29
GE Grid Solutions John D. McDonald, P.E. Smart Grid Business Development Leader – North America Global Smart Grid Strategy Group IEEE Life Fellow IEEE PES Substations Committee Chair (2000-2001) IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering Committee CIGRE USNC VP, Technical Activities IEEE PES Green Mountain Chapter June 8, 2017 Cyber Security

Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

GE Grid Solutions

John D. McDonald, P.E.Smart Grid Business Development Leader – North AmericaGlobal Smart Grid Strategy Group

IEEE Life FellowIEEE PES Substations Committee Chair (2000-2001)IEEE PES President (2006-2007)IEEE Division VII Director (2008-2009)IEEE-SA Board of Governors (2010-2011)IEEE Smart Grid Steering CommitteeCIGRE USNC VP, Technical Activities

IEEE PES Green Mountain ChapterJune 8, 2017

Cyber Security

Page 2: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

2 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Cyber Security Introduction

Page 3: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

3 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Failure Mode and Effects Analysis of Security

1. Function: Describe the function to be analyzed to secure

against a specific cyber incident.

2. Failure Mode: Understanding the threat

3. Failure Causes: Understanding the types of attacks

4. Identify Failure Effects and Criticality: How serious are the

consequences

5. Understand Solutions: What are the current methods of

securing against the attack?

6. Match solution to analysis:

Establish a Security system to

match the analysis

Page 4: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

4 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Understanding the Threat

• Protecting against -– The Hacker– The Vandal– The Terrorist– The Disgruntled Employee– The Competitor– The Customer– The Security System

Types of attack -

• Eavesdropping

• Traffic Analysis

• Replaying

• Spoofing

• Cracking

• Social Engineering

• Denial of Service

• Destruction

• Reconfigure

• Malware

Page 5: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

5 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Understanding Consequences and Risks

• Analysis of Areas of Attack:• Control – Take control of switches (meters or

substations)• Information – Interrupt or corrupt data flow• Configuration – Change configuration to open

door for future action• Safety – Compromise safety of people or things

Page 6: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

6 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Protect – Detect - Respond

• Need to properly implement . . .– Boarder/Network Security– Intrusion Detection System (Passive) – Intrusion Prevention System (Active)– Configuration & Firmware Management– Data Security (Static & Dynamic)– Event Management & Logging– Authentication & Role Based Access Control– Patch Management System

Page 7: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

7 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Factors of Authentication

1. What You Know – Passwords are widely used to identify a User, but only verify that somebody knows the password.

2. What You Have – Digital certificates in the User's computer add more security than a password, and smart cards verify that Users have a physical token in their possession, but either can be stolen.

3. What You Are – Biometrics such as fingerprints and iris recognition are more difficult but not impossible to forge.

4. What You Do – Dynamic biometrics such as hand writing a signature and voice recognition are the most secure; however, replay attacks can fool the system.

Page 8: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

8 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Summary

NERC and Corporate Security RequirementsFunctions to ProtectUnderstanding the threatUnderstanding the types of attacksHow likely and serious are the consequencesSecurity methods Deploy a matching solution

Page 9: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

9 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Case Study: Hacking a GE Industrial Ethernet

Switch

Page 10: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

10 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Reputation Effects from Media and Tech Conferences

Page 11: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

11 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Security (Hacking) Demo

ML800 Managed

Switch• A hard-coded session key can allow a

user to access administrative interface without authentication.

• This demo will show the benefit of the patch / firmware update. We will:

• Perform Man-in-the-Middle attack• Use the hard-coded session key

to gain administrative access• Repeat process on patched

ML800

Page 12: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

12 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Thank You!

