SlideShare a Scribd company logo
1 of 69
Download to read offline
SESSION ID:
#RSAC
Alexander Polyakov
Cybersecurity for Oil and Gas
Industries: How Hackers Can
Steal Oil
HT-F02
CTO
ERPScan
@sh2kerr
#RSAC
About ERPScan
2
The only 360-degree SAP Security solution - ERPScan Security
Monitoring Suite for SAP and Oracle
Leader by the number of acknowledgements from SAP ( 250+ ) and
Oracle (40+)
80+ presentations key security conferences worldwide
30+ Awards and nominations
Research team – 20+ experts with experience in different areas of
security from ERP to ICS and Mobile
Offices in Palo Alto, Amsterdam, Copenhagen, Sidney
#RSAC
Evolution?
3
#RSAC
How does traditional VAPT works
4
A company hire experts for VAPT service or Product
Those specialists run some pentesting tools
They (may) manually test vulnerabilities, escalate privileges and
as a result write report about vulnerabilities
Report looks like
“we found vulnerability X on the server Y
look at the black screenshot with command line”.
#RSAC
Common VAPT report
5
#RSAC
Why?
6
Everybody know that there are vulnerabilities in almost every
system
The question now
how dangerous are they
how easy is to exploit them
what can happen after the exploitation?
and what kind of REAL risks to YOUR organization it provides.
#RSAC
Risks are different
7
#RSAC
Why Oil and Gas?
8
Critical
Industry-Specific
And I know it )
#RSAC
Why Oil and Gas?
9
PS: And something strange is happening here )
#RSAC
Oil and Gas 101
10
#RSAC
Upstream: Critical processes and systems
11
Extraction (Drilling)
Gathering (From earth to separators)
Separation (Separate oil, gas and water)
Gas compression (Prepare for storage and transport)
Temporary Oil Storage (Temporarily store before loading)
Waste disposal (Water disposal)
Metering (Calculate quantity before loading)
#RSAC
Midstream: Critical processes and systems
12
Terminal management (Obtain oil from upstream)
Gas Processing (Separate natural gas and NGL)
Gas Transportation (Transfer gas to storage via pipelines)
Oil transportation (Transfer oil to storage via pipeline/Truck/Barge/Rail)
Base load Gas storage (Temporary and long-term)
Peak load Gas Storage
LNG Storage
Oil Storage (Long-term oil storage)
#RSAC
Downstream: Critical processes and systems
13
Refining (Processing of Crude Oil)
Oil Petrochemicals (Fabrication of base chemicals and plastics)
Gas Distribution (Deliver gas to utilities)
Oil Wholesale (Deliver petrol to 3rd parties)
Oil Retail (Deliver petrol to end users)
#RSAC
What can happen?
14
#RSAC
Why should we care
15
#RSAC
What can happen?
16
Plant Sabotage/Shutdown
Equipment damage
Utilities Interruption
Production Disruption (Stop or pause production)
Product Quality (bad oil and gas quality)
Undetected Spills
Illegal pipeline taping
Compliance violation (Pollution)
Safety violation (Death or injury)
#RSAC
What about Security
#RSAC
Three aspects of Oil and Gas Cyber Security
18
#RSAC
When we speak about securing oil and gas companies we should cover
Operational Technology security
Enterprise Application security
Connections security
Three aspects of Oil and Gas Cyber Security
19
#RSAC
ICS Security in Oil and Gas
#RSAC
Oil and Gas Cyber-Security (OT part)
21
3 Areas:
Upstream
Midstream
Downstream
20+ processes:
Separation
Drilling
………
100+ System Types:
Burner Management
Fiscal Metering
….
1000+ Solutions
from hundreds of vendors:
Emerson
Rockwell
Siemens
….
#RSAC
Lets look at those systems
22
Burner Management System (Gas Oil Separation)
Metering (Fiscal Metering System (Metering)
Tank Inventory System (Oil Storage )
#RSAC
Gas Oil Separation
23
Risks:
Product Quality, Equipment damage, Plant Sabotage, Production
Disruption, Compliance violation
Details
Separate Oil, Gas and Water using multiple stages
Systems
Burner Management Systems (BMS)
Compressor Control System (CCS)
Vibration Monitoring System (VMS)
#RSAC
SEPARATION: Burner Management System
(BMS)
24
Description
Used in a variety of applications: Separators, tanks, heaters,
Incinerators, flare stacks, etc.
Systems:
Management: Emerson’s DeltaV SIS, Invensys BMS, Honeywell’s
BMS, Combustex BMS-2000, Allen-Bradley, Siemens SIMATIC
BMS400F
PLC vendors: GE, Modicon, Allen-Bradley, Koyo, Siemens
Flame sensors: Fireye, PPC, Honeywell, IRIS, Coen
#RSAC
SEPARATION: Burner Management System
(BMS)
25
Simple Burner Management System
https://cache.industry.siemens.com/dl/files/036/109477036/att_856487/v2/109477036_Burner_Application_Example_TIAP_DOC_v102_en
.pdf
#RSAC
SEPARATION: Burner Management System
(BMS)
26
OK, what if somebody will have access to BMS?
What he can do?
Any physical attacks?
#RSAC
SEPARATION: Burner Management System
(BMS)
27
If an attacker wants to commit sabotage and stop operations
by destructing burning process, he needs to control any of
the sources of flammable mixtures
#RSAC
Flammable mixture sources:
28
Oil or gas leaking into the combustion chamber through the burner as a
result of leaking fuel shut off valves.
insufficient combustion air resulting unburnt fuel in the dust collector.
oil is not properly purged
Quenching of the flame by cold dust entering the furnace
Fuel entering the furnace as a result of repeated unsuccessful ignition
