SlideShare a Scribd company logo
1 of 20
Evaluating System-Level
Cyber Security vs.
ANSI/ISA-62443-3-3
Jim Gilsinn
Kenexis Consulting
June 3-5, 2014 ICSJWG Spring 2014 1
Jim Gilsinn
• Senior Investigator, Cybersecurity @ Kenexis Consulting
• International Society of Automation (ISA)
• Co-Chair, ISA99 Committee
• Co-Chair, ISA99 WG2, IACS Security Program
• Liaison to ISO/IEC JTC1/SC27 WG1 & WG3
• Previously Electrical Engineer @ NIST
June 3-5, 2014 ICSJWG Spring 2014 2
Overview
• Project Description
• ANSI/ISA-62443-3-3 Organization
• Step 1 – Defining the System Under Consideration
• Step 2 – Determining Applicable Requirements
• Step 2a – Develop Use Cases
• Step 3 – Assess Requirements
• Step 3a – Update Use Cases
• Step 3b – Reassess Requirements
• Step 4 – Report Results
• Questions
June 3-5, 2014 ICSJWG Spring 2014 3
Project Description
• Network segmentation vendor assembled system from various
components
• Hardware
• Software
• Web-Based Database
• Wanted an assessment relative to ANSI/ISA-62443-3-3
• System-level cyber security
• Capability requirements
• Kenexis:
• Conducted interviews
• Reviewed manuals
• Viewed system in lab environment
June 3-5, 2014 ICSJWG Spring 2014 4
ANSI/ISA-62443-3-3 Organization
• Common Control System Constraints
• Foundational Requirements (FRs)
• Identification & Authentication Control (IAC)
• Use Control (UC)
• System Integrity (SI)
• Data Confidentiality (DC)
• Restricted Data Flow (RDF)
• Timely Response to Events (TRE)
• Resource Availability (RA)
• System Requirements (SRs)
• Base Requirement
• Requirement Enhancements (REs)
June 3-5, 2014 ICSJWG Spring 2014 5
Step 1 – Defining the System
Under Consideration
Network Segmentation
Device Web-Accessible
Audit Logging
Operating System
Basic File Transfer
System
Basic Network
Transfer System
Application-Specific
Network Transfer
Application-Specific
File Transfer
Virus & Malware
File Checking
June 3-5, 2014 ICSJWG Spring 2014 6
Step 1 – Defining the System
Under Consideration
Network Segmentation
Device Web-Accessible
Audit Logging
Operating System
Basic File Transfer
System
Basic Network
Transfer System
Application-Specific
Network Transfer
Application-Specific
File Transfer
Virus & Malware
File Checking
June 3-5, 2014 ICSJWG Spring 2014 7
Step 2 – Determining Applicable
Requirements
• Not every requirement will apply for every system
• Requirements in 62443-3-3 generally written from end-user
perspective
• For vendor product systems, some requirements…
• Depend on end-user implementation
• Apply to technology not implemented in or outside control of the SuC
• Depends on way it is not implemented or outside control
• Are out-of-scope per vendor documentation
June 3-5, 2014 ICSJWG Spring 2014 8
Step 2 – Determining Applicable
Requirements
• Example #1 (Not Applicable) – Wireless
• System has no wireless interfaces itself
• Same capabilities for network segmentation of wired and wireless
devices connected through system
• Example #2 (Applicable) – Multi-Factor Authentication
• System provides a management interface with IAC and UC
• System inherently has capability in operating system
• Vendor has not been asked to implement by customers
• Example #3 (Applicable) – Unified Account Management
• System provides a management interface with IAC and UC
• System inherently has capability in operating system
• Vendor has not been asked to implement by customers
June 3-5, 2014 ICSJWG Spring 2014 9
Step 2 – Determining Applicable
Requirements
• Example #4 (Not Applicable) – Protection of Time Source
