15
@codenomicon CYBER SECURITY FOR CRITICAL INFRASTRUCTURE Mohit Rampal - Regional Manager South Asia

Cyber Security for Critical Infrastrucutre-ppt

Embed Size (px)

Citation preview

Page 1: Cyber Security for Critical Infrastrucutre-ppt

@codenomicon

CYBER SECURITY FOR CRITICAL INFRASTRUCTURE

Mohit Rampal - Regional Manager South Asia

Page 2: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

2

• Cyber Attacks: Internet-based incidents involving politically or financially motivated attacks on information and information systems.

• Zero-day Vulnerabilities, Or Unknown Vulnerabilities: Software flaws that make exploitation and other illegal activities towards information systems possible

• Proactive Cyber Defense: acting in anticipation to oppose an attack against computers and networks.

CYBER THREATS : MORE PROFESSIONAL & SOPHISTICATED

Page 3: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

3

• Zero-day exploits, the biggest threat to security as there are no defenses against them and the attacks can go unnoticed.

• Security landscape is changing: Governments, critical infrastructure providers and defense organizations increasingly rely on the Internet to perform mission-critical operations

• India , a soft state , 7500 km’s of coastline running through 9 states and 4 union territories

• Proactive Cyber Defence or active cyber defence (ACD) Is the Key way forward

• US, China etc. Spending on Cyber Security for Homeland defense & increase of Cyber Units & Cyber Warriors

• Cybercrime costs the United States approximately $100 billion annually

• Vulnerable Verticals : Energy & Utilities, Financial Organizations, Telecom, Defense & Paramilitary Forces, Manufacturing etc

WHY CYBER DEFENSE

Page 4: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

4

LESSONS FROM PAST CYBER ATTACKS

•Cyber attacks accompany physical attacks

•Cyber attacks are increasing in volume, sophistication, and coordination

•Cyber attacks are attracted to high-value targets

4

Page 5: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

5

CHANGING LANDSCAPE IN ICS THREATS…

Page 6: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

6

BRAVE NEW WORLD

WHAT WE HAD THEN WHAT WE HAVE NOW

Corporate private servers and data storage

Distributed data processing and storage

Controlled access: Corporate issued laptops, closed ecosystem handsets…

Ubiquitous access: BYOD, open platforms

Isolated domains: Industrial Control Systems, Healthcare devices, Mil/Gov Networks

Previously isolated domains getting interconnected: Remote connections to ICS systems, robots for remote surgery

Proprietary protocols for communication and custom made HW/SW

IP protocols, COTS HW, Open Source and commercial libraries for SW

What about our defenses

Antivirus, Firewall, IPS ???

Page 7: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

7

INDIA AND APAC ABUSE

09-10-2015 ©Copyright Codenomicon 2011 | Confidential

7

Page 8: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

8

SECURITY IN ICS

Designed to be isolated Connectivity over serial analogue circuits = Attacker needed to gain physical access to carry out attack Protocol designed for communication between trusted devices Protocols contain very little security features, such as encryption

Page 9: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

9

SECURITY IN ICS

• ICS systems interconnected with outside world using IP-based communications and control networks were integrated into larger corporate networks… • Reducing costs

• Improve efficiency

• Exposure to external attacks • Almost all ICS devices are either directly or indirectly connected to internet

• New Attack Surfaces

• The need to separate the corporate and production network is well known

– Often leads to ignorance of other equally critical interfaces

• Trusted third parties still having access to ICS network…

– Vendors?, System integrators?, Control engineers?

• Not forgetting, WebHMI, Wireless connection exposure

• Compromising security through end points

10/9/2015 9

Page 10: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

10

THE KNOWN AND THE UNKNOWN

Known Vulnerability Management Known Vulnerability Management

Unknown Vulnerability Management (UVM) Unknown Vulnerability Management (UVM)

Vulnerability Management

Total Vulnerability Management

SAST Approach 1980-

PC Lint, OSS, Coverity, Fortify, IBM, Microsoft ...

Whitebox testing

DAST Approach 2000-

Fuzzing: Codenomicon

Defensics, Peach, Sulley

Blackbox testing

1995-2000 Satan/Saint

1999- Nessus, ISS

2000- Qualys, HP, IBM, Symantec ... 2013: Codenomicon AppCheck

Re

acti

ve

Pro

acti

ve

Bottom line: All systems have vulnerabilities. - Both complimentary categories needs to be covered.

Page 11: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

11

11

UNKNOWN VULNERABILITY MANAGEMENT (UVM)

• Another name:

Zero-Day Vulnerability Management

• Process of: • Detecting attack vectors

• Finding zero-day vulnerabilities

• Building defenses

• Performing patch verification

• Deployment in one big security push

Page 12: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

12

• A testing technique where purposefully unexpected and/or invalid input data is fed to tested system in hope to find robustness and security problems

• Mutation/Template-Based Fuzzing • Quality of tests is based on the used template (seed) and mutation

technique

• Slow to execute, least bugs found

• Generational/Specification-Based Fuzzing • Full test coverage, as the model

is built from specification

• Fast to execute, most bugs found

WHAT IS FUZZING & TYPES OF FUZZING TECHNOLOGIES

Page 13: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

13

FUZZ TESTING MATURITY MODEL (FTMM)

• Based on ISO/IEC 15504 framework • Has 5 maturity levels (+ zero level for immature)

• Created to help in understanding the FTMM of a computer system or software • Differentiates system and interface level

• Does NOT address organizational or process maturity (BSIMM, Microsoft SDLC, Cisco SDLC, etc. should be used for this)

• Each level defines • Types of fuzz that needs to be performed

• Time that has to be spent fuzzing

• Amount of fuzz tests needed

• Additional metrics required to reach the level

Page 14: Cyber Security for Critical Infrastrucutre-ppt

10/9/2015 © 2014 All Rights Reserved

14

FTMM MATURITY LEVELS

0 – Immature

1 – Initial

2 - Defined

3 - Integrated

4 – Managed

Typ

es

of

Fuzz

ing

req

uir

ed

5 - Optimized Fu

zz t

ests

req

uir

ed

Fuzz

tim

e re

qu

ired

Att

ack

surf

ace

anal

ysis

req

uir

ed

Typ

es o

f in

stru

men

tati

on

re

qu

ired

Typ

es

of

failu

res

allo

wed

to

rem

ain

Fuzz

ing

nee

ds

to b

e p

art

of

org

aniz

atio

ns

SD

LC

Test

har

ne

ss in

tegr

atio

n

Man

ual

exe

cuti

on

Oth

er r

equ

irem

ents

Test

rep

ort

mu

st g

ener

ated

G (T)

O,A,D G, T, R

G and T

G, T, R

G) Generational, model based fuzzer T) Template/Mutational Fuzzer R) Random Fuzzer 1) Must use two different fuzzers 2) For each type of fuzzing

Infinite (2

1 hour

1000000

1000000 (G) 5000000 (T)

Infinite (2

100000

8 hours

8 hours

30 days

7 days

AS) non-DsS assertions, must be noted M) Must be mandatorily done Y) It is required that tests are also manually executed U) Must use two different fuzzers for each type B) Baseline test configuration must be documented

T or G O AS, TR

A

A

O

B

none M

X, C none

X TR

O) Human observation A) Automated instrumentation required D) Debugger integrated monitoring X) Required C) Code coverage/binary analysis required TR) Transient errors allowed, must be noted

TR

X

M

X

Y

X

X

X

X

X

B, U

X

X

X B

Page 15: Cyber Security for Critical Infrastrucutre-ppt

THANK YOU – QUESTIONS?