attempts. This is the significant risk with oil firing, A typical cause is a
cold oil remaining in pipes during a shutdown
#RSAC
SEPARATION: Burner Management System
(BMS)
29
The main function of the BMS is to allow and ensure the safe
start-up, operation, and shutdown of the Fired Heater.
Unauthorized access to BMS can lead to multiple risks including
Explosion.
The simplest attack on BMS System is to turn off the purge.
Cold oil left in pipes during previous shutdowns can burn and
damage the equipment.
#RSAC
Metering
30
Risks:
Product Quality, Monetary loss
Details
Analyzes density, viscosity of content, temperature, and pressure
Divided into several runs
Systems
Fiscal Metering System
Liquid Flow Metering
Gas Flow Metering System
Wet Gas Metering System
#RSAC
Fiscal Metering
31
Description
Custody transfer, or fiscal metering, occurs when fluids or gases
are exchanged between parties.
Payment is a function of the amount of fluid or gas transferred.
A small error in measurement leading to financial exposure
Over a year, the 0.1% error would amount to a difference of
$50m.
The engine of a custody transfer or fiscal metering installation is
the flow computer.
#RSAC
Fiscal Metering Systems
32
Production Accounting System
FlawCall – FlawCall Enterprise (connected with IT)
KROHNE SynEnergy (connected with IT)
Honeywell’s Experion® Process Knowledge System (PKS), MeterSuite™
Schneider Electric InFusion
Schneider Electric SCADAPack
Flow computing
KROHNE Summit 8800, ABB TolatFlow, Emerson FloBoss S600 (previously
known as Daniel DanPac S600), Schneider Electric Realflo
#RSAC
OIL STORAGE
33
Risks
Plant Sabotage/Shutdown, Equipment damage, Production Disruption, Compliance violation, Safety
violation
Description
Consist of 10-100+ tanks with 1-50m barrels
Tank Inventory Systems (TIA) collects data from special tank gauging systems
Accurate records of volumes and history are kept for Forecasting for stock control
Tank level deviations can result in hazardous events such as a tank overfilling, liquefied gas flashing,
etc.
Systems
Terminal Management Systems, Tank Inventory Systems, Tank Management Systems
#RSAC
Tank Inventory Systems
34
Terminal Management
Honeywell Enfaf TM BOX (connected with IT)
Emerson Syncade Terminal Logistics (connected with IT)
Emerson Rosemount TankMaster WinOpi
View and control commands
Change alarm (Level, Temperature, Pressure)
Send management commands servo tanks (Freeze, Lock)
#RSAC
Enterprise Applications Security in Oil and Gas
35
#RSAC
Enterprise usage: Business Applications
36
85% of Fortune 2000 Oil and Gas companies use SAP
#RSAC
Enterprise usage: Business Applications
37
70 million barrels per day of oil are produced by companies
using SAP solutions
(75% of total Oil production)
#RSAC
SAP in Oil and Gas
38
According to SAP:
..platform for operations and
maintenance, to enable you to gather,
analyze, decide, and execute across
the many elements that drive
performance of assets….
#RSAC
Enterprise applications VS Oil And Gas
processes
39
PPM (Project portfolio management)
ALM (Asset Lifecycle Management)
LIMS (Laboratory Information Management System)
PAS (Production Accounting System)
ERP (Enterprise Resource Planning)
+ HR, CRM, PLM, SRM, BI/BW, SCM
#RSAC
Enterprise applications
40
PPM <-> Exploration
ALM <-> Refinery, Separation, etc.
LIMS <-> Refinery, Separation
PAS <-> Tank Inventory, Metering
ERP <-> Tank Inventory, Metering
+ HR, CRM, PLM, SRM, BI/BW, SCM
#RSAC
Project Portfolio Management (PPM)
41
Risks:
Espionage – information about new explorations
Fraud – improper management decisions, lost profits
Advantages:
Enhancing visibility and transparency
Examples:
SAP PPM, Oracle Primavera, MS Project, MS SharePoint
#RSAC
Asset Management and Operational Integrity
42
Risks:
Fraud – fake data about asset conditions
Sabotage - Physical damage to production and engineering devices
Compliance Violation – Data manipulation to give an illusion of Compliance
Advantages:
Maintain integrity of your physical assets
Manage emissions, hazardous substances, and product and regulatory compliances
Applications:
SAP PM (Plant Maintenance), SAP EAM, AssetWise APM, Oracle EAM, Avantis, IBM
Maximo, Aspentech PIMS
#RSAC
LIMS (Laboratory Information Management)
43
Risks
Fraud – modifying sample data results
Espionage – stealing secret information
Sabotage – publication of non-compliant results, denial of service attacks
Advantages:
quality control of the samples, utilized equipment and inventory
the storage, inspection, assignment, approval, and compilation of the sample data for
reporting and/or further analysis
Examples:
LabWare, thermoscientific, AspenPIMS and In-house developments on Oracle DB
#RSAC
Production Accounting
44
Risks
Supply chain Availability – direct impact on cost effectiveness
Fraud – Manipulations with quantities
Advantages:
Production accounting
Automated data collection and validation
Forward looking production planning
Examples
SAP IS-OIL PRA, SAP ERP MM-IM, Honeywell PAR
#RSAC
ERP
45
Risks
Supply chain Availability – direct impact on cost effectiveness
Fraud – Manipulations with quantities
Advantages:
Forward looking production planning
