50
Critical Infrastructure and Automated Control Systems Security: A Strategy for Securing Against Cyber Attacks Dr. Thomas L. Pigg Dr. Thomas L. Pigg Director of the Tennessee CSEC Director of the Tennessee CSEC

CSEC Mission

  • Upload
    dulcea

  • View
    110

  • Download
    0

Embed Size (px)

DESCRIPTION

Critical Infrastructure and Automated Control Systems Security: A Strategy for Securing Against Cyber Attacks Dr. Thomas L. Pigg Director of the Tennessee CSEC. CSEC Mission. - PowerPoint PPT Presentation

Citation preview

Page 1: CSEC Mission

Critical Infrastructure and Automated Control Systems Security: A

Strategy for Securing Against Cyber Attacks

Dr. Thomas L. Pigg Dr. Thomas L. Pigg Director of the Tennessee CSECDirector of the Tennessee CSEC

Page 2: CSEC Mission

CSECMission

• The Cyber Security Education Consortium is a National Science Foundation ATE Regional Center of Excellence dedicated to building an information security workforce who will play a critical role in implementing the national strategy to secure cyberspace.

Page 3: CSEC Mission

CSEC Sites

Page 4: CSEC Mission

Tennessee CSEC Mission

• Phase 1– Train the trainer

• Phase 2– Develop Student

Curriculum/Courses/Concentrations

• Phase 3 – Develop Partnerships with

Business, Industry and Government

Page 5: CSEC Mission

Core Train the Core Train the Trainer Trainer

WorkshopsWorkshops

• Principles of Information Assurance

• Network Security• Enterprise Security

Management • Secure E-Commerce • Digital Forensics

Page 6: CSEC Mission

New CSEC Courses

• Automation and Control Systems– Control Systems Architecture– Control Systems Software Applications– Control Systems Security I and II

• Mobile Communications Devices– Mobile Device Architecture– Mobile Device Programming – Mobile Device Hardware

• Secure Coding– Secure Programming I and II– Software Testing – Software Security

Page 7: CSEC Mission

• SCADA(Supervisory Control and Data Acquisition)

• DCS (Distributed Control Systems)

• ICS (Industrial Control Systems)

• BAS (Building Automation Systems)

• PLC (Programmable Logic Controllers)

• Smart Grid

What are What are Control SystemsControl Systems

Page 8: CSEC Mission

Critical Critical InfrastructuresInfrastructures

• Agriculture & Food

• Banking & Finance

• Chemical

• Commercial Facilities

• Communications

• Critical Manufacturing

Page 9: CSEC Mission

Critical Critical InfrastructuresInfrastructures

• Dams

• Defense Industrial Base

• Emergency Services

• Energy

• Government Facilities

• Healthcare & Public Health

Page 10: CSEC Mission

Critical Critical InfrastructuresInfrastructures

• Information Technology

• National Monuments & Icons

• Nuclear Reactors, Materials & Waste

• Postal & Shipping

• Transportation Systems

• Water

Page 11: CSEC Mission

Key Critical Key Critical InfrastructuresInfrastructures

• Key Sectors for Control Systems Security

• Energy (Electricity, Oil, and Natural Gas)

• Water & Wastewater

• Nuclear

• Chemical

• Dams

• Transportation

• Critical Manufacturing

Page 12: CSEC Mission

Current Trends Current Trends in Control in Control SystemsSystems

• Continued move to open protocols

• Continued move to more COTS operating systems & applications

• More remote control & management

• More network access to systems

• More widespread use of wireless

Page 13: CSEC Mission

Current State of Current State of SecuritySecurity

• Control Systems protocols with little or no security

• Migration to TCP/IP networks with its inherent vulnerabilities

• Interconnection with enterprise networks

• Old operating systems & applications with poor patching practices

• Little monitoring of Control Systems for attacks being done

• Vendors not securing their product offerings adequately

Page 14: CSEC Mission

Current State of Current State of SecuritySecurity

• Increased risk of insider attacks by outsourced IT services

• Experts seeing increased interest in Control Systems by terrorists & foreign governments

• Evidence that nation-states have been taking remote control of Control Systems

• Denial by some companies that there is a problem

• Some companies are now starting to see the need and address the issues

Page 15: CSEC Mission

Real Control System Security

Breaches• Diamler-Chrysler Plant Shutdown

– Zotob worm – August 2005

• First Energy’s Nuclear Plant Infestation– Slammer worm – January 2003

• Maroochy Shire Sewage– Release of millions of gallons of

sewage - January 2000 – Perpetrator accessed system 46 times

Page 17: CSEC Mission

AURORA Test

Page 19: CSEC Mission

Current ThreatsCurrent Threats

• Internet Based Threats

• Worms

• Viruses

• Denial of Service Attacks

• Targeted Attacks

• Terrorist

• Foreign Nation

• Former Insider

Page 20: CSEC Mission

Current ThreatsCurrent Threats

• Physical Threats

• Natural Disasters

• Man-made Disasters (War, Riots, etc.)

• Terrorist Attacks

Page 21: CSEC Mission

Current ThreatsCurrent Threats

• Internal Threats

• Disgruntled employee

• On-site contractor

• Unintentional attack

• IT worker

• Curious Employee

Page 22: CSEC Mission

Current ThreatsCurrent Threats

• Targeted Attacks

• Can use any threat & threat agent

• Internet

• Internal

• Physical

• Social Engineering

• Etc.

