focus, proven work process

• Standards based approach – ISA 99.02/ IEC 62443, NIST

• Develop an “as-built” model of the entire system

• Phased Approach (High Level Assessment first)

• Cross training opportunity/ common language(e.g. field trip)

• Document deliverables

• Sustainable processes and systems

Page 14: aeSolutions IC Overview r2

14

Typical Risk Assessment Deliverables

– Plant ICS “security” architecture drawings

– Cyber security requirement specification

– Cyber Vulnerability Assessments

– Peer comparison and gap analysis

– Zone and Conduit model

– Deployment strategy

– Cyber security policy and standards

Page 15: aeSolutions IC Overview r2

15

aeSolutions ICS Cybersecurity Expertise

• Strong process industry and industrial automation background

• Experience in oil & gas, pipeline, chemical /petrochemical, power and water/wastewater industries

• Extensive involvement in industrial cybersecurity organizations and standards committees (e.g. ISA, AIChE, IEC, NIST, ISASecure)

• Instructors for ICS Cybersecurity training (private and ISA IC32)

• Experience in development and implementation of ICS cybersecurity management programs

• Certifications

– Certified Information System Security Professional (CISSP)

– Global Industrial Cyber Security Professional (GICSP)

– ISA 99 / IEC 62443 Cybersecurity Fundamentals Specialist

– Certified Ethical Hacker (C|EH)

Page 16: aeSolutions IC Overview r2

16

Oil & Gas / Chemical Clients

• Air Products

• Alyeska Pipeline

• Chevron

• CNRL

• ConocoPhillips

• Dow

• FMC

• Kraton Polymers

• Merck

• Praxair

• Sasol

• Sunoco Logistics

• Syncrude

• Valspar

Page 17: aeSolutions IC Overview r2

17

Industrial Cybersecurity Lifecycle Services

Assess

• Cybersecurity Gap Assessment

• Vulnerability Assessment (CSVA)

• Risk Assessment (Cyber PHA)

Define

• Network & Dataflow Diagrams

• Asset Inventory

• Zone & Conduit Models

• Cybersecurity Requirements Specification

Design, Commission, Implement

• Network Architecture Design

• Firewall Design / Commissioning

• Access Control

• Remote Access

• Wireless Communications

• Security Hardening

• Cybersecurity Acceptance Testing

Operations & Maintenance

• Intrusion Detection Design

• Change Management

• Patch Management

• Malware Prevention

• Backup / Restore

CorporateGovernance

• Cyber Security Management System (CSMS) Development

• Deployment Strategy Consulting

• Standard Training (ISA)

• Customized Training & Awareness

• ICS Cybersecurity Audits

Process Safety & Security Lifecycle

Page 18: aeSolutions IC Overview r2

18

Why aeSolutions?

• Deep expertise in critical industrial processes and critical automation systems

• Focus on Oil & Gas / Petrochemical/Specialty Chemical industries

• Understand the relationships between process safety, cybersecurity, alarm management, SIS design

• Comprehensive automation lifecycle services

• Professional, high-quality solutions

• Expertise leveraged into work products