SlideShare a Scribd company logo
1 of 32
Download to read offline
Using a CVA to Optimize ICS Upgrade 
Activities During a Turnaround 
Jim Gilsinn 
Kenexis Security
Presenter 
 Jim Gilsinn 
– Senior Investigator, Kenexis Security 
– Current Co-Chair, ISA99 Committee (ISA/IEC 
62443) 
– Current Co-Chair, ISA99 WG2 Security 
Program 
– 23 years engineering, 13 years ICS cyber 
security experience 
– MSEE specializing in control theory
Overview 
 The Situation 
 Understanding Threats to ICS 
 The ICS-CVA Process 
 Using an ICS-CVA for Planning 
 Summary
THE SITUATION
The Challenge 
Security Researcher Plant Manager 
You have 438 Critical Vulnerabilities! 
I could take control of your PLC from the Internet and do …! 
So what? I’m not connected to the Internet. 
I can write a worm that will make the PLC overspeed the turbine and put it into surge! 
Good luck! There is a machine protection system separate from the PLC. 
Well… fine.. You need to patch all these vulnerabilities! 
My next scheduled shutdown is in 330 days. 
Is this important enough to warrant a shutdown?
The Challenge (cont’d) 
Security Researcher Plant Manager 
Of course! 
Why? I don’t process credit cards. I don’t run public websites. 
I can take control of the boiler and blow it up! 
So you set the PLC to over pressure the boiler? 
Yes!!! 
There are relief valves. 
Have a nice day…
The Cyber Security Threat 
 2014 Data Breach Incident Report shows a 3x increase over 2013 
 Over 256 incidents to OT networks in 2013 reported to ICS-CERT 
– Voluntarily reported by ICS owner/operators 
– Most go undetected or unreported 
 Most major vendors have known vulnerabilities reported to ICS-CERT
Customer Concerns 
 Fragile OT networks often caused by comm. problems 
– Unexplained process stoppages 
– Slow HMI updates 
 At-risk or insecure OT networks 
– Discrepancies between business and process support systems 
(e.g. MES, ERP, LIMS, Historians) 
– Unauthorized remote connections to OT networks 
– Unauthorized changes to PLC’s, DCS, or other systems 
– Viruses or malware from OT networks reported by IT staff 
Communication errors & network problems risk: 
– Production uptime 
– Threaten process safety 
– Open the OT network to cyber security threats
ICS Network & Security Failures 
 Intermittent Failures 
– Corrected by logic conditions in the system 
– Minimal to no process interruption 
 Nuisance Trips 
– Corrected by logic conditions and fail safes 
– Minor process interruptions 
 Unplanned outages 
– Handled by maintenance personnel & layers of protection 
– Sustained process interruptions & failures 
 Dangerous failures 
– Kinetic and safety impacts 
– Handled by emergency personnel & layers of protection 
– Extended process interruptions & failures
Risk Management for Plant Managers: 
3 Easy Steps 
 What is it? 
 Is it real? 
 What do I do about it? 
Safety Risks Require Action… 
If you cannot qualify the risk 
AND give a solution, you are 
wasting their time
UNDERSTANDING THREATS TO ICS
Device Vulnerabilities: The Reality 
 Many think, “8:01am – Cyber Attack, 
8:03am – Plant Goes Boom!” 
 Compromising an individual ICS is of limited value 
 Significant failures require compromise & disabling of 
multiple components 
 True exploits are not needed for most parts of the process 
 A combination of factors are required to move from 
nuisance trips to more significant failures 
– Cyber security knowledge 
– Process knowledge 
– ICS knowledge
Attack Modes for ICS 
 Loss of View (LoV) 
 Manipulation of View (MoV) 
 Denial of Control (DoC) 
 Manipulation of Control (MoC) 
 Loss of Control (LoC) 
Model each part of the process in terms 
of how an attacker would bypass 
protective systems
Turbine Overspeed Scenario: 
Process Flow Diagram 
Electrical Power Generation 
with Steam Turbine
Turbine Overspeed Scenario: 
Simplified Turbine Model 
Steam Turbine for 
Power Generation 
Disconnect Safety Valve 
Switch 
Speed 
Transmitter
Turbine Overspeed Scenario: 
Creating the Turbine Overspeed 
 Disable the overspeed trip system 
– Option 1 – “Force” the output of safety valve 
– Option 2 – Freeze the value of the speed transmitter 
