280 likes | 489 Views
Security Standards Implementation To Improve ICS and SCADA Security. Eran Salfati , Amir Ellenbogen , Meir Arad, Yagil Kadmon. Subjects. Introduction. Cyber Attacks. ICS Weakness. Security Model. Case Study. Subjects. Introduction. Cyber Attacks. ICS Weakness. Security Model.
E N D
Security Standards Implementation To Improve ICS and SCADA Security EranSalfati, Amir Ellenbogen, Meir Arad, YagilKadmon
Subjects • Introduction. • Cyber Attacks. • ICS Weakness. • Security Model. • Case Study.
Subjects • Introduction. • Cyber Attacks. • ICS Weakness. • Security Model. • Case Study.
Introduction • ICS - Industrial Control System: • SCADA - Supervisory Control and Data Acquisition • DCS - Distributed Control Systems • PLC - Programmable Logic Controllers
What is a Cyber Attack? A cyber attack can include a wide variety of computer-based events that could impact: • Confidentiality: violate the security of data or software. Unauthorized access (internal or external) by those without appropriate authorization and “need to know”. • Integrity: unauthorized modification, destroy of data, systems, and information. • Availability: deny access to systems, networks, services, or data. CIA
Subjects • Introduction. • Cyber Attacks. • ICS Weakness. • Security Model. • Case Study.
Subjects • Introduction. • Cyber Attacks. • ICS Weakness. • Security Model. • Case Study.
ICS Weakness • No Authentication • What is the “identity” of an automated system? • How would policies such as “change password monthly” be applied on systems that supposed to run un attended for years? • How do you manage rights for each person? • No Patching • Systems have never needed security patches in the past. • Old: Install a system, replace it in 5 years. • New: Install a system, patch it every month.
ICS Weakness • Denial about how much they are connected to the internet • Belief: not connection at all. • Reality: • numerous uncontrolled connections. • Reality: even network that are separate get connected via • roaming USB drives and laptops.
Subjects • Introduction. • Cyber Attacks. • ICS Weakness. • Security Model. • Case Study.
Awareness Standardization Efforts • International Society for Automation • International Electro technical Commission • National Institute for Standards and Technology • United State Computer Emergency Readiness Team
Control Systems Security Program (CSSP) • The cyber security program must be designed to: • Prevention and Mitigation – Coordinates activities to reduce the likelihood of success and severity of impact of a cyber attack through risk-mitigation activities. • Defense-in Depth – Apply and maintain protective strategies to ensure the capability to detect, respond to, and recover from cyber attacks.
Security Model • A-I-M • A– Assess. • I– Implement. • M– Maintain.
A – Assess • Risk assessments and critical asset identification. • Perform a ICS & SCADA assessment. • Perform a risk analysis • Create a security policy.
I – Implement • Design for desired security level. • Deploy protective measures. • Mitigation. • Test Security.
M – Maintain • Update assessment. • Review and update risk analysis. • Update security policy. • Apply Standards to Future Projects. • Continue to Test your Protected System.
Subjects • Introduction. • Cyber Attacks. • ICS Weakness. • Security Model. • Case Study.
Case Study • This case study is referring to the following SCADA security viewpoints: • Different security stations (computers) on one control network. • HMI software product. • Restrict access. • Cycle pass codes. • No connection to other networks.
Case Study Physical & Hardware hardring • Restricted number of technicians responsible for maintenance. • No CD-ROM drive • No internet access. • No keyboard – touch screen interface only. • Segregated control network, no connection to other networks. • Each computer is locked in a restricted room or cabinet.
Case Study Software Restrictions • No Windows games loaded. • Only runtime versions deployed. • Development computer located in a restricted access room. • Boot up automatically starts application in “run” mode. • In run mode the Windows key and alt key are disabled. • Only a unique key sequence can interrupt the runtime application.