Automated data collection and validation
Analyze production deferments
Production accounting
Systems
SAP ECC IS-OIL, SAP IS-OIL PRA, Honeywell PAR, Oracle JDE Manufacturing Accounting
#RSAC
Enterprise apps security
Ways to compromise SAP ERP:
Vulnerabilities
Misconfigurations
Unnecessary privileges
Custom code issues
#RSAC
Vulnerabilities in SAP and Oracle
47
Only one vulnerability would suffice to jeopardize ALL business-critical data
#RSAC
Misconfigurations in SAP
48
~1500 General profile parameters
~1200 Web applications to configure
~700 web services to secure
~100 specific management commands to filter
~100 specific parameters for each of the 50 modules (FI, HR, Portal, MM,
CRM, SRM, PLM, Industry solutions…)
http://erpscan.com/wp-content/uploads/publications/EASSEC-PVAG-
ABAP.pdf
#RSAC
Custom code issues in SAP, Oracle and MS
49
SAP’s - ABAP, XSJS, JAVA, JavaScript UI5
Oracle’s - PeopleCode, PL/SQL
Microsoft’s - X++
http://erpscan.com/wp-content/uploads/publications/3000-SAP-notes-Analysis-by-ERPScan.pdf
#RSAC
Unnecessary privileges in ERP
50
Critical privileges and SoD issues
For example: Create vendor + Approve payment order
200-500 Rules for typical application
500k conflicts in typical company after first audit
More on ERP Security:
https://erpscan.com/research/white-papers/
#RSAC
Security of Connections between IT and OT
51
#RSAC
IT/OT connection looks like this
52
#RSAC
Or like this
53
#RSAC
From IT to OT. How they connected
54
Historian Process Integration (OT to OT/ OT to IT)
OSISoft PI, Aspen Info Plus 21, Honeywell PHD, Rolta Oneview
Enterprise Service Bus (IT to IT/ IT to OT)
SAP PI
IBM Websphere ESB
Microsoft BizTalk
Oracle ESB
Other (IT to OT/ OT to IT)
SAP xMII
#RSAC
IT and OT, SAP example
55
#RSAC
SAP SAP xMII overview
56
Connects manufacturing with enterprise business processes, provides
information to improve production performance
On top of SAP Netweaver J2EE (with its vulnerabilities)
Located on the corporate network
Has some vulnerabilities
#RSAC
Attack Surface (SAP xMII Security):
57
Database links to xMII from systems such as LIMS
SAP J2EE Platform vulnerabilities (core of xMII)
SAP xMII vulnerabilities
SAP RFC links from ERP to xMII
Shared SSH keys
Similar passwords
Others
#RSAC
SAP Plant Connectivity
58
#RSAC
SAP PCo overview
59
Bridge between the industrial world and SAP Manufacturing modules
.NET application for Windows
Usual pipeline Source→ Processing → Destination
Source:
OPC server (MatrikonOPC, KEPServerEX) or DCS
Destination:
SAP HANA, SAP XI, SAP xMII, LIMS, DB…
Agent: Windows service that does the polling
#RSAC
Hacking SAP Plant Connectivity
60
Connections with IT systems (MES, LIMS, PI, Custom)
Domain credentials (if improperly secured)
SAP xMII connections (password decryption)
SAP PCo vulnerabilities
SAP PCo extensions
Similar passwords
#RSAC
SAP Pco/SAP xMII Attacks
61
Traffic modification: attacks based on the fact that the MII-PCo
connection is not authenticated by default:
Fake Pco (Fraud)
Kill the actual PCo and show that everything is OK in MII
MITM + selective modification
Steal your oil, but tank level doesn't change
Protocol attack (Sabotage)
XML Protocol parsing on the PCo side
Vulnerabilities found (Kill agent + mem leak) (SAP Note 2238619)
#RSAC
62
Now they are inside your OT network
and can do whatever they want.
there is no Air Gap!
#RSAC
Post-exploitation: Access to DCS/OPC/SCADA
63
SAP Plant Connectivity interacts with DCS/OPC/PLC
On the same workstation
Required when configuring some DCS/SCADA systems
On the same network
Example: OPC vulnerabilities
KEPServerEX Resource exhaustion https://ics-cert.us-cert.gov/advisories/ICSA-15-055-02
KEPServerEX Input Validation https://ics-cert.us-cert.gov/advisories/ICSA-13-226-01
MatrikonOPC Gateway DoS https://ics-cert.us-cert.gov/advisories/ICSA-13-106-01
MatricanOPC DoS (0-day)
#RSAC
DEMO
64
#RSAC
Oil and Gas attack vectors
65
Oil market fraud attack:
Imagine what would happen if a cyber criminal uploads a malware that dynamically
changes oil stock figures for all Oil and Gas companies where SAP is implemented.
Attackers will be able to deliberately understate data about Oil in stocks.
Plant equipment sabotage attack
Hackers can spoof a report about equipment status in a remote facility. Companies will
spend a lot of time and money to investigate the incident
Plant Destruction attack
With access to BMS systems, via SAP Pco and SAP xMII hackers can perform physical
attacks.
#RSAC
How does one go about securing it?
66
#RSAC
Apply
Step 1 Next Month
Protect your ERPs and other business applications (Automatic: Scanning and
Monitoring tools)
Step 2 Next Quarter
Review all connections (Semi-Automatic/Manual)
Step 3 This Year
Secure connections where possible (Manual)
#RSAC
How to apply ERP Security
68
Business security (SoD)
Prevents attacks or mistakes made by insiders
Code security
Prevents attacks or mistakes made by developers
Application platform security
Prevents unauthorized access both within corporate network
and from remote attackers
#RSAC
About
69
a.polyakov@erpscan.com
228 Hamilton Avenue, Fl. 3,
Palo Alto, CA. 94301
USA HQ
www.erpscan.com
info@erpscan.com