 Disconnect the load from generator 
– Option 1 – Command generator disconnect switch to open 
positon 
– Option 2 – Open multiple disconnect switches at power 
distributors or consumers
Turbine Overspeed Scenario: 
Attack Methodology 
 Part 1 – Conduct Surveillance 
 Part 2 – Map Systems 
 Part 3 – Infect & Compromise 
 Part 4 – Exfiltrate Information 
 Part 5 – Prepare Final Attack 
 Part 6 – Initiate Attack for Max Damage
Potential Process Attack Points 
 Controller setpoints 
 I/O values 
 Controller commands 
 Alarm conditions 
 Safety interlocks 
 Interconnected or integrated SIS
THE ICS-CVA PROCESS
Requirements to Conduct an ICS-CVA 
 ICS-CVA = ICS Cyber Vulnerability Assessment 
 Regulatory 
– Annual basis by NERC CIP, CFATS, etc. 
 Standards & Guidelines 
– Periodic basis by ISA/IEC 62443 (ISA-99), NIST 
Cybersecurity Framework, AWWA, NERC, etc.
Conducting an ICS-CVA 
 Understand affect of different systems on OT networks 
– Installed base of equipment 
– Information/IT systems 
 Should be part of validation 
 Recommended to be performed: 
– After initial implementation of ICS 
– After major modifications to ICS 
– Periodically 
 Specific requirements for ICS-CVA defined in regulations, 
standards, & guidelines
The ICS-CVA Process 
 Documentation Collection & Review 
– Network Architecture 
– Piping, Instrumentation, and Engineering Diagrams 
– Asset Inventory 
 Network Traffic Capture 
– Capture traffic (via tcpdump, Wireshark, etc.) at managed 
switches via mirror port for a given time
The ICS-CVA Process (cont’d) 
 Ping Sweep 
– Identify live hosts (via nmap) 
– Verify Asset Inventory 
– Identify Unknown/Rogue Devices 
 Port Scan Per Device 
– Detect open ports & services (via nmap) 
– Identify operating system 
 Service Detection 
– Grab banners from active services (via nmap or netcat) 
– Verify validity of open ports 
– Detect known vulnerable ports/services
The ICS-CVA Process (cont’d) 
 Vulnerability Scanning 
– Automated (via nessus, neXpose, etc.) 
– Manual (via nmap, netcat, metasploit, etc.) 
– Examination of vulnerability database (e.g. NIST, A/V 
vendors, proprietary, etc.) 
 Open-Source Intelligence Collection 
– Determine information leakage of information (via Google, 
Shodan, Maltego, ARIN, Custom Code, etc.) 
– Identify devices exposed to internet 
– Identify leaks of proprietary information (.doc, .pdf, etc.) 
– Determine ease of identifying devices
The ICS-CVA Process (cont’d) 
 Process Vulnerability Analysis 
– P&ID 
– HAZOP for max damage/impact scenarios 
– Zone and conduit & security level analysis 
– Vulnerability analysis with emphasis on physical impacts 
– Failure Modeling 
– Attack Modeling
USING AN ICS-CVA FOR PLANNING
ICS-CVA Results & Recommendations 
 Network improvements 
– Architecture, zones, upgraded infrastructure, layering, etc. 
 Cyber security improvements 
– Patching, policies/procedures, firewalls, etc. 
 Device improvements 
– Upgraded firmware & hardware 
 Facility siting & physical security 
– Barriers to entry 
– Access control 
 SIS in place of controllers 
– Safety interlocks replaced by SIS
Preparing for Turnaround 
 Conduct an ICS-CVA well before turnaround 
– 6-9+ months prior depending on turnaround scope, 
magnitude, duration, etc. 
– Allow for new designs, capital expenditures, personnel 
training, etc. 
 Stage equipment prior to turnaround 
– Prepare equipment with necessary firmware upgrades, 
programs, etc. 
– If possible, test equipment in lab prior to deployment
SUMMARY
Summary 
 Engineering problems require 
engineering solutions! 
 Vulnerability analysis & discovery a 
useful exercise, but only stop at 
device impact 
 Qualifying the threat means that the 
process must be considered 
 ICS-CVA includes all of the above 
 ICS-CVA can be used as a planning 
tool for improvements
Where To Get More Information 
 Jim Gilsinn 
– Email: jim.gilsinn@kenexis.com 
– Phone: +1-614-323-2254 
– Twitter: @JimGilsinn 
– LinkedIn: http://www.linkedin.com/in/jimgilsinn/ 
– SlideShare: http://www.slideshare.net/gilsinnj 
– Website: http://www.kenexis.com
Thank You for Attending! 
Enjoy the rest of the conference.