Integrity
• System can utilize an existing time source on network
• System has no time source capability itself (can’t act as stratum clock)
• Network traffic from time source treated no differently
• Example #5 (Not Applicable) – PKI and Certificates
• System doesn’t use PKI or certificate authorities
• Example #6 (Not Applicable) – Session Integrity
• No TCP session information is transmitted through device
• Device specifically designed to act as protocol break
• Strips header information and rebuilds packets on other side
June 3-5, 2014 ICSJWG Spring 2014 10
Step 2a – Develop Use Cases
• Use cases are a useful tool when conducting assessments
• Describe how different components in system interact
• Help to determine when requirements apply
• Use cases should represent realistic situations
• Adaptations of real cases are the best
• Generalizations are necessary
• ANSI/ISA-62443-3-3 has two as a starting point
• Chlorine truck loading station
• Manufacturing assembly line
June 3-5, 2014 ICSJWG Spring 2014 11
Step 2a – Develop Use Cases
June 3-5, 2014 ICSJWG Spring 2014 12
Step 2a – Develop Use Cases
• Elements adapted from ANSI/ISA-62443-3-3
• Business Network
• Control Center
• Control System
• Safety System
• Modifications from ANSI/ISA-62443-3-3 use cases
• Vendor System Replaces DMZ
• Added Production Server Network
• Expansion of Business Server Network
June 3-5, 2014 ICSJWG Spring 2014 13
Step 2a – Develop Use Cases
June 3-5, 2014 ICSJWG Spring 2014 14
Step 2a – Develop Use Cases
• Elements adapted from ANSI/ISA-62443-3-3
• Business Network
• Robot Cells
• Modifications from ANSI/ISA-62443-3-3 use cases
• Vendor System Replaces DMZ
• Added Production Server and Device Networks
• Expansion of Business Server Network
• Added Inspection Station
June 3-5, 2014 ICSJWG Spring 2014 15
Step 3 – Assess Requirements
• Is the requirement met by any single component in the system?
• If multiple components are needed to fulfill the requirement, do
they act in a way that violates that requirement?
• In order for the component(s) to meet the requirement, do they
violate other requirements?
• Are their optional configurations that allow the requirements to
be met?
June 3-5, 2014 ICSJWG Spring 2014 16
Step 3a – Revise Use Cases
• It is probable that the use cases will need to be revised
• During the requirements assessment, component features or
configurations may be uncovered that change the use cases in
some way
• Final use cases should follow as closely as possible real
system configurations
June 3-5, 2014 ICSJWG Spring 2014 17
Step 3b – Reassess Requirements
• It is possible that the system developer may have
changed/added features during the assessment
• The system developer may want some of the requirements
reassessed given the most recent features and/or configuration
June 3-5, 2014 ICSJWG Spring 2014 18
Step 4 – Report Results
• Reporting should include, at a minimum:
• Requirement pass/fail values
• Requirement pass/fail justification
• Other good things to add:
• Use cases
• Low-hanging fruit and longer-term changes
• Potential issues that may be uncovered through use cases
June 3-5, 2014 ICSJWG Spring 2014 19
Questions
• Jim Gilsinn
• Senior Investigator, Cybersecurity
• Kenexis Consulting, http://www.Kenexis.com
• Phone: +1-614-323-2254
• Email: Jim.Gilsinn@Kenexis.com
• Twitter: @JimGilsinn
• LinkedIn: http://www.linkedin.com/in/jimgilsinn/
• SlideShare: http://www.slideshare.net/gilsinnj
June 3-5, 2014 ICSJWG Spring 2014 20

