280 likes | 514 Views
Cyber Security in Critical Infrastructure Control Systems. Presented by: Motty Anavi VP Business Development. A practical approach Entelec Spring 2013. Growing Awareness for ICS Cyber-Security. VIRUS INFECTION AT AN ELECTRIC UTILITY (Source: ICS CERT Jan. 2013)
E N D
Cyber Security in Critical Infrastructure Control Systems Presented by: Motty Anavi VP Business Development A practical approach Entelec Spring 2013
Growing Awareness for ICS Cyber-Security VIRUS INFECTION AT AN ELECTRIC UTILITY (Source: ICS CERT Jan. 2013) In early October 2012, a power company contacted ICS-CERT to report a virus infection in a turbine control system which impacted approximately ten computers on its control system network. Discussion and analysis of the incident revealed that a third-party technician used a USB-drive to upload software updates during a scheduled outage for equipment upgrades. Unknown to the technician, the USB-drive was infected with a variant of the Mariposa virus. The infection resulted in downtime for the impacted systems and delayed the plant restart by approximately 3 weeks.
Advanced Persistent Threats • Escalation: “bragging rights” -> organized crime -> nation states • Opportunistic versus Targeted • Recent examples: • Stuxnet – industrial sabotage -> Iranian uranium enrichment program • Ghostnet – stole diplomatic communications -> embassies, Dhali Llama • Aurora – stole source code and other intellectual property -> Google • Night Dragon – industrial and commercial intelligence -> large oil companies
“Most Sophisticated Worm Ever” • Exploited multiple Windows zero-day vulnerabilities • Targets Siemens PLC's to sabotage physical process • Spreads via multiple media: • USB/Removable Media • 3 Network Techniques • PLC Project Files • Windows Database Connections • Drivers digitally signed with legitimate (stolen) certificates • Installs cleanly on all windows variants • Conventional OS rootkit, detects and avoids major anti-virus products • Advanced reverse-engineering protections
How Stuxnet Infects a System Infected Removable Media: • Exploits vulnerability in Windows Shell handling of .lnk files (0-day) • Used older vulnerability in autorun.inf to propagate Local Area Network Communications: • Copies itself to accessible network shares, including administrative shares • Copies itself to print servers • Uses “Conficker” vulnerability in RPC Infected Siemens Project Files: • Installs in SQL Server database via known and legitimate (stolen) credentials • Copies into project files Source: Byres Security
“Secure” Private industrial network – The Smart Grid • MV/LV transformers on poles now enhanced with Smart-Grid equipment • Distributed automation in Secondary sub-stations • Inter-connected by regional Ethernet networks with overlaying application communication using simple automation control protocols (IEC60870 , DNP3) An attacker gaining access to 1 site can manipulate the operation of the devices in other sites • Vulnerability: Distributed large-scale open internal networks “smart grid cyber-security guidelines did not address an important element… risk of attacks that use both cyber and physical means” • Electricity Grid Modernization; Report to Congressional requesters, US GAO, January 2011
The Great Wall of China Defense • Firewall are designed to keep intruders out • Some provide impervious walls • BUT: Once you break the physical constraint you can reach every point in the internal network • Antivirus software is designed to identify known signatures and flag or block “suspicious activity” • Antivirus software does not “know” what each application does • These defenses – restrict access, but once overcome are ineffective • The great wall is only as effective as it’s weakest link
Vulnerability in Many Current Design You’re part of the Secure Network - Pass Thou Shall Not Pass Secure Network Remote Substation • Solution: Defense-in-Depth security architecture “An aggregated security posture help defend against cyber-security threats and vulnerabilities that affect an industrial control system” • Strategy for securing control systems, US DHS, October 2009
Origin of Defense-in-Depth – in IT “A military strategy sometimes called elastic defense. Defense in depth seeks to delay rather than prevent the advance of an attacker, buying time and causing additional causalities by yielding space.” http://en.wikipedia.org/wiki/Defense_in_depth “…the practice of layering defenses to provide added protection. Defense in depth increases security by raising the cost of an attack. This system places multiple barriers between an attacker and your business critical information resources: the deeper an attacker tries to go, the harder it gets.” Brooke Paul, Jul 01, Security Workshop at Network Computing