More Related Content

What's hot

Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing KeynoteDigital Bond
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Digital Bond
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Digital Bond
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaDigital Bond
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar Nnull The Open Security Community
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)Byres Security Inc.
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiClubHack
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014Digital Bond
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...Eran Goldstein
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overviewpgmaynard
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghOWASP Delhi
 

What's hot (20)

Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
S4xJapan Closing Keynote
S4xJapan Closing KeynoteS4xJapan Closing Keynote
S4xJapan Closing Keynote
 
Securing SCADA
Securing SCADA Securing SCADA
Securing SCADA
 
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
Process Whitelisting and Resource Access Control For ICS Computers, Kuniyasu ...
 
Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)Using Assessment Tools on ICS (English)
Using Assessment Tools on ICS (English)
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Attacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar AsiaAttacking and Defending Autos Via OBD-II from escar Asia
Attacking and Defending Autos Via OBD-II from escar Asia
 
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar NCritical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
Critical Infrastructure Security Talk At Null Bangalore 13 Feb 2010 Sundar N
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Active Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The FieldActive Directory in ICS: Lessons Learned From The Field
Active Directory in ICS: Lessons Learned From The Field
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
 
Critical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh BelgiCritical Infrastructure Security by Subodh Belgi
Critical Infrastructure Security by Subodh Belgi
 
IEC and cyber security (June 2018)
IEC and cyber security (June 2018)IEC and cyber security (June 2018)
IEC and cyber security (June 2018)
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
API Training 10 Nov 2014
API Training 10 Nov 2014API Training 10 Nov 2014
API Training 10 Nov 2014
 
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
2016 Top 10 Critical Infrastructures and SCADA/ICS Cyber Security Vulnerabili...
 
CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2CSIRS ICS BCS 2.2
CSIRS ICS BCS 2.2
 
Industrial Control System Security Overview
Industrial Control System Security OverviewIndustrial Control System Security Overview
Industrial Control System Security Overview
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 

Similar to Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade Activities During Turnaround

Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkNathan Wallace, PhD, PE
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsShah Sheikh
 
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortSicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortEnzo M. Tieghi
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsShah Sheikh
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...promediakw
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolShah Sheikh
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?EnergySec
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSChris Sistrunk
 
scada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptxscada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptxsurangagw
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!Shiv Sahni
 
BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALMarina Krotofil
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...TI Safe
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Developing an Effective
Developing an Effective Developing an Effective
Developing an Effective webhostingguy
 

Similar to Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade Activities During Turnaround (20)

ICS security
ICS securityICS security
ICS security
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
IEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel TalkIEEE PES GM 2017 Cybersecurity Panel Talk
IEEE PES GM 2017 Cybersecurity Panel Talk
 
DTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security SolutionsDTS Solution - SCADA Security Solutions
DTS Solution - SCADA Security Solutions
 
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_shortSicurezza Industrie4.0 - E M Tieghi templ Assintel_short
Sicurezza Industrie4.0 - E M Tieghi templ Assintel_short
 
Building a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS EnvironmentsBuilding a Cyber Security Operations Center for SCADA/ICS Environments
Building a Cyber Security Operations Center for SCADA/ICS Environments
 
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
Mr. Sayed Rabbani - Quality Assurance - The 80% of Industrial Control System ...
 
PT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrolPT-DTS SCADA Security using MaxPatrol
PT-DTS SCADA Security using MaxPatrol
 
Where Are All The ICS Attacks?
Where Are All The ICS Attacks?Where Are All The ICS Attacks?
Where Are All The ICS Attacks?
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
DEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICSDEF CON 23 - NSM 101 for ICS
DEF CON 23 - NSM 101 for ICS
 
scada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptxscada-130512133852-phpapp01.pptx
scada-130512133852-phpapp01.pptx
 
SCADA Systems and its security!
SCADA Systems and its security!SCADA Systems and its security!
SCADA Systems and its security!
 
Scada
ScadaScada
Scada
 
BlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINALBlackHat_2015_Slides_Krotofil_FINAL
BlackHat_2015_Slides_Krotofil_FINAL
 
Securing SCADA
Securing SCADASecuring SCADA
Securing SCADA
 
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
CLASS 2018 - Palestra de Shad Harris (Senior Subject Matter Expert on Securit...
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Developing an Effective
Developing an Effective Developing an Effective
Developing an Effective
 

More from Jim Gilsinn

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToJim Gilsinn
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!Jim Gilsinn
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingJim Gilsinn
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Jim Gilsinn
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze itJim Gilsinn
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerJim Gilsinn
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Jim Gilsinn
 

More from Jim Gilsinn (10)

ISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How ToISA/IEC 62443: Intro and How To
ISA/IEC 62443: Intro and How To
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance Testing
 
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze it
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 

Recently uploaded

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessWSO2
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Mark Simos
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialJoão Esperancinha
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Jeffrey Haguewood
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfAarwolf Industries LLC
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...itnewsafrica
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sectoritnewsafrica
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Nikki Chapple
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Nikki Chapple
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...itnewsafrica
 

Recently uploaded (20)

Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Accelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with PlatformlessAccelerating Enterprise Software Engineering with Platformless
Accelerating Enterprise Software Engineering with Platformless
 
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
Tampa BSides - The No BS SOC (slides from April 6, 2024 talk)
 
Kuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorialKuma Meshes Part I - The basics - A tutorial
Kuma Meshes Part I - The basics - A tutorial
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
Email Marketing Automation for Bonterra Impact Management (fka Social Solutio...
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Landscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdfLandscape Catalogue 2024 Australia-1.pdf
Landscape Catalogue 2024 Australia-1.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...Zeshan Sattar- Assessing the skill requirements and industry expectations for...
Zeshan Sattar- Assessing the skill requirements and industry expectations for...
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
4. Cobus Valentine- Cybersecurity Threats and Solutions for the Public Sector
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
Microsoft 365 Copilot: How to boost your productivity with AI – Part two: Dat...
 
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
Microsoft 365 Copilot: How to boost your productivity with AI – Part one: Ado...
 
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
Irene Moetsana-Moeng: Stakeholders in Cybersecurity: Collaborative Defence fo...
 

Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade Activities During Turnaround

  • 1. Using a CVA to Optimize ICS Upgrade Activities During a Turnaround Jim Gilsinn Kenexis Security
  • 2. Presenter  Jim Gilsinn – Senior Investigator, Kenexis Security – Current Co-Chair, ISA99 Committee (ISA/IEC 62443) – Current Co-Chair, ISA99 WG2 Security Program – 23 years engineering, 13 years ICS cyber security experience – MSEE specializing in control theory
  • 3. Overview  The Situation  Understanding Threats to ICS  The ICS-CVA Process  Using an ICS-CVA for Planning  Summary
  • 5. The Challenge Security Researcher Plant Manager You have 438 Critical Vulnerabilities! I could take control of your PLC from the Internet and do …! So what? I’m not connected to the Internet. I can write a worm that will make the PLC overspeed the turbine and put it into surge! Good luck! There is a machine protection system separate from the PLC. Well… fine.. You need to patch all these vulnerabilities! My next scheduled shutdown is in 330 days. Is this important enough to warrant a shutdown?
  • 6. The Challenge (cont’d) Security Researcher Plant Manager Of course! Why? I don’t process credit cards. I don’t run public websites. I can take control of the boiler and blow it up! So you set the PLC to over pressure the boiler? Yes!!! There are relief valves. Have a nice day…
  • 7. The Cyber Security Threat  2014 Data Breach Incident Report shows a 3x increase over 2013  Over 256 incidents to OT networks in 2013 reported to ICS-CERT – Voluntarily reported by ICS owner/operators – Most go undetected or unreported  Most major vendors have known vulnerabilities reported to ICS-CERT
  • 8. Customer Concerns  Fragile OT networks often caused by comm. problems – Unexplained process stoppages – Slow HMI updates  At-risk or insecure OT networks – Discrepancies between business and process support systems (e.g. MES, ERP, LIMS, Historians) – Unauthorized remote connections to OT networks – Unauthorized changes to PLC’s, DCS, or other systems – Viruses or malware from OT networks reported by IT staff Communication errors & network problems risk: – Production uptime – Threaten process safety – Open the OT network to cyber security threats
  • 9. ICS Network & Security Failures  Intermittent Failures – Corrected by logic conditions in the system – Minimal to no process interruption  Nuisance Trips – Corrected by logic conditions and fail safes – Minor process interruptions  Unplanned outages – Handled by maintenance personnel & layers of protection – Sustained process interruptions & failures  Dangerous failures – Kinetic and safety impacts – Handled by emergency personnel & layers of protection – Extended process interruptions & failures
  • 10. Risk Management for Plant Managers: 3 Easy Steps  What is it?  Is it real?  What do I do about it? Safety Risks Require Action… If you cannot qualify the risk AND give a solution, you are wasting their time
  • 12. Device Vulnerabilities: The Reality  Many think, “8:01am – Cyber Attack, 8:03am – Plant Goes Boom!”  Compromising an individual ICS is of limited value  Significant failures require compromise & disabling of multiple components  True exploits are not needed for most parts of the process  A combination of factors are required to move from nuisance trips to more significant failures – Cyber security knowledge – Process knowledge – ICS knowledge
  • 13. Attack Modes for ICS  Loss of View (LoV)  Manipulation of View (MoV)  Denial of Control (DoC)  Manipulation of Control (MoC)  Loss of Control (LoC) Model each part of the process in terms of how an attacker would bypass protective systems
  • 14. Turbine Overspeed Scenario: Process Flow Diagram Electrical Power Generation with Steam Turbine
  • 15. Turbine Overspeed Scenario: Simplified Turbine Model Steam Turbine for Power Generation Disconnect Safety Valve Switch Speed Transmitter
  • 16. Turbine Overspeed Scenario: Creating the Turbine Overspeed  Disable the overspeed trip system – Option 1 – “Force” the output of safety valve – Option 2 – Freeze the value of the speed transmitter  Disconnect the load from generator – Option 1 – Command generator disconnect switch to open positon – Option 2 – Open multiple disconnect switches at power distributors or consumers