More Related Content

What's hot

Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...John Kingsley
 
Cost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseCost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseIQPC
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?Lars Neupart
 
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Living Online
 
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts Mike Boudreaux
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Mike Boudreaux
 
Application of Combustion Analyzers in Safety Instrumented Systems
Application of Combustion Analyzers in Safety Instrumented SystemsApplication of Combustion Analyzers in Safety Instrumented Systems
Application of Combustion Analyzers in Safety Instrumented SystemsBelilove Company-Engineers
 
Strategic approach to managing Environmentally Critical Elements within SECEs.
Strategic approach to managing Environmentally Critical Elements within SECEs.Strategic approach to managing Environmentally Critical Elements within SECEs.
Strategic approach to managing Environmentally Critical Elements within SECEs.Lloyd's Register Energy
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systemsSaiful Chowdhury
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001PECB
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Luis Atencio
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixTheAnfieldGroup
 
Asset Integrity Management approach to achieve excellence in Process Safety
Asset Integrity Management approach to achieve excellence in Process SafetyAsset Integrity Management approach to achieve excellence in Process Safety
Asset Integrity Management approach to achieve excellence in Process SafetyChandrashekhar Kulkarni
 
Best Practices in SIS Documentation
Best Practices in SIS DocumentationBest Practices in SIS Documentation
Best Practices in SIS DocumentationEmerson Exchange
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
IEC 62061 introduction
IEC 62061 introductionIEC 62061 introduction
IEC 62061 introductionKoenLeekens
 
Functional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling IndustryFunctional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling IndustryLloyd's Register Energy
 

What's hot (20)

Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
Safety instrumented functions (sif) safety integrity level (sil) evaluation t...
 
Cost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety CaseCost Effective Outcomes from FPSO Safety Case
Cost Effective Outcomes from FPSO Safety Case
 
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?How Does the New ISO 27001 Impact Your IT Risk Management Processes?
How Does the New ISO 27001 Impact Your IT Risk Management Processes?
 
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
Practical Safety Instrumentation & Emergency Shutdown Systems for Process Ind...
 
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
Safety Lifecycle Management - Emerson Exchange 2010 - Meet the Experts
 
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
Part 4 of 6 - Analysis Phase - Safety Lifecycle Seminar - Emerson Exchange 2010
 
Application of Combustion Analyzers in Safety Instrumented Systems
Application of Combustion Analyzers in Safety Instrumented SystemsApplication of Combustion Analyzers in Safety Instrumented Systems
Application of Combustion Analyzers in Safety Instrumented Systems
 
Strategic approach to managing Environmentally Critical Elements within SECEs.
Strategic approach to managing Environmentally Critical Elements within SECEs.Strategic approach to managing Environmentally Critical Elements within SECEs.
Strategic approach to managing Environmentally Critical Elements within SECEs.
 
1. safety instrumented systems
1. safety instrumented systems1. safety instrumented systems
1. safety instrumented systems
 
Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001Best Practices in Auditing ISO/IEC 27001
Best Practices in Auditing ISO/IEC 27001
 
Process safety management system
Process safety management systemProcess safety management system
Process safety management system
 
Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511Safety life cycle seminar IEC61511
Safety life cycle seminar IEC61511
 
Cyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott MixCyber Security Standards Update: Version 5 by Scott Mix
Cyber Security Standards Update: Version 5 by Scott Mix
 
Infosec Audit Lecture_4
Infosec Audit Lecture_4Infosec Audit Lecture_4
Infosec Audit Lecture_4
 
Asset Integrity Management approach to achieve excellence in Process Safety
Asset Integrity Management approach to achieve excellence in Process SafetyAsset Integrity Management approach to achieve excellence in Process Safety
Asset Integrity Management approach to achieve excellence in Process Safety
 
Best Practices in SIS Documentation
Best Practices in SIS DocumentationBest Practices in SIS Documentation
Best Practices in SIS Documentation
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
IEC 62061 introduction
IEC 62061 introductionIEC 62061 introduction
IEC 62061 introduction
 
Functional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling IndustryFunctional Safety (SIL) in the Subsea and Drilling Industry
Functional Safety (SIL) in the Subsea and Drilling Industry
 
Sil presentation
Sil presentationSil presentation
Sil presentation
 

Viewers also liked

Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas mariaidga
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.360factors
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing OverviewTawanda Douglas Muringani
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyHoneywell
 
Aberdeen Oil & Gas Event - Introduction to the AWS Cloud
Aberdeen Oil & Gas Event - Introduction to the AWS CloudAberdeen Oil & Gas Event - Introduction to the AWS Cloud
Aberdeen Oil & Gas Event - Introduction to the AWS CloudAmazon Web Services
 
Intro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS CloudIntro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS CloudAmazon Web Services
 
Four Steps Toward a Digital Oilfield Future
Four Steps Toward a Digital Oilfield FutureFour Steps Toward a Digital Oilfield Future
Four Steps Toward a Digital Oilfield FutureGE Canada
 
2015 Oil and Gas Digital and Technology Trends Survey
2015 Oil and Gas Digital and Technology Trends Survey2015 Oil and Gas Digital and Technology Trends Survey
2015 Oil and Gas Digital and Technology Trends Surveyaccenture
 
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...Connected Futures
 

Viewers also liked (10)

Cyber Security for Oil and Gas
Cyber Security for Oil and Gas Cyber Security for Oil and Gas
Cyber Security for Oil and Gas
 
Palo Alto
Palo AltoPalo Alto
Palo Alto
 
Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.Cyber Security IT GRC Management Model and Methodology.
Cyber Security IT GRC Management Model and Methodology.
 
Security in cloud (and grid) computing Overview
Security in cloud  (and grid) computing OverviewSecurity in cloud  (and grid) computing Overview
Security in cloud (and grid) computing Overview
 
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case StudyAccenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
Accenture & NextNine – Medium Size Oil & Gas Company Cyber Security Case Study
 
Aberdeen Oil & Gas Event - Introduction to the AWS Cloud
Aberdeen Oil & Gas Event - Introduction to the AWS CloudAberdeen Oil & Gas Event - Introduction to the AWS Cloud
Aberdeen Oil & Gas Event - Introduction to the AWS Cloud
 
Intro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS CloudIntro to High Performance Computing in the AWS Cloud
Intro to High Performance Computing in the AWS Cloud
 
Four Steps Toward a Digital Oilfield Future
Four Steps Toward a Digital Oilfield FutureFour Steps Toward a Digital Oilfield Future
Four Steps Toward a Digital Oilfield Future
 
2015 Oil and Gas Digital and Technology Trends Survey
2015 Oil and Gas Digital and Technology Trends Survey2015 Oil and Gas Digital and Technology Trends Survey
2015 Oil and Gas Digital and Technology Trends Survey
 
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
A New Reality for Oil & Gas: Complex Market Dynamics Create an Urgent Need to...
 