Page 13: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

13 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Vulnerability Messages

Page 14: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

14 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Vulnerability Response – ML800 Series

CVSS = 10.0

Page 15: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

15 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Lessons Learned

• Develop a good rapport with the Researcher(s)

• Researcher’s findings are often “Low Hanging Fruit”

• Security assessment, afterwards revealed additional security vulnerabilities

• We spent a lot of time and effort –working with researchers, PSIRT, ICS-CERT, etc. - that could have been avoided

Page 16: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

16 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Product - Secure Development Lifecycle (SDL)

Design & Architecture

Design Security into the Products•Security Requirements•Identify roles & malicious roles

•Develop use and abuse cases

•Identify security features

•Threat Modeling

Design & Architecture

Design Security into the Products•Security Requirements•Identify roles & malicious roles

•Develop use and abuse cases

•Identify security features

•Threat Modeling

Development

Build Security into the Product•Training for Developers

•Use Secure Coding Practice (e.g. OWASP)

•Build with Static Code Analysis Tool

Development

Build Security into the Product•Training for Developers

•Use Secure Coding Practice (e.g. OWASP)

•Build with Static Code Analysis Tool

Test

Test for Security & Resiliency•Dynamic security testing (Fuzzing); i.e., Achilles Communication Certification (ACC)

•Security Assessments or Penetration Testing

Test

Test for Security & Resiliency•Dynamic security testing (Fuzzing); i.e., Achilles Communication Certification (ACC)

•Security Assessments or Penetration Testing

Manufacture

Securely Manufacture the Product•Follow stringent manufacturing practices (build as designed)

•Develop and provide secure deployment practices document

Manufacture

Securely Manufacture the Product•Follow stringent manufacturing practices (build as designed)

•Develop and provide secure deployment practices document

IncidentManagement

Manage externally identified issues•Validate report•Develop Remediation Plan

•Provide Updates, Patches, etc.

•Communicate to product owners

IncidentManagement

Manage externally identified issues•Validate report•Develop Remediation Plan

•Provide Updates, Patches, etc.

•Communicate to product owners

Page 17: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

17 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Case Study: Ukraine Power Outage

Page 18: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

18 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Ukraine Power Outage - Summary

What Unscheduled power outages due to cyber-attack against Distribution Systems

When December 23, 2015, lasting 1 – 6 hoursInitial cyber-attack (phishing email) occurred in March 2015

Consequence 3 regional Oblenergos (utilities)225,000 end-consumersRemote control lost for months

Who did it No positive Identification . . .

Why Unknown – many believe it is due to geopolitics in the region

How See next slide ☺

Page 19: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

19 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

2

Attackers’ Location Public Internet Business Network Control System DMZ Control System Substation/Field Consumer

6

7

5

14

12

4

3

15b 15c

189

1316

17

20

19

11

15a

8

>6 Months

10

1

19

Chart & animation created by Matt Yourek, Security Architect at GE Grid Solutions, Software Solutions

Ukraine Power Outage - Summary

1. The attackers gather publicly available information about the utility and its people from internet websites, e.g. LinkedIn, Job Postings, etc.2. They craft a malicious Microsoft Word document with macros that will install BlackEnergy3, a remote access Trojan, when run.3. They send an email to a number of utility employees in a phishing campaign based on the information gathered in Step 1.4. Some of the recipients open the email and its attachment and run the macros, which installs the malware. The malware is used to steal user credentials.5. These credentials are used to access the Domain Server, which contains many other usernames, passwords, and information about other machines in the network.6. The additional information from Step 4 is exfiltrated for further analysis and potential use.7. The attackers need to get to the Control System network. This would typically be done by pivoting through the firewalls and DMZ separating the Business Network from the Control System, but in this case, they find an easier method. They discover a VPN access point that does not require 2-factor authentication and use previously stolen credentials to login.

8. Now in the Control System network, the attackers spend around six months studying the environment, gathering information about connections to field devices, etc.It is likely that some of this time was spent building a mock control system and testing attacks against it that would result in an outage and hamper restoration efforts.

9. One of the first actions taken was to schedule a power outage on network connected Uninterruptable Power Supplies (UPS).10. The attackers also loaded the KillDisk malware component on some of the SCADA servers.11. Ready to begin their attack, the attackers launch a Telephone Denial of Service (TDoS) to block customers reporting outages as well as hamper communication between the regional control centers once the attack begins.