  • 17. Turbine Overspeed Scenario: Attack Methodology  Part 1 – Conduct Surveillance  Part 2 – Map Systems  Part 3 – Infect & Compromise  Part 4 – Exfiltrate Information  Part 5 – Prepare Final Attack  Part 6 – Initiate Attack for Max Damage
  • 18. Potential Process Attack Points  Controller setpoints  I/O values  Controller commands  Alarm conditions  Safety interlocks  Interconnected or integrated SIS
  • 20. Requirements to Conduct an ICS-CVA  ICS-CVA = ICS Cyber Vulnerability Assessment  Regulatory – Annual basis by NERC CIP, CFATS, etc.  Standards & Guidelines – Periodic basis by ISA/IEC 62443 (ISA-99), NIST Cybersecurity Framework, AWWA, NERC, etc.
  • 21. Conducting an ICS-CVA  Understand affect of different systems on OT networks – Installed base of equipment – Information/IT systems  Should be part of validation  Recommended to be performed: – After initial implementation of ICS – After major modifications to ICS – Periodically  Specific requirements for ICS-CVA defined in regulations, standards, & guidelines
  • 22. The ICS-CVA Process  Documentation Collection & Review – Network Architecture – Piping, Instrumentation, and Engineering Diagrams – Asset Inventory  Network Traffic Capture – Capture traffic (via tcpdump, Wireshark, etc.) at managed switches via mirror port for a given time
  • 23. The ICS-CVA Process (cont’d)  Ping Sweep – Identify live hosts (via nmap) – Verify Asset Inventory – Identify Unknown/Rogue Devices  Port Scan Per Device – Detect open ports & services (via nmap) – Identify operating system  Service Detection – Grab banners from active services (via nmap or netcat) – Verify validity of open ports – Detect known vulnerable ports/services
  • 24. The ICS-CVA Process (cont’d)  Vulnerability Scanning – Automated (via nessus, neXpose, etc.) – Manual (via nmap, netcat, metasploit, etc.) – Examination of vulnerability database (e.g. NIST, A/V vendors, proprietary, etc.)  Open-Source Intelligence Collection – Determine information leakage of information (via Google, Shodan, Maltego, ARIN, Custom Code, etc.) – Identify devices exposed to internet – Identify leaks of proprietary information (.doc, .pdf, etc.) – Determine ease of identifying devices
  • 25. The ICS-CVA Process (cont’d)  Process Vulnerability Analysis – P&ID – HAZOP for max damage/impact scenarios – Zone and conduit & security level analysis – Vulnerability analysis with emphasis on physical impacts – Failure Modeling – Attack Modeling
  • 26. USING AN ICS-CVA FOR PLANNING
  • 27. ICS-CVA Results & Recommendations  Network improvements – Architecture, zones, upgraded infrastructure, layering, etc.  Cyber security improvements – Patching, policies/procedures, firewalls, etc.  Device improvements – Upgraded firmware & hardware  Facility siting & physical security – Barriers to entry – Access control  SIS in place of controllers – Safety interlocks replaced by SIS
  • 28. Preparing for Turnaround  Conduct an ICS-CVA well before turnaround – 6-9+ months prior depending on turnaround scope, magnitude, duration, etc. – Allow for new designs, capital expenditures, personnel training, etc.  Stage equipment prior to turnaround – Prepare equipment with necessary firmware upgrades, programs, etc. – If possible, test equipment in lab prior to deployment
  • 30. Summary  Engineering problems require engineering solutions!  Vulnerability analysis & discovery a useful exercise, but only stop at device impact  Qualifying the threat means that the process must be considered  ICS-CVA includes all of the above  ICS-CVA can be used as a planning tool for improvements
  • 31. Where To Get More Information  Jim Gilsinn – Email: jim.gilsinn@kenexis.com – Phone: +1-614-323-2254 – Twitter: @JimGilsinn – LinkedIn: http://www.linkedin.com/in/jimgilsinn/ – SlideShare: http://www.slideshare.net/gilsinnj – Website: http://www.kenexis.com
  • 32. Thank You for Attending! Enjoy the rest of the conference.