Page 23: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• CIA

• Confidentiality

• Integrity

• Availability

Page 24: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• Technical Controls

• Firewalls

• IDS

• Smart Cards

• Access Controls

Page 25: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• Administrative Controls

• Security Policies & Procedures

• Security Awareness

• People

Page 26: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• TCP/IP

• Patches & Updates

• Intrusion Detection Systems

• Control Systems Monitoring

• Signatures for Control Systems

• Anti-Virus Software

Page 27: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• Access Control Methods

• Passwords

• Multi-Factor

• Smart Cards

• RFID

• Proximity

• Biometric

Page 28: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• Authentication

• Active Directory

• Control Systems Integration

• Certificates

Page 29: CSEC Mission

IT Security for IT Security for Control SystemsControl Systems

• Authorization

• Role Based

• Area of Responsibility

• Station Access Control

Page 30: CSEC Mission

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Network based

• Inspects all network traffic on that segment (incoming & outgoing)

• Uses pattern based signatures

• Anomaly based uses baseline

• Uses network tap or mirrored port

• Monitors multiple hosts

Page 31: CSEC Mission

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Host based

• Inspects network traffic for a specific host

• Better at protecting a machines specific function

• Misses LAN based attacks

Page 32: CSEC Mission

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Commercial

• Pre-configured fee based IDS

• CA eTrust

• McAfee IntruShield & Entercept

• SonicWall

• StillSecure Strata Guard

Page 33: CSEC Mission

Using an IDS Using an IDS with a Control with a Control

SystemSystem• Open Source

• Snort

• Base

• Sguil – Real-time GUI interface

• OSSEC (Open Source Host-based Intrusion Detection System)

Page 34: CSEC Mission

Using an IDS Using an IDS with a Control with a Control

SystemSystem• IPS

• Intrusion Prevention System

• Automated Response

• Dynamically change firewall ruleset

• NIST IDS Guide (SP800-94)

Page 35: CSEC Mission

Security Security SolutionsSolutions

• Network Segmentation

• DMZ Design

• Can use ISA S99 standard as guide

• Design to protect each segment

• Allows for centralized services

Page 36: CSEC Mission

Security Security SolutionsSolutions

• Network Segmentation

• Centralized Services

• Anti-Virus

• Updates & Patches

• Active Directory Services

• Data Historians

• System Management

Page 37: CSEC Mission

Security Security SolutionsSolutions

• Secure Remote Access

• Secured VPN connections

• Escorted Access for vendors

• Require secured tokens

• Call in by vendor with request

• Issue 1-time code for access

Page 38: CSEC Mission

Security Security SolutionsSolutions

• IDS/IPS for Control Systems

• Which one to use?

• Where to use?

• HIDS or Application Whitelisting?

• UTM – Unified Threat Management

Page 39: CSEC Mission

Security Security SolutionsSolutions

• Security Event Monitoring & Logging

• Network Devices

• Switches, Routers, Firewalls, IDS

• Computing Devices

• Historians, Servers, Operator consoles

• Field Devices

• RTU, PLC, Telemetry Devices, Embedded Devices

Page 40: CSEC Mission

Security Security SolutionsSolutions

• Security Framework

• NIPP

• NERC CIP

• CSSP DHS

• NIST

Page 41: CSEC Mission

Security Security SolutionsSolutions

Page 42: CSEC Mission

Security Security SolutionsSolutions

Page 43: CSEC Mission

Control Systems Control Systems Security Security

InitiativesInitiatives• NIPP (

National Infrastructure Protection Plan)

• CIPAC (Critical Infrastructure Partnership Advisory Council)

• ICSJWG (Industrial Control Systems Joint Working Group)

• ICS-Cert (Industrial Control Systems Cyber Emergency Response Team)

• Strategy for Securing Control Systems

Page 44: CSEC Mission

Control Systems Control Systems Security Security

InitiativesInitiatives• CSSP (Control Systems Security Program)

• Idaho National Laboratory

• National SCADA Test Bed Program

• SCADA & Control Systems Procurement Project

• Smart Grid Interoperability Standards Project

• UK NISCC - Now CPNI (Centre for the Protection of National Infrastructure)

• PCSF/SCySAG (SCADA Cyber Self Assessment Working Group) - Historical

Page 45: CSEC Mission

Control Systems Control Systems RegulationsRegulations

• NERC (North American Electric Reliability Council)

• Develop & enforce reliability standards

• CIDX/ACC – Now ChemITC (American Chemistry Council)

• CFATS guidance & assessment tools

Page 46: CSEC Mission

Control Systems Control Systems RegulationsRegulations

• ISA SP99 (Industrial Automation & Control System Security) – International Society of Automation

• Part 1 Standard: Concepts, Terminology & Models

• Part 2 Standard: Establishing an Industrial Automation & Control Systems Security Program

• Part 3 Standard: Technical Requirements for Industrial Control Systems (Currently in development

Page 47: CSEC Mission

Control Systems Control Systems RegulationsRegulations

• AGA 12 – Discontinued and used in IEEE 1711 Trial Standard

• Encryption of Serial Communications

• Serial Encrypting Transceivers now available

• API Standard 1164 (American Petroleum Institute)

• Standard on SCADA security for pipelines

• NIST – National Institute of Standards and Technology

Page 48: CSEC Mission

Control Systems Control Systems RegulationsRegulations

• SP800-82 – Guide to Industrial Control Systems (ICS) Security

• NIST initiative on Critical Infrastructure Protection (CIP)

• Uses ISO 15408 Common Criteria methodology

Page 49: CSEC Mission

Control System Security

Takeaway• The 7 Things Every Plant Manager Should

Know About Control System Security – John Cusimano – Director of Security Solutions for exida– http://www.exida.com/images/uploads/

The_7_Things_Every_Plant_Manager_Should_Know_About_Control_System_Security.pdf

Page 50: CSEC Mission

Contact Information

Dr. Thomas L. PiggProfessor of Computer Information

SystemsJackson State Community College2046 N. ParkwayJackson, TN 38305(731) 424-3520 Ext. [email protected]