15
Securing Remote Access to OT/ICS Systems Yariv Lenchner Sr. Product Manager CyberArk Software

Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Embed Size (px)

DESCRIPTION

The session will cover the security risks and issues around the management and usage of privileged/interactive user remote access and will cover the following topics: - Management of generic and shared accounts (and their users) - Remote interactive access to critical systems (e.g. vendor support) - Current typical jump server implementations and its security weakness - Isolation, Monitoring and Control over interactive/privileged sessions - Recommended design and implementation of jump servers The session will cover the security issues and the proposed solutions.

Citation preview

Page 1: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Securing Remote Access to OT/ICS Systems

Yariv Lenchner

Sr. Product Manager

CyberArk Software

Page 2: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Current ICS Security Status

▪ We all know that many ICS systems and devices are vulnerable to cyber attacks

▪ There are many reasons for this:■ Preferring system availability over security■ Lack of focus on security during development■ No or very little patching to systems in production environments

▪ The usual advice and best practice was to isolate, isolate, isolate!

Page 3: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Can We Really Isolate All Critical Networks?

▪ The assumption that our critical network is isolated is very problematic:

■ Removable media■ Mistakes and temporary

connections■ Remote access

▪ How do we design a truly secure remote access system?

▪ A design that will also help secure against the first two types of threat

Page 4: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

The Homegrown Proxy Server

▪ The typical and most popular solution is a homegrown proxy server

▪ Usually deployed as an entrance point to the critical network

▪ Let’s go over some of the security challenges with this popular deployment and how to solve them

Page 5: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

1) The “All or Nothing” Challenge

▪ The remote proxy usually serves as a access point to multiple users with different target devices and different privileges

▪ Once access to the proxy is granted, the remote user usually has unlimited access to all resources or devices on the critical network

▪ Recommendation: ■ Implement granular restriction of users to connect to specific systems

only

Page 6: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

2) The Shared Account Issue

▪ Many resources on the critical network are being managed through shared privileged accounts (IEDs, HMIs, Applications, Routers, Servers, FWs…)

▪ Remote access users usually use the same shared and privileged accounts

▪ Managing passwords on shared accounts that have internal and remote users becomes a serious issue

▪ Results:■ Passwords are not updated■ No track of who knows a password■ Updating passwords brings the risk of not knowing a password in an

emergency■ No accountability

▪ Recommendation: ■ Implement and enforce the usage of users on the proxy server

“…100% of breaches involved stolen

credentials.”

“APT intruders…prefer to leverage privileged accounts

where possible, such as Domain Administrators, service accounts

with Domain privileges, local Administrator accounts, and privileged user accounts.”

Mandiant, M-Trends and APT1 Report

Page 7: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

3) Workflow and Policy Enforcement

▪ Remote access to the proxy server is available at any time to anyone who has access to it

▪ Policies that control the access process are manual and hard to enforce

▪ Different policies exist for different users and systems

▪ Homegrown proxy servers usually do not enforce policies that consider:■ Time of day■ Length of remote session■ Access request reason■ Manager’s approval

▪ Homegrown proxy servers do not keep any kind of log about the request reason or on the approval

▪ Recommendation: Implement a proxy server with policy enforcement and dual control capability

Page 8: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

4) Monitoring and Control

▪ Once access is granted, there is very little control over what the remote user is actually doing

▪ There is no real time over-the-shoulder monitoring capability

▪ No real records of everything that is being done during a remote session

▪ No quick and easy capability to terminate a remote session immediately

▪ Recommendation:■ The proxy server should allow a certified

supervisor to monitor and control real-time remote sessions

■ The proxy server should be able to video record the session for future review

Page 9: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

5) Are You Sure There Are No Bypasses?

▪ The Million Dollar Question:■ Are you sure there is no other way to access the critical devices on the

critical network?

▪ If the proxy is bypassed, the last line of defense is the privileged account password

▪ Passwords tend to be guessed, stolen, hijacked, found or even given away

▪ Recommendation:■ Privileged passwords should be stored, managed and only known to the

proxy server itself

Page 10: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

6) Analytics and SIEM Integration

▪ Malicious activity passing through the proxy server can continue for long periods while going undetected 

▪ A typical proxy server is not capable of detecting anomalies in remote connections made through it

▪ Recommendation: ■ The proxy server should be able to compare current remote access

activity to historical activity in real time ■ Detection of anomalies as they happen allows the incident response

team to respond and disrupt the attack

Page 11: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Securing Remote Access into ICS Networks

CyberArk’s Privileged Session Manager (PSM)

Page 12: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Securing Access Into the ICS/OT Network

DMZ

CorporateNetwork

Corporate User

Third party vendor

DMZ firewall

ICS firewall

ICSNetwork

PSM

Vault

PasswordSessionRecording

UNIXServers

Databases SCADA Devices

Routers& Switches

WindowsServers

Web Portal

VPN

Supervisor

Page 13: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Summary

▪ Remote Access – Many critical networks need some type of remote access

▪ It is better to implement a secure remote access solution than to ignore the need for one and end up using non-secure methods

▪ NERC CIP v5 includes new requirements for the proxy server (the intermediate device) – use the new requirements to build the appropriate solution

▪ Align your secure remote access methods with privileged password management to minimize the risk of attack

Page 14: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Questions?

Page 15: Managing and Securing Remote Access To Critical Infrastructure, Yariv Lenchner of CyberArk

Thank You!

Yariv LenchnerSr. Product Manager

CyberArk

[email protected]

www.cyberark.com