240 likes | 522 Views
Computing and Network Infrastructure for Controls. CNIC. Why CNIC? Technical Propositions. Impact on you !? Use Cases & Examples. Pierre Charrue AB/CO. Goals of this presentation. Explain why CNIC was created Describe CNIC mandate Propose technical proposals and deployment schedule
E N D
Computing and Network Infrastructure for Controls CNIC • Why CNIC? • Technical Propositions. • Impact on you !? • Use Cases & Examples Pierre Charrue AB/CO
Goals of this presentation • Explain why CNIC was created • Describe CNIC mandate • Propose technical proposals and deployment schedule • Explain what will change for the users • Get some feedback from the users
CyberThreats at CERN • May 2005 : 81 incidents • 36 Windows systems compromised (4 using VPN) • One account compromised (used to originate a DoS attack) • 6 PCs spreading viruses/worms • 38 PCs with unauthorized P2P activity (9 via VPN) • January 2005 : 91 incidents • 23 systems compromised (22 Windows, 1 Linux) • 1 CERN account compromised • 14 PCs at CERN spreading viruses/worms • 53 PCs with unauthorized P2P activity (9 via VPN) • February 2005 : 83 incidents • 20 systems compromised (18 Windows, 1 Linux, 1 VPN) • 2 CERN accounts compromised • 4 PCs at CERN spreading viruses/worms • 57 PCs with unauthorized P2P activity (11 via VPN) • March 2005 : 70 incidents • 15 systems compromised (12 Windows, 3 Linux) • 2 CERN accounts compromised • 2 PCs at CERN spreading viruses/worms • 51 PCs with unauthorized P2P activity (13 via VPN) • April 2005 : 67 incidents • 19 systems compromised (17 Windows, 2 Linux) • 1 CERN account compromised • 9 PCs at CERN spreading viruses/worms • 38 PCs with unauthorized P2P activity (7 via VPN)
Control Systems are NOT safe • O/S can not always be patched immediately • Account passwords are known to several/many people and not changed • Automation devices (PLCs, SCADA) have NO security protections • The Controls network is entangled with the general office network (Campus network)
CERN Assets at Risk • People • Personal safety(safety alarms transmitted via the communication network) • Equipment(in order of increasing costs) • Controls equipment: Time-consuming to re-install, configure and test • Infrastructure process equipment: Very expensive hardware • Accelerator hardware: Difficult to repair • Process • Many interconnected processes (e.g. electricity and ventilation) • Very sensitive to disturbances • A cooling process PLC failure can stop the particle beam • A reactive power controller failure can stop the beam • Difficult to set up • Requires many people working, possibly out-of-ordinary hours
Goals of this presentation • Explain why CNIC was created • Describe CNIC mandate • Propose technical proposals and deployment schedule • Explain what will change for the users • Get some feedback from the users
The CNIC Working Group • Delegated by the CERN Controls Board • Mandate covers control systems only, not office computing • Definition of • Security policy • Networking aspects • Operating systems (Windows and Linux) • Services and support • Members cover all CERN controls domains and activities • Service providers (Network, NICE, Linux, Security) • Service users (AB, AT, LHC Experiments, TS)
CNIC Mandate • Define tools for system maintenance (“NICEFC” and “LINUXFC”). • Define tools for setting up and maintaining differentControls Network domains. • Designate person to have overall technical responsibility. • Rules, policies and authorization procedure for what can be connected to a domain. • Ground rules, policies and mechanisms for inter-domain communications and communications between controls domains and the Campus Network. • Investigate technical means and propose implementation plan. • Stimulate general security awareness.