Similar to Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil

Scada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraScada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraRahul Mehra
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC ProjectERPScan
 
CTQ Brochure Rev1
CTQ Brochure Rev1CTQ Brochure Rev1
CTQ Brochure Rev1Don Kitchen
 
CTQ Brochure Rev1
CTQ Brochure Rev1CTQ Brochure Rev1
CTQ Brochure Rev1Don Kitchen
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPERPScan
 
ScadaProject.com
ScadaProject.comScadaProject.com
ScadaProject.comSyncteam
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsEnergySec
 
ICS Industrial Controls Brochure
ICS Industrial Controls BrochureICS Industrial Controls Brochure
ICS Industrial Controls BrochurejdeanEE
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applicationsERPScan
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessERPScan
 
Efficiency environment and innovation
Efficiency environment and innovationEfficiency environment and innovation
Efficiency environment and innovationServizi a rete
 
Case Study - Safety vs Profitabilty for FPSO Operations
Case Study - Safety vs Profitabilty for FPSO OperationsCase Study - Safety vs Profitabilty for FPSO Operations
Case Study - Safety vs Profitabilty for FPSO OperationsAlvin CJ Chin
 

Similar to Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil (20)

Scada Classification By-Rahul Mehra
Scada Classification By-Rahul MehraScada Classification By-Rahul Mehra
Scada Classification By-Rahul Mehra
 
Skillssp 1
Skillssp 1Skillssp 1
Skillssp 1
 
Skills_SP
Skills_SPSkills_SP
Skills_SP
 
EAS-SEC Project
EAS-SEC ProjectEAS-SEC Project
EAS-SEC Project
 
CTQ Brochure Rev1
CTQ Brochure Rev1CTQ Brochure Rev1
CTQ Brochure Rev1
 
CTQ Brochure Rev1
CTQ Brochure Rev1CTQ Brochure Rev1
CTQ Brochure Rev1
 
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERPBusiness breakdown vulnerabilities in ERP via ICS and ICS via ERP
Business breakdown vulnerabilities in ERP via ICS and ICS via ERP
 
PROFESSIONAL DEVELOPMENT
PROFESSIONAL DEVELOPMENTPROFESSIONAL DEVELOPMENT
PROFESSIONAL DEVELOPMENT
 
Miramar
MiramarMiramar
Miramar
 
Miramar
MiramarMiramar
Miramar
 
ScadaProject.com
ScadaProject.comScadaProject.com
ScadaProject.com
 
Slide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and MitigationsSlide Griffin - Practical Attacks and Mitigations
Slide Griffin - Practical Attacks and Mitigations
 
ICS Industrial Controls Brochure
ICS Industrial Controls BrochureICS Industrial Controls Brochure
ICS Industrial Controls Brochure
 
Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications5 real ways to destroy business by breaking SAP applications
5 real ways to destroy business by breaking SAP applications
 
SAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big businessSAP security landscape. How to protect(hack) your(their) big business
SAP security landscape. How to protect(hack) your(their) big business
 
SCADA of the Future
SCADA of the FutureSCADA of the Future
SCADA of the Future
 
Efficiency environment and innovation
Efficiency environment and innovationEfficiency environment and innovation
Efficiency environment and innovation
 
Case Study - Safety vs Profitabilty for FPSO Operations
Case Study - Safety vs Profitabilty for FPSO OperationsCase Study - Safety vs Profitabilty for FPSO Operations
Case Study - Safety vs Profitabilty for FPSO Operations
 
Skillssp 1
Skillssp 1Skillssp 1
Skillssp 1
 

More from Priyanka Aash

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsPriyanka Aash
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfPriyanka Aash
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfPriyanka Aash
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfPriyanka Aash
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfPriyanka Aash
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfPriyanka Aash
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfPriyanka Aash
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdfPriyanka Aash
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfPriyanka Aash
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfPriyanka Aash
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfPriyanka Aash
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldPriyanka Aash
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksPriyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Priyanka Aash
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Priyanka Aash
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsPriyanka Aash
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security GovernancePriyanka Aash
 

More from Priyanka Aash (20)

Digital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOsDigital Personal Data Protection (DPDP) Practical Approach For CISOs
Digital Personal Data Protection (DPDP) Practical Approach For CISOs
 
Verizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdfVerizon Breach Investigation Report (VBIR).pdf
Verizon Breach Investigation Report (VBIR).pdf
 
Top 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdfTop 10 Security Risks .pptx.pdf
Top 10 Security Risks .pptx.pdf
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Generative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdfGenerative AI and Security (1).pptx.pdf
Generative AI and Security (1).pptx.pdf
 
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdfEVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
EVERY ATTACK INVOLVES EXPLOITATION OF A WEAKNESS.pdf
 
DPDP Act 2023.pdf
DPDP Act 2023.pdfDPDP Act 2023.pdf
DPDP Act 2023.pdf
 
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdfCyber Truths_Are you Prepared version 1.1.pptx.pdf
Cyber Truths_Are you Prepared version 1.1.pptx.pdf
 
Cyber Crisis Management.pdf
Cyber Crisis Management.pdfCyber Crisis Management.pdf
Cyber Crisis Management.pdf
 
CISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdfCISOPlatform journey.pptx.pdf
CISOPlatform journey.pptx.pdf
 
Chennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdfChennai Chapter.pptx.pdf
Chennai Chapter.pptx.pdf
 
Cloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdfCloud attack vectors_Moshe.pdf
Cloud attack vectors_Moshe.pdf
 