IAS Thomas E. Anderson Briefing Slides Defense-in-Depth Strategy • Information Assurance Strategy • Ensuring confidentiality, integrity, and availability of data • People • Hire talented people, train and reward them • Technology • Evaluate, Implement, Test and Assess • Operations • Maintain vigilance, respond to intrusions, and be prepared to restore critical services
Distributed Firewall Deployment • Secure end-devices • Integrated Space, Power • Operational stability • Install-base • Mini-firewall per site • Available technology • Stand-alone Space, Power • Network complexity • Network-based firewalls • Integrated Space, Power • Network simplicity • Technology emerging Integrated firewalls as part of the network design
Utilities Cyber Security Threats & Counter-measures • Security Measure • Service-aware firewall • Distributed firewalls • Encryption • Secure remote access • Attack vector • Control-Center malware • Field-site breach • Man-in-the-Middle • Remote maintenance
Defense-in-Depth tool-set • Advanced security measures integrated in the switch using a dedicated service-engine to • Enables easy deployment of an extensive defense-in-depth solution • App-aware firewall Service validation Remote access • SSH gateway Inter-site VPN IPSec tunnels Access Control L2-L4 filters Function Required Feature
Inter-site connectivity • GRE tunnels used for transparent connectivity of private Ethernet networks across the Internet • IP Sec used to encrypt the GRE tunnels Internet Private ETH Network Private ETH Network
Secure Remote Access • Integrated remote access gateway using an encrypted SSH tunnel • Optionally use reverse-SSH initiated from the secure site • Access rights per user (locally or from RADIUS server) • SSH tunnel used a secure transport for any user IP-based session • User session re-routed to a local-host which sends the data via the SSH tunnel • Gateway as session proxy hiding the local network • On-line app-aware session security checks are performed Ethernet Internet RS-485 RS-232
Distributed service-aware firewall deployment • Service-aware inspection of traffic in every end-point • Rule-based validation of SCADA flows • Blocking an “insider” attack • Firewall integrated in multi-service network switches • Efficient IPS deployment for distributed small sites • Protection for Serial & ETH devices • Central service management tool • End-to-end provisioning of security rules • Reporting network-wide security events Defense-in-depth is the answer to securing distributed utility networks
Security – ModbusApplication Aware Firewall Example • Modbus Function Codes
Application aware Firewall • Using a network management tool the user plans his network and maps the service groups in it • For each pair of devices specific firewall rules on the application level can be applied (function codes, address ranges, etc.) • The user can select multiple device pairs to apply the same firewall profile
Auto-Learning Capabilities • Any deviation from the firewall rules is logged in the switch and reported to the central management tool • Security events are shown on the map and in a dedicated events log • Simulate mode can be used to learn the network traffic flows • The “illegal” traffic is reported but not blocked
Connecting the sub-station LANs – Current status Control Center Remote Technician Network Limitations • SCADA direct access to S.S. IEDs • Field technician access to: • Other sub-stations • Central storage • Facility RTU • Remote technician access to RTUs and IEDs in all S.Ss • Data-sharing between S.Ss SCADA Storage Internet SONET/Packet Network Sub-Station Facility RTU Sub-station RTU Field Technician Sub-station IEDs Need a unified sub-station LAN with secure inter-site connectivity
Connecting the sub-station LANs – Future evolution Control Center Remote Technician Use a secure switch connecting the LAN devices to the backbone • Network segmentation using VLANs/Subnets • App-aware firewall per-device • Secure remote access • Serial-to-ETH protocol gateway SCADA Storage Internet SDH/Packet Network Sub-Station Facility RTU S.S. RTU Field Technician Sub-station IEDs
Summary • When modern critical infrastructure deployments use Ethernet • Intra-network security is mandatory • To meet evolving security standards and threats Service-aware Industrial Ethernet solutions must have • Unique distributed service-aware firewall • Integrated defense-in-depth • Reliable network capabilities • Easy management and configuration • Optimized to minimize integration cost
Cyber Security Sub Committee • Goal: • Enhance understanding of Cyber Security Issues as they relate to ICS and SCADA • Advocate for the industry with the most effective ways to tackle ICS security • In the process of defining priorities • Survey in process • Looking for more participation • Please contact me via board or directly at: motty@radusa.com , 201-378-0213 if interested
For more information: Motty Anavi VP Business Development motty@radusa.com (201) 378-0213