Goals of this presentation • Explain why CNIC was created • Describe CNIC mandate • Propose technical proposals and deployment schedule • Explain what will change for the users • Get some feedback from the users
Requirements and Definitions Security Policy Networking Operating Systems and Tools Services Implementation Operation I II III 09/2004 01/2005 07/2005 01/2006 CNIC Phases • “Design, Setup and Operation of theCERN Control System Environment” • Description of concepts • Definition of terms • Definition of policies Main Chapters - Security Policy - Networking - Operating System and Tools - Services • “Deliverables and Milestones” • Definition concrete deliverables, responsibilities, and dates
Security Policy • Network Domains • Physical network segregation & Functional Sub-Domains • Hardware Devices • No USB, modems, CD-ROMs, wireless access… • Operation System • Central installation of Windows or Linux • Strategy for security patches • Software • Development guidelines, installation, patching and test procedures
Security Policy (cont’d) • Logins and passwords • Traceability, no generic accounts • Following IT password recommendations • Training • Awareness Campaign (this presentation !) • User training (rules, tools) • Security Incidents and Reporting • Reporting and follow up • Disconnection if risk for others
Networking • General Purpose Network (GPN) • For office, mail, www, development, … • No formal connection restrictions by CNIC • Technical Network (TN) and Experiment Network (EN) • For operational equipment • Formal connection and access restrictions • Limited services available (e.g. no mail server, no external web browsing) • Authorization based on MAC addresses • Network monitored by IT/CS
Operating Systems & Tools • NICEFC and LINUXFC • Centrally managed and distributed • Named Set of Control Computers (NSCC) • Groups of computers with identical basic configuration • Responsible persons will be contacted in case • of emergency, or • if e.g. security patches need to be applied. • Configuration • Version management database • Operating System (LINUXFC or NICEFC) • User defined software packages (e.g. PVSS, …) • Rollback to previous version • Local firewalls
Services • Operation, Support and Maintenance • Standard equipment • Network connections (24h/d, 365d/year) • Operating System installation • Security patches • Test Environment • Vulnerability Tests (e.g. TOCSSiC) • Integration Tests (one test bench per domain) • Hardware Support • Standard (“office”) PCs • “Industrial” PCs
Requirements and Definitions Security Policy Networking Operating Systems and Tools Services Implementation Operation I II III 09/2004 01/2005 07/2005 01/2006 Activities and Deliverables • Define and deploy “LINUXFC” and “NICEFC” • Deploy and setup Application Gateways • Select and implement real use case with Users • Prepare the TN and EN separation • In the middle of 2006, when all proposed technical solutions and support are available and supported, disable the GN to TN/EN connectivity
Goals of this presentation • Explain why CNIC was created • Describe CNIC mandate • Propose technical proposals and deployment schedule • Explain what will change for the users • Get some feedback from the users
What Does Change for YOU ? • Connection policy • Connections must be authorized by domain responsible person • Installation procedure • O/S to be installed • Configuration • No direct access from office to control systems • Access via application gateways (WTS, lxplus, …) • Tests & Development • Must be possible outside operation (on GPN) • Procedures for • Security patches • Installation scenarios • Generic accounts restrictions
Use Cases • Office Connection to Control System: • Connection to application gateway • Open session to application (e.g. PVSS) with connection to controls machine and/or PLCs
Use Cases • Sensitive Equipment : • Vulnerable devices (e.g. PLCs) must be protected against security risks from the network • Grouped into Functional Sub-Domains • Access only possible from the host system that controls them • External access to the host system via application gateway
What do YOU have to do ? • As hierarchical supervisor • Make security a working objective • Include as formal objectives of relevant people • Ensure follow up of awareness training • As technical responsible • Assume accountability in your domain • Delegate implementation to system responsible • As budget responsible • Collect requirements for security cost • Assure funding for security improvements
Next Actions in AB Controls • Have an Application Gateway installed in 513 : end of June 2005 • Install some client software (PVSS client, PLC software, JAVA JRE, …) : July 2005 • Run real application for the HWC via this Application Gateway : Mid-July 2005 onwards • Make tests from wireless laptops from the LHC tunnel to access equipment via this Application Gateway : mid-July 2005
Goals of this presentation • Explain why CNIC was created • Describe CNIC mandate • Propose technical proposals and deployment schedule • Explain what will change for the users • Get some feedback from the users
Questions ? • Domain responsibles: • GPN: IT/CS • TN: Uwe Epting & Søren Poulsen (TS), Pierre Charrue, Alastair Bland & Nicolas de Metz-Noblat (AB/AT) • ALICE EN: Peter Chochulat • ATLAS EN: Giuseppe Mornacchi • CMS EN: Martti Pimia • LHCb EN: Beat Jost • Incidents: • Computer.Security@cern.ch http://cern.ch/wg-cnic