23
Industrial IoT (IIoT) Security A Holistic Approach Jalal Bouhdada Founder & Principal ICS Security Consultant IoT Expo Connected Industry Wednesday 27 June 2018, Amsterdam

Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

  • Upload
    others

  • View
    3

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

Industrial IoT (IIoT) Security – A Holistic

Approach

Jalal Bouhdada – Founder & Principal ICS Security Consultant

IoT Expo – Connected Industry

Wednesday 27 June 2018, Amsterdam

Page 2: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

WHO WE ARE

• Working on a global scale, we provide both Fortune

500 enterprises and small to medium-sized

businesses with the cyber security solutions

required to effectively manage cyber risks.

• Through robust protection against cyber threats,

our services and solutions transform the way our

customers’ procure, build, integrate and manage

their critical infrastructures.

2

Page 3: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

AREAS OF EXPERTISE

Applied Risk offers industrial cyber security and consultancy services to critical infrastructure globally. Sectors include:

3

Oil & Gas Power Water Manufacturing Transportation Pharmaceutical

Page 4: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

TALKING POINTS

4

Emerging threat landscape and IIoT risk factors

IIoT security challenges

Best practices for securing IIoT

Background of IIoT

Page 5: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

BACKGROUND

A seismic shift is underway within the industrial environment, transforming the way manufacturers and engineers operate. The Industrial Internet of Things (IIoT) has arrived and is here to stay.

This is enabling faster production, but also optimising processes, driving down costs and generating energy efficiencies.

5

Page 6: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

INDUSTRIAL INTERNET OF THINGS

Dr. Johann Bizer, ULD (2006)

Ubiquitous computing – sensors, processors and actuators that are connected to each other can cause

and control actions. Everyday objects that are equipped with this connection are able to include environmental information and act on this basis.

6

Page 7: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

7

2nd 3rd 4th1st

Mechanization, water power, steam power

Mass production, assembly line,

electricity

Computer and automation

Cyber Physical Systems

CYBER PHYSICAL SYSTEMS

Page 8: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

IIoT DEVICES ECOSYSTEM

8

Field equipment Factory Automation

Edge

Industrial IoTgateway

IoT Head End

Wide Area Access Network

Local Area EthernetNetwork

Field network

Page 9: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

INTERNET OF THINGS IN THE FUTURE

9

• 4 billion connected people

• 4$ trillion in revenue opportunity

• 25 million apps

• 25 billion embedded and intelligent systems

• 50 trillion GBs of data

4Billion

Connected People

4$trillion

RevenueOpportunity

25million

Apps

25billion

Embedded and

Intelligent Systems

50trillion

GBs of Data

Source: Marlo Morales

2020

Page 10: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

The Industrial IoT is projected to be worth

$151bn25%

of identified attacks in enterprise will involve IoT

However businesses will only spend

10% of their cyber security

budgets protecting themselves

EMERGING THREAT LANDSCAPE – BY 2020

This means we face an industry that grows faster than we can secure it

10

Page 11: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

EARLY SIGNS ONLINE: SHODAN, ZOOMEYE

11

https://icsmap.shodan.io/

Map of Industrial IoT on the Internet

Page 12: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

IIoT AND IT/OT CONVERGENCEThe impact of a cyber event can cascade across an organization, reinforcing its magnitude

12

PrivacySafety

Security

Reliability

Resilience

IIOTIIoTPrivacy

Security

Reliability

Resilience

Information Technology (IT)

Safety

Resilience

Reliability

Security

Operational Technology (OT)

Attacks

Human

Errors

System

Faults

EnvironmentDisruptions

Page 13: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

13

The market can't fix this. The buyer and seller don't care.

Bruce Schneier, November 2016, House Energy and Commerce Committee hearing (USA)

Page 14: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

ARE OUR DEVICES TRUSTWORTHY?

Does the board understand the risk of IIoT security?

Do we have a plan and are we ready for IIoT transformation?

Do we have a security framework and architecture blueprint for our IIoT?

Have security assessments for IIoT readiness been undertaken?

14

Page 15: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

COMPLEX ECOSYSTEM

15

Page 16: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

16

COMMON VULNERABILITIES IN IIoT

Page 17: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

Quote

Behavior-based safety

Page 18: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

IIoT SECURITY USE CASE: THE BTC PIPELINE ATTACK

18

Pipeline capacity: 1 Mbpd

Lost days: 20

Oil price then: $125/barrel

Potential loss: $2.5B

“On 5 August 2008, a major explosion and fire in Refahiye (eastern Turkey Erzincan Province) closed the pipeline. The Kurdistan Workers Party (PKK) claimed responsibility. The pipeline was restarted on 25 August 2008. There is circumstantial evidence that it was a sophisticated cyber attack on line control and safety systems that led to increased pressure and explosion. The attack might have been related to Russo-Georgian War that started two days later.” (Source: Wikipedia)

Page 19: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

IIoT AS BUSINESS ENABLER

19

This will enable you to benefit from all the advantages that IIoT offers, while preventing a cost increase due to unexpected vulnerabilities

Close collaboration between suppliers and end-users to enhance security of IIoTcomponents

Secure by design throughout the device lifecycle

Adherence to industry security and compliance standards IEC 62443 4-1, 4-2

Page 20: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

THE IIC’S SECURITY FRAMEWORK: IISF Published in September 2016

160 pages

Key Contents:

Key Systems Characteristics Enabling Trustworthiness

Distinguishing Aspects of Securing the IIoT

Managing Risk

Permeation of Trust in the IIoT System Lifecycle

Functional View

20

Protecting Endpoints

Protecting Communications

Security Monitoring and Analysis

Securing Configuration and Management

Looking Ahead – the Future of IIoT

Page 21: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

OWASP IoT ATTACK VECTORS Open Web Application Security Project (OWASP): The free and open software security

community, Internet of Things Project www.owasp.org/index.php/OWASP_Internet_of_Things_Project

Top 10 list

Insecure web interface

Insufficient authentication/authorization

Insecure network services

Lack of transport encryption

Privacy concerns

21

Insecure cloud interface

Insecure mobile interface

Insufficient security configurability

Insecure software/firmware

Poor physical security

Page 22: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

Secure development

lifecycleAssessing

security from the outset

Hardware and firmware

security assessments

Robustness testing

Static code and protocol

analysis

BEST PRACTICES FOR SECURING IIoT

22

Page 23: Industrial IoT (IIoT) Security A Holistic Approach · The Industrial IoT is projected to be worth $151bn 25% of identified attacks in enterprise will involve IoT However businesses

Herbert William Heinrich (Engineer)

No matter how strongly the statistical records emphasize personal faults or how imperatively the need for education activity is shown, no safety procedure is complete or satisfactory that does not provide for the . . . correction or elimination of . . . physical hazards.“

Herbert William Heinrich (Engineer)Questions