13
Industrial Control Systems & SCADA: Risks & Solutions October 2020 Del Rodillas, MSEE | GICSP | MBA Director, OT Industry Solutions, Palo Alto Networks

Industrial Control Systems & SCADA: Risks & Solutions

  • Upload
    others

  • View
    10

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Industrial Control Systems & SCADA: Risks & Solutions

Industrial Control Systems & SCADA: Risks & Solutions

October 2020Del Rodillas, MSEE | GICSP | MBA

Director, OT Industry Solutions, Palo Alto Networks

Page 2: Industrial Control Systems & SCADA: Risks & Solutions

What are ICS and SCADA?

Industrial networks and systems which sit behind the corporate IT networks of industrial companies (Energy, Utilities, Manufacturing, Transport)

2 | © 2020 Palo Alto Networks, Inc. All rights reserved.

ICS = Industrial Control Systems SCADA = SUPERVISORY CONTROL AND DATA ACQUISITION

● E.g. power plants, substations, factories, oilfields, pipelines, etc ● Part of the OPERATIONAL TECHNOLOGY (OT)● Prioritize Availability and Safety (vs. Confidentiality in IT)● In the past, “air-gapped” from business networks and the internet

INDUSTRIAL PROCESS

Control Station

Process Server

Process Controller

Page 3: Industrial Control Systems & SCADA: Risks & Solutions

Digital Transformation of Electric Utility IT-OT Infrastructure

● Grid Modernization

● IT-OT Integration

● Big-data Analytics

● Industrial IoT

ITDMZ WWWCLOUD,

IIOT

OTControl Centers

OT backboneElectric

Grid

3 | © 2020 Palo Alto Networks, Inc. All Rights Reserved.

Page 4: Industrial Control Systems & SCADA: Risks & Solutions

Electric Utilities OT Assets Provide Critical Services and Information

4 | © 2020 Palo Alto Networks, Inc. All rights reserved.

Transmission/Distribution Power Generation Advanced Metering

● Service - Power delivery● Assets - Switching,

protection, control, transformers, etc.

● Loss of service impact - Financial and human safety /loss of life

● Service - End-user consumption data

● Assets - Concentrators, meters, repeaters

● Loss of service impact - Loss of key operational information (load, billing)

● Service - Power generation ● Assets - Turbine, Fuel,

generator, cooling, etc.● Loss of service impact -

Financial, human safety /loss of life, environment

Page 5: Industrial Control Systems & SCADA: Risks & Solutions

OT Network (EMS, SCADA, GMS, AMI Headend

Threat Model

5 | © 2020 Palo Alto Networks, Inc. All rights reserved.

IT Network

OT Network

Internet

Side-channel attack

Insider

Nation-state, Terrorists

Cybercriminal

Level 4 or 5: Corporate desktop, Remote access workstation, domain server, webserver

Level 3: EMS, SCADA, GMS, AMI HELevel 2: HMI, Historian, EWS Level 1: PLC, IED, RTU, Meter

Social Engineering

Credential Theft

Cyberphysical Attack

!

!

Page 6: Industrial Control Systems & SCADA: Risks & Solutions

REACH THE TARGET

ACHIEVE OBJECTIVE

ENDPOINT OPERATIONS

BREACH PERIMETER

DELIVER MALWARE

Example Threat Model - Ukraine Grid Attack

Internet

Domain Controller

IT OT

WAN

SCADA

SubstationControl CenterUtility Corporate/Business Network

Host

Spearphishing (Black Energy

0-day)

Steal User Credentials

Pivot to SCADA(using stolen credentials) Open Electric Relays

(ICS data plane protocols)

IED / RTU

Corrupt HMI (known

malware)

Corrupt Firmware (ICS control plane

protocols)

6 | © 2020 Palo Alto Networks, Inc. All rights reserved.

Page 7: Industrial Control Systems & SCADA: Risks & Solutions

What are the risks and how real are they?

7 | © 2020 Palo Alto Networks, Inc. All rights reserved.

● Loss of utility services at scale● Human health and safety● Environmental damage● Regulatory non-compliance● Operational ineffeciency● Reputational damage● Financial loss 56%

Utilities who experienced an attack involving loss of private information or OT outage in the past 12 months.

- Siemens/Ponemon 2019

£111M /day

Cost of successful cyber-attack to London electricity networks

- Univ. of Oxford 2016

Page 8: Industrial Control Systems & SCADA: Risks & Solutions

Your Mindset is Critical - Adopt a Zero Trust Approach

Define businessoutcomes

Design from theinside out

Determine who/what needs access

Inspect and logall traffic

8 | © 2020 Palo Alto Networks, Inc. All rights reserved.

Page 9: Industrial Control Systems & SCADA: Risks & Solutions

Cybersecurity Capabilities and Value for OT Security

9 | © 2020 Palo Alto Networks, Inc. All rights reserved.

Cybersecurity Capability Description Value for OT Security

ICS Protocol Visibility/Whitelisting

Identify and control OT-specific protocols and applications

Implement a Zero Trust architecture to reduce the attack surface

Asset Identification Identify OT and IoT devices Minimize the risk of OT/IoT being compromised

Intrusion Detection and Prevention

Detect and protect against known threats

Protect legacy unpatched or unpatchable OT systems until scheduled downtime

Malware Sandboxing Detect and protect against zero-day malware

Reduce the risk of successful targeted attacks using unknown threats

Threat Intelligence Management Ingestion and sharing of utility- specific threat intelligence

Real time information on newly discovered industry threats and protections

Automated Threat Detection and Response

ML/AI based intelligence threat detection and response

Rapidly detect and respond to threats. Quickly recover from incidents.

Increasing Maturity

Page 10: Industrial Control Systems & SCADA: Risks & Solutions

Example Technology with Next-generation OT Security CapabilitiesNext-generation Firewall (NGFW)

Services provided by a Next-generation Firewall

● ICS/OT protocol visibility and control

● Role-based access control with multi-factor authentication

● Intrusion detection and prevention

● Malware sandboxing

● OT and IoT Asset Identification and protection

● Cellular IoT security

NGFW as Zero Trust Segmentation Gateway

Zone 1

Zone 2

Zone 3

10 | © 2020 Palo Alto Networks, Inc. All Rights Reserved.

Page 11: Industrial Control Systems & SCADA: Risks & Solutions

IT OT

IT-OT Collaboration Could Be the Biggest Challenge

11 | © 2020 Palo Alto Networks, Inc. All rights reserved.

● Change starts at the top with senior leadership ● Foster a collaborative culture and joint accountability● Cross-training personnel in both disciplines helps● Set up governance boards made up of senior leadership

● Utilities with weak IT-OT links struggle to progress OT security ● IT and OT often seen as having opposing goals● In reality, both share an interest to protect the core business

Page 12: Industrial Control Systems & SCADA: Risks & Solutions

Key Takeaways

12 | © 2020 Palo Alto Networks, Inc. All rights reserved.

High-risk ProfileGrid cybersecurity is a

high-risk endeavor and action is required.

Tech InvestmentYesterday’s technology

is inadequate for stopping new threats

Zero TrustA zero-trust mindset is

required to increase your protection surface

IT-OT CollaborationAn organization’s

ability to foster IT-OT collaboration is critical

Page 13: Industrial Control Systems & SCADA: Risks & Solutions

Thank you

paloaltonetworks.com