12. They proceed to lockout the keyboards and mice connected to the operator workstations, preventing operators from regaining control when malicious actions are performed.13. Additionally, they changed a number of passwords for key systems.14. The attackers used previously installed remote access tools (such as Remote Desktop) to view the DMS User Interface from their location.15. Using standard DMS functionality, the attackers tripped breakers at more than 50 regional substations while the operators could see it happening, but were unable to intervene. 16. In order to prolong the outage, the attackers wipe some of the RTUs using KillDisk.17. They also upload new firmware to some of the serial-to-Ethernet converters, rendering them unusable. This prevents any remote monitoring or operation of the devices in the field.18. The previously scheduled (Step 8) UPS outage takes place, removing power to the servers in the control room.19. Without power to the SCADA servers or a way to communicate with field devices, the utility has no choice but to send crew to the field to manually operate breakers, restoring power to the consumers and the control center.

20. The servers at the utility begin to come back online, but the previously loaded KillDisk component wipes some of the systems, rendering them unusable.15c This caused ~225k consumers to be without power.15c They attempt to call the utility, but cannot get through.

Page 20: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

20 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Privacy by Design

Page 21: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

21 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Information Technology

Accountable Business Practices

Physical Design &

Infrastructure

Privacy by Design: Trilogy of Applications

Source: Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, Canada

www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf

21

Page 22: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

22 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Privacy by Design: 7 Foundation Principles

1. Proactive not Reactive

2. Privacy as the Default setting

3. Privacy Embedded into Design

4. Full Functionality: Positive-Sum, not Zero-Sum

5. End-to-End Security: Full Lifecycle Protection

6. Visibility and Transparency: Keep it Open

7. Respect for User Privacy: Keep it User-Centric

Source: Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, Canada

www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf

22

Page 23: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

23 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Personal Information on the Smart Grid

• What constitutes “personal information” on the Smart Grid is the subject of

much discussion;

• • Personal information is defined by the Freedom of Information and

Protection of Privacy Act (FIPPA) and the Municipal Freedom of Information

and Protection of Privacy Act (MFIPPA), as “recorded information about an

identifiable individual;”

• • Once it becomes apparent that a Smart Grid technology, system or project

will involve the collection of personal information, either directly or through

some form of data linkage, privacy considerations immediately apply;

• • Digitization - Digital smart meter data, like all digital data, is vulnerable to

accessing, copying, matching, merging and widespread dissemination.

Source: Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, Canada

www.ipc.on.ca/images/Resources/7foundationalprinciples.pdf

23

Page 24: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

24 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Personal Information on the Smart Grid

24

Page 25: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

25 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Best Practices

1. Proactively embed privacy in designs and governance framework

2. Ensure that privacy is the default – no action required to ensure

privacy

3. Privacy a core functionality in the design and architecture

4. Avoid any unnecessary trade-offs to achieve privacy objectives

5. Build in privacy end-to-end, throughout the entire data life cycle

6. Systems must be visible and transparent to consumers

7. Respect consumer privacy

25

Page 26: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

26 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Case Study — Hydro One

Privacy by Design: www.privacybydesign.ca26

Page 27: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

27 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Hydro One – Advanced Distribution System

1. Optimize connection of Distributed Generation (DG) on the Distribution Network

2. Improve Distribution Reliability and Operations

3. Optimize Outage Restoration

4. Optimize Network Asset Planning

27

Page 28: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

28 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Hydro One – Advanced Distribution System

28

Page 29: Cyber Security IEEE PES VT John McDonald 060817.ppt...IEEE PES President (2006-2007) IEEE Division VII Director (2008-2009) IEEE-SA Board of Governors (2010-2011) IEEE Smart Grid Steering

29 /GE /

6/8/2017

GE Proprietary © Copyright 2008 General Electric Company. All rights reserved.

Operationalizing Privacy by Design into ADS

Hydro One – Advanced Distribution System

1. Separation of Domains

Transcription of messages

Message management tools

2. Privacy data between the Domains

Aggregate data according to location not customer name

Critical safety concerns could require tie to customer name

3. Demand Response and Privacy

System must be designed with privacy at it’s core

Manage privacy connecting with external parties such as ISO

4. Load Forecasting

Aggregate meter load on various points on feeder

Remove customer name – use meter location

29