35
Copyright © SEL 2015 Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering Laboratories, Inc.

Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

  • Upload
    others

  • View
    12

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Copyright © SEL 2015

Securing Communications for SCADA

and Critical Industrial Systems

Tom Bartman and Kevin Carson Schweitzer Engineering Laboratories, Inc.

Page 2: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Summary

• Communications as popular target

• More sophisticated criminals

• Threat vectors

• Mitigation

• New technology

Page 3: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

SCADA and ICSs

• SCADA and ICS communications are used

to move electric power, gas, oil, water,

petrochemicals, and transportation

• Protocols are in use today that rarely use

authentication

• Energy sector is popular avenue for attacks

Page 4: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Threat Vectors

• Replay attacks

• Man-in-the-middle

attacks

• Brute force attacks

• Dictionary attacks

• Denial of service (DoS)

attacks

• War dialing

• Default passwords

• Data modification

Page 5: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Securing Internet Protocol

• IPsec

• Encryption and authentication

• Logging

Gateway Gateway

Internet

Attacker

IPsec Tunnel

Page 6: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Replay Attack With Encryption

00D5F8

Attacker is able to see encrypted command

Page 7: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Successful Replay Without

Authentication

00D5F8

Attacker replays command

Page 8: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Unsuccessful Replay With

Authentication

00D5F8

Attacker replay command is rejected

Page 9: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

SONET Communications Network

Multiplexer

Multiplexer

MultiplexerMultiplexer

Page 10: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Encrypt WAN Connections

SONET Ring MultiplexerMultiplexer

Multiplexer

Multiplexer

Page 11: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Encrypted WAN Connections

Stop Interception

SONET Ring MultiplexerMultiplexer

Multiplexer

Multiplexer

Page 12: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Ethernet Communications

• Replay attack prevention via encryption

and authentication

• MAC address count lock

• MAC address time lock (capture endpoints

during commissioning)

• Tamper detection using link status in new

technology

Page 13: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Wireless Communications

• Bluetooth® keeps cabinet doors closed

• New radio transceivers support encryption

and authentication

Page 14: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Serial Communications

• Serial communications are still widely used

• Serial encryption devices provide secure

wrapper

Serial Encryption

Device

Serial Encryption

Device

Page 15: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Precise Time

• Critical component

in power systems

• Precision time and

date-stamped logging

• Distribution over

SONET networks

Page 16: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Password Management

User

Accounts

Security

Gateway

Security

Gateway

Ethernet

Switch

Encrypted

Page 17: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

User

Accounts

Security

Gateway

Security

Gateway

Ethernet

Switch

Encrypted

Password Management

Encrypted

Username: johntyler

Password: P = F × V (Velocity)

“johntyler authenticated”

Page 18: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Backdoor Passwords and

Maintenance Accounts

• Cause significant threat exposure

• Are used for equipment access

Insist that your devices have no such

mechanisms in place!

Page 19: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Engineering Access

• Utility engineer – engineering access

is biggest risk

• Endpoints must be firewalled

Untrusted

Network

Security

Gateway

Remote Facility

Page 20: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Dial-Up Modems Still Widely Used

• Disconnect when not in use

• Whitelist inbound numbers

• Use modem call-back feature

Page 21: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Secure Dial-Up Engineering Access

• Secure dial-up access protects serial

communications

• Field engineers are given unique

cryptographic identities

Untrusted

Public Phone

Network

Modem

Serial Cryptographic

Transceiver

PC With

Internal Modem

Crypto Module

Page 22: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Whitelist Technology

• Was developed by U.S. Department of

Energy and several partners

• Is based on whitelist malware protection

• Monitors system services

• Mitigates malware, rootkits, and zero-day

exploits

• Eliminates frequent antivirus signature

patches

Page 23: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Tamper Detection

• New technology detects

break-in or tampering

• Sensors detect

movement, light levels,

and binary sensors

Page 24: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Tamper Detection

• Optical sensor or binary input detects

door opening

• Accelerometer detects jolt or movement

• Tilt sensor detects someone physically

handling device

• Combination of sensors reduces

false alarms

• Alarms are sent out-of-band

Page 25: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Establish Zones of Protection

Secure Channels to

SCADA / EMS / EA Access

Data

Concentration

Intelligent

Devices

Ethernet

Serial

Relays, Controllers,

and Machines

Ethernet

Switch

Data

Security Access

Management

Page 26: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

New Generation of Computers

• MTBF many times that of typical industrial

computers

• SCADA, automation, data concentration,

monitoring, and control

Page 27: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

New Generation of Computers

• No moving parts (spinning drives, fans)

• Error-correcting memory

• Harsh environments

• Operation when exposed to ESD,

vibration, shocks, bumps, EMI fields,

and RF interference

• Wide range of applications (LDAP,

automation, network intrusion detection)

Page 28: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Network Intrusion Detection

• Reliable option with new rugged computers

• Important piece in security framework

• Detection of network breach provided

Page 29: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Network Intrusion Detection

• Monitors inbound and outbound traffic

• Records access attempts, port scans,

probes, buffer overflow attempts, and more

• Provides deep packet inspection and rule-

based alerts

Page 30: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Rule Determines How to

Inspect Each Packet

Action

Protocol

Source

IP

Source

Port

Direction

Destination

IP

Destination

Port

Message

al er t t cp any any –> any 23 ( msg: “ Tel net connect i on” ; )

Page 31: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Network Intrusion Detection

• Detects traffic from within (i.e., between

devices)

• Example – Modbus® TCP buffer overflow

al er t t cp $MODBUS_Cl i ent any –> $MODBUS_Ser ver 502 \

dsi ze: >300; msg: “ I l l egal Modbus TCP Packet Si ze” ; )

Page 32: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Network Intrusion Detection

Internet VLANGateway /

Firewall

Port Mirroring

Remote

Management

Sniffing

Interface

Management

Interface

Rugged

Computer

Managed Switch

SCADA

RTU

SCADA

RTU

SCADA

RTU

Page 33: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Best Practices

• Know your system endpoints

• Have USB flash drive policy

• Review logs periodically

• Lock down engineering access

• Consider insider threats (access rights)

• Keep device firmware up to date

Page 34: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Conclusion

• Communications require end-to-end

authentication to be secure

• Compensating controls are available for

legacy protocols

• Layered security should be established

• Many new technologies are available

Page 35: Securing Communications for SCADA and Critical Industrial ... · Securing Communications for SCADA and Critical Industrial Systems Tom Bartman and Kevin Carson Schweitzer Engineering

Questions?