Stories From The Web 3 Battlefield
Stories From The Web 3 BattlefieldStories From The Web 3 Battlefield
Stories From The Web 3 Battlefield
 
Lessons Learned From Ransomware Attacks
Lessons Learned From Ransomware AttacksLessons Learned From Ransomware Attacks
Lessons Learned From Ransomware Attacks
 
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
Emerging New Threats And Top CISO Priorities In 2022 (Chennai)
 
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
Emerging New Threats And Top CISO Priorities In 2022 (Mumbai)
 
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
Emerging New Threats And Top CISO Priorities in 2022 (Bangalore)
 
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow LogsCloud Security: Limitations of Cloud Security Groups and Flow Logs
Cloud Security: Limitations of Cloud Security Groups and Flow Logs
 
Cyber Security Governance
Cyber Security GovernanceCyber Security Governance
Cyber Security Governance
 
Ethical Hacking
Ethical HackingEthical Hacking
Ethical Hacking
 

Recently uploaded

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....rightmanforbloodline
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMKumar Satyam
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityWSO2
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistandanishmna97
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governanceWSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxRustici Software
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingEdi Saputra
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Orbitshub
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontologyjohnbeverley2021
 

Recently uploaded (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
TEST BANK For Principles of Anatomy and Physiology, 16th Edition by Gerard J....
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 

Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil

  • 1. SESSION ID: #RSAC Alexander Polyakov Cybersecurity for Oil and Gas Industries: How Hackers Can Steal Oil HT-F02 CTO ERPScan @sh2kerr
  • 2. #RSAC About ERPScan 2 The only 360-degree SAP Security solution - ERPScan Security Monitoring Suite for SAP and Oracle Leader by the number of acknowledgements from SAP ( 250+ ) and Oracle (40+) 80+ presentations key security conferences worldwide 30+ Awards and nominations Research team – 20+ experts with experience in different areas of security from ERP to ICS and Mobile Offices in Palo Alto, Amsterdam, Copenhagen, Sidney
  • 4. #RSAC How does traditional VAPT works 4 A company hire experts for VAPT service or Product Those specialists run some pentesting tools They (may) manually test vulnerabilities, escalate privileges and as a result write report about vulnerabilities Report looks like “we found vulnerability X on the server Y look at the black screenshot with command line”.
  • 6. #RSAC Why? 6 Everybody know that there are vulnerabilities in almost every system The question now how dangerous are they how easy is to exploit them what can happen after the exploitation? and what kind of REAL risks to YOUR organization it provides.
  • 8. #RSAC Why Oil and Gas? 8 Critical Industry-Specific And I know it )
  • 9. #RSAC Why Oil and Gas? 9 PS: And something strange is happening here )
  • 11. #RSAC Upstream: Critical processes and systems 11 Extraction (Drilling) Gathering (From earth to separators) Separation (Separate oil, gas and water) Gas compression (Prepare for storage and transport) Temporary Oil Storage (Temporarily store before loading) Waste disposal (Water disposal) Metering (Calculate quantity before loading)
  • 12. #RSAC Midstream: Critical processes and systems 12 Terminal management (Obtain oil from upstream) Gas Processing (Separate natural gas and NGL) Gas Transportation (Transfer gas to storage via pipelines) Oil transportation (Transfer oil to storage via pipeline/Truck/Barge/Rail) Base load Gas storage (Temporary and long-term) Peak load Gas Storage LNG Storage Oil Storage (Long-term oil storage)
  • 13. #RSAC Downstream: Critical processes and systems 13 Refining (Processing of Crude Oil) Oil Petrochemicals (Fabrication of base chemicals and plastics) Gas Distribution (Deliver gas to utilities) Oil Wholesale (Deliver petrol to 3rd parties) Oil Retail (Deliver petrol to end users)
  • 16. #RSAC What can happen? 16 Plant Sabotage/Shutdown Equipment damage Utilities Interruption Production Disruption (Stop or pause production) Product Quality (bad oil and gas quality) Undetected Spills Illegal pipeline taping Compliance violation (Pollution) Safety violation (Death or injury)
  • 18. #RSAC Three aspects of Oil and Gas Cyber Security 18
  • 19. #RSAC When we speak about securing oil and gas companies we should cover Operational Technology security Enterprise Application security Connections security Three aspects of Oil and Gas Cyber Security 19
  • 20. #RSAC ICS Security in Oil and Gas
  • 21. #RSAC Oil and Gas Cyber-Security (OT part) 21 3 Areas: Upstream Midstream Downstream 20+ processes: Separation Drilling ……… 100+ System Types: Burner Management Fiscal Metering …. 1000+ Solutions from hundreds of vendors: Emerson Rockwell Siemens ….
  • 22. #RSAC Lets look at those systems 22 Burner Management System (Gas Oil Separation) Metering (Fiscal Metering System (Metering) Tank Inventory System (Oil Storage )
  • 23. #RSAC Gas Oil Separation 23 Risks: Product Quality, Equipment damage, Plant Sabotage, Production Disruption, Compliance violation Details Separate Oil, Gas and Water using multiple stages Systems Burner Management Systems (BMS) Compressor Control System (CCS) Vibration Monitoring System (VMS)
  • 24. #RSAC SEPARATION: Burner Management System (BMS) 24 Description Used in a variety of applications: Separators, tanks, heaters, Incinerators, flare stacks, etc. Systems: Management: Emerson’s DeltaV SIS, Invensys BMS, Honeywell’s BMS, Combustex BMS-2000, Allen-Bradley, Siemens SIMATIC BMS400F PLC vendors: GE, Modicon, Allen-Bradley, Koyo, Siemens Flame sensors: Fireye, PPC, Honeywell, IRIS, Coen
  • 25. #RSAC SEPARATION: Burner Management System (BMS) 25 Simple Burner Management System https://cache.industry.siemens.com/dl/files/036/109477036/att_856487/v2/109477036_Burner_Application_Example_TIAP_DOC_v102_en .pdf
  • 26. #RSAC SEPARATION: Burner Management System (BMS) 26 OK, what if somebody will have access to BMS? What he can do? Any physical attacks?
  • 27. #RSAC SEPARATION: Burner Management System (BMS) 27 If an attacker wants to commit sabotage and stop operations by destructing burning process, he needs to control any of the sources of flammable mixtures
  • 28. #RSAC Flammable mixture sources: 28 Oil or gas leaking into the combustion chamber through the burner as a result of leaking fuel shut off valves. insufficient combustion air resulting unburnt fuel in the dust collector. oil is not properly purged Quenching of the flame by cold dust entering the furnace Fuel entering the furnace as a result of repeated unsuccessful ignition attempts. This is the significant risk with oil firing, A typical cause is a cold oil remaining in pipes during a shutdown
  • 29. #RSAC SEPARATION: Burner Management System (BMS) 29 The main function of the BMS is to allow and ensure the safe start-up, operation, and shutdown of the Fired Heater. Unauthorized access to BMS can lead to multiple risks including Explosion. The simplest attack on BMS System is to turn off the purge. Cold oil left in pipes during previous shutdowns can burn and damage the equipment.
  • 30. #RSAC Metering 30 Risks: Product Quality, Monetary loss Details Analyzes density, viscosity of content, temperature, and pressure Divided into several runs Systems Fiscal Metering System Liquid Flow Metering Gas Flow Metering System Wet Gas Metering System
  • 31. #RSAC Fiscal Metering 31 Description Custody transfer, or fiscal metering, occurs when fluids or gases are exchanged between parties. Payment is a function of the amount of fluid or gas transferred. A small error in measurement leading to financial exposure Over a year, the 0.1% error would amount to a difference of $50m. The engine of a custody transfer or fiscal metering installation is the flow computer.
  • 32. #RSAC Fiscal Metering Systems 32 Production Accounting System FlawCall – FlawCall Enterprise (connected with IT) KROHNE SynEnergy (connected with IT) Honeywell’s Experion® Process Knowledge System (PKS), MeterSuite™ Schneider Electric InFusion Schneider Electric SCADAPack Flow computing KROHNE Summit 8800, ABB TolatFlow, Emerson FloBoss S600 (previously known as Daniel DanPac S600), Schneider Electric Realflo
  • 33. #RSAC OIL STORAGE 33 Risks Plant Sabotage/Shutdown, Equipment damage, Production Disruption, Compliance violation, Safety violation Description Consist of 10-100+ tanks with 1-50m barrels Tank Inventory Systems (TIA) collects data from special tank gauging systems Accurate records of volumes and history are kept for Forecasting for stock control Tank level deviations can result in hazardous events such as a tank overfilling, liquefied gas flashing, etc. Systems Terminal Management Systems, Tank Inventory Systems, Tank Management Systems
  • 34. #RSAC Tank Inventory Systems 34 Terminal Management Honeywell Enfaf TM BOX (connected with IT) Emerson Syncade Terminal Logistics (connected with IT) Emerson Rosemount TankMaster WinOpi View and control commands Change alarm (Level, Temperature, Pressure) Send management commands servo tanks (Freeze, Lock)
  • 36. #RSAC Enterprise usage: Business Applications 36 85% of Fortune 2000 Oil and Gas companies use SAP
  • 37. #RSAC Enterprise usage: Business Applications 37 70 million barrels per day of oil are produced by companies using SAP solutions (75% of total Oil production)
  • 38. #RSAC SAP in Oil and Gas 38 According to SAP: ..platform for operations and maintenance, to enable you to gather, analyze, decide, and execute across the many elements that drive performance of assets….
  • 39. #RSAC Enterprise applications VS Oil And Gas processes 39 PPM (Project portfolio management) ALM (Asset Lifecycle Management) LIMS (Laboratory Information Management System) PAS (Production Accounting System) ERP (Enterprise Resource Planning) + HR, CRM, PLM, SRM, BI/BW, SCM
  • 40. #RSAC Enterprise applications 40 PPM <-> Exploration ALM <-> Refinery, Separation, etc. LIMS <-> Refinery, Separation PAS <-> Tank Inventory, Metering ERP <-> Tank Inventory, Metering + HR, CRM, PLM, SRM, BI/BW, SCM
  • 41. #RSAC Project Portfolio Management (PPM) 41 Risks: Espionage – information about new explorations Fraud – improper management decisions, lost profits Advantages: Enhancing visibility and transparency Examples: SAP PPM, Oracle Primavera, MS Project, MS SharePoint
  • 42. #RSAC Asset Management and Operational Integrity 42 Risks: Fraud – fake data about asset conditions Sabotage - Physical damage to production and engineering devices Compliance Violation – Data manipulation to give an illusion of Compliance Advantages: Maintain integrity of your physical assets Manage emissions, hazardous substances, and product and regulatory compliances Applications: SAP PM (Plant Maintenance), SAP EAM, AssetWise APM, Oracle EAM, Avantis, IBM Maximo, Aspentech PIMS
  • 43. #RSAC LIMS (Laboratory Information Management) 43 Risks Fraud – modifying sample data results Espionage – stealing secret information Sabotage – publication of non-compliant results, denial of service attacks Advantages: quality control of the samples, utilized equipment and inventory the storage, inspection, assignment, approval, and compilation of the sample data for reporting and/or further analysis Examples: LabWare, thermoscientific, AspenPIMS and In-house developments on Oracle DB
  • 44. #RSAC Production Accounting 44 Risks Supply chain Availability – direct impact on cost effectiveness Fraud – Manipulations with quantities Advantages: Production accounting Automated data collection and validation Forward looking production planning Examples SAP IS-OIL PRA, SAP ERP MM-IM, Honeywell PAR
  • 45. #RSAC ERP 45 Risks Supply chain Availability – direct impact on cost effectiveness Fraud – Manipulations with quantities Advantages: Forward looking production planning Automated data collection and validation Analyze production deferments Production accounting Systems SAP ECC IS-OIL, SAP IS-OIL PRA, Honeywell PAR, Oracle JDE Manufacturing Accounting
  • 46. #RSAC Enterprise apps security Ways to compromise SAP ERP: Vulnerabilities Misconfigurations Unnecessary privileges Custom code issues
  • 47. #RSAC Vulnerabilities in SAP and Oracle 47 Only one vulnerability would suffice to jeopardize ALL business-critical data
  • 48. #RSAC Misconfigurations in SAP 48 ~1500 General profile parameters ~1200 Web applications to configure ~700 web services to secure ~100 specific management commands to filter ~100 specific parameters for each of the 50 modules (FI, HR, Portal, MM, CRM, SRM, PLM, Industry solutions…) http://erpscan.com/wp-content/uploads/publications/EASSEC-PVAG- ABAP.pdf
  • 49. #RSAC Custom code issues in SAP, Oracle and MS 49 SAP’s - ABAP, XSJS, JAVA, JavaScript UI5 Oracle’s - PeopleCode, PL/SQL Microsoft’s - X++ http://erpscan.com/wp-content/uploads/publications/3000-SAP-notes-Analysis-by-ERPScan.pdf
  • 50. #RSAC Unnecessary privileges in ERP 50 Critical privileges and SoD issues For example: Create vendor + Approve payment order 200-500 Rules for typical application 500k conflicts in typical company after first audit More on ERP Security: https://erpscan.com/research/white-papers/
  • 51. #RSAC Security of Connections between IT and OT 51
  • 54. #RSAC From IT to OT. How they connected 54 Historian Process Integration (OT to OT/ OT to IT) OSISoft PI, Aspen Info Plus 21, Honeywell PHD, Rolta Oneview Enterprise Service Bus (IT to IT/ IT to OT) SAP PI IBM Websphere ESB Microsoft BizTalk Oracle ESB Other (IT to OT/ OT to IT) SAP xMII
  • 55. #RSAC IT and OT, SAP example 55
  • 56. #RSAC SAP SAP xMII overview 56 Connects manufacturing with enterprise business processes, provides information to improve production performance On top of SAP Netweaver J2EE (with its vulnerabilities) Located on the corporate network Has some vulnerabilities
  • 57. #RSAC Attack Surface (SAP xMII Security): 57 Database links to xMII from systems such as LIMS SAP J2EE Platform vulnerabilities (core of xMII) SAP xMII vulnerabilities SAP RFC links from ERP to xMII Shared SSH keys Similar passwords Others
  • 59. #RSAC SAP PCo overview 59 Bridge between the industrial world and SAP Manufacturing modules .NET application for Windows Usual pipeline Source→ Processing → Destination Source: OPC server (MatrikonOPC, KEPServerEX) or DCS Destination: SAP HANA, SAP XI, SAP xMII, LIMS, DB… Agent: Windows service that does the polling
  • 60. #RSAC Hacking SAP Plant Connectivity 60 Connections with IT systems (MES, LIMS, PI, Custom) Domain credentials (if improperly secured) SAP xMII connections (password decryption) SAP PCo vulnerabilities SAP PCo extensions Similar passwords
  • 61. #RSAC SAP Pco/SAP xMII Attacks 61 Traffic modification: attacks based on the fact that the MII-PCo connection is not authenticated by default: Fake Pco (Fraud) Kill the actual PCo and show that everything is OK in MII MITM + selective modification Steal your oil, but tank level doesn't change Protocol attack (Sabotage) XML Protocol parsing on the PCo side Vulnerabilities found (Kill agent + mem leak) (SAP Note 2238619)
  • 62. #RSAC 62 Now they are inside your OT network and can do whatever they want. there is no Air Gap!
  • 63. #RSAC Post-exploitation: Access to DCS/OPC/SCADA 63 SAP Plant Connectivity interacts with DCS/OPC/PLC On the same workstation Required when configuring some DCS/SCADA systems On the same network Example: OPC vulnerabilities KEPServerEX Resource exhaustion https://ics-cert.us-cert.gov/advisories/ICSA-15-055-02 KEPServerEX Input Validation https://ics-cert.us-cert.gov/advisories/ICSA-13-226-01 MatrikonOPC Gateway DoS https://ics-cert.us-cert.gov/advisories/ICSA-13-106-01 MatricanOPC DoS (0-day)
  • 65. #RSAC Oil and Gas attack vectors 65 Oil market fraud attack: Imagine what would happen if a cyber criminal uploads a malware that dynamically changes oil stock figures for all Oil and Gas companies where SAP is implemented. Attackers will be able to deliberately understate data about Oil in stocks. Plant equipment sabotage attack Hackers can spoof a report about equipment status in a remote facility. Companies will spend a lot of time and money to investigate the incident Plant Destruction attack With access to BMS systems, via SAP Pco and SAP xMII hackers can perform physical attacks.
  • 66. #RSAC How does one go about securing it? 66
  • 67. #RSAC Apply Step 1 Next Month Protect your ERPs and other business applications (Automatic: Scanning and Monitoring tools) Step 2 Next Quarter Review all connections (Semi-Automatic/Manual) Step 3 This Year Secure connections where possible (Manual)
  • 68. #RSAC How to apply ERP Security 68 Business security (SoD) Prevents attacks or mistakes made by insiders Code security Prevents attacks or mistakes made by developers Application platform security Prevents unauthorized access both within corporate network and from remote attackers
  • 69. #RSAC About 69 a.polyakov@erpscan.com 228 Hamilton Avenue, Fl. 3, Palo Alto, CA. 94301 USA HQ www.erpscan.com info@erpscan.com