More Related Content

What's hot

Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Sqrrl
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptxSandeepK707540
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMEAlienVault
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy Allen Baranov
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessSirius
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)Ahmed Ayman
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsSagar Joshi
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & BuildSameer Paradia
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)Ben Rothke
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityChris Sistrunk
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsDamon Small
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityThe Open Group SA
 

What's hot (20)

Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2Helping Utilities with Cybersecurity Preparedness: The C2M2
Helping Utilities with Cybersecurity Preparedness: The C2M2
 
Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)Building a Next-Generation Security Operations Center (SOC)
Building a Next-Generation Security Operations Center (SOC)
 
Cyber Security roadmap.pptx
Cyber Security roadmap.pptxCyber Security roadmap.pptx
Cyber Security roadmap.pptx
 
Security Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SMESecurity Operations Center (SOC) Essentials for the SME
Security Operations Center (SOC) Essentials for the SME
 
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy A Practical Example to Using SABSA Extended Security-in-Depth Strategy
A Practical Example to Using SABSA Extended Security-in-Depth Strategy
 
Optimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to SuccessOptimizing Security Operations: 5 Keys to Success
Optimizing Security Operations: 5 Keys to Success
 
Security operation center (SOC)
Security operation center (SOC)Security operation center (SOC)
Security operation center (SOC)
 
SOAR and SIEM.pptx
SOAR and SIEM.pptxSOAR and SIEM.pptx
SOAR and SIEM.pptx
 
Dragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations CenterDragos S4x20: How to Build an OT Security Operations Center
Dragos S4x20: How to Build an OT Security Operations Center
 
What is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the BasicsWhat is SIEM? A Brilliant Guide to the Basics
What is SIEM? A Brilliant Guide to the Basics
 
Security Operation Center - Design & Build
Security Operation Center - Design & BuildSecurity Operation Center - Design & Build
Security Operation Center - Design & Build
 
CyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoTCyberSecurity Best Practices for the IIoT
CyberSecurity Best Practices for the IIoT
 
SOC Cyber Security
SOC Cyber SecuritySOC Cyber Security
SOC Cyber Security
 
SIEM Architecture
SIEM ArchitectureSIEM Architecture
SIEM Architecture
 
Rothke rsa 2012 building a security operations center (soc)
Rothke rsa 2012  building a security operations center (soc)Rothke rsa 2012  building a security operations center (soc)
Rothke rsa 2012 building a security operations center (soc)
 
Vulnerability and Patch Management
Vulnerability and Patch ManagementVulnerability and Patch Management
Vulnerability and Patch Management
 
Hacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS securityHacker Halted 2016 - How to get into ICS security
Hacker Halted 2016 - How to get into ICS security
 
Enterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to BasicsEnterprise Vulnerability Management: Back to Basics
Enterprise Vulnerability Management: Back to Basics
 
Global Cyber Threat Intelligence
Global Cyber Threat IntelligenceGlobal Cyber Threat Intelligence
Global Cyber Threat Intelligence
 
Enterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber SecurityEnterprise Security Architecture for Cyber Security
Enterprise Security Architecture for Cyber Security
 

Similar to Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3

ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsJim Bugwadia
 
1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docxjeremylockett77
 
Se lect9 btech
Se lect9 btechSe lect9 btech
Se lect9 btechIIITA
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An OverviewKumar Kolaganti
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentAlexey Pyshkin
 
2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange
2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange
2013 OHSUG - Integration of Argus and Other Products Using the E2B InterchangePerficient
 
SCQAA-SF Meeting on May 21 2014
SCQAA-SF Meeting on May 21 2014 SCQAA-SF Meeting on May 21 2014
SCQAA-SF Meeting on May 21 2014 Sujit Ghosh
 
Automated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsAutomated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsSAIL_QU
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specificationAman Adhikari
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specificationAman Adhikari
 
Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"Ra'Fat Al-Msie'deen
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveAlgoSec
 
University roll (Sub code).pptx
University roll (Sub code).pptxUniversity roll (Sub code).pptx
University roll (Sub code).pptxSKILL2021
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system designRahul Hedau
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleRochester Security Summit
 
Information system audit
Information system audit Information system audit
Information system audit Jayant Dalvi
 
6 Steps to Implementing a World Class Testing Ecosystem Final
6 Steps to Implementing a World Class Testing Ecosystem Final6 Steps to Implementing a World Class Testing Ecosystem Final
6 Steps to Implementing a World Class Testing Ecosystem FinalEggplant
 

Similar to Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3 (20)

ISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply ChainsISACA SV Chapter: Securing Software Supply Chains
ISACA SV Chapter: Securing Software Supply Chains
 
1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx1 Software Requirements Descriptions and specification.docx
1 Software Requirements Descriptions and specification.docx
 
Se lect9 btech
Se lect9 btechSe lect9 btech
Se lect9 btech
 
What is Platform Observability? An Overview
What is Platform Observability? An OverviewWhat is Platform Observability? An Overview
What is Platform Observability? An Overview
 
CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016CISA Training - Chapter 5 - 2016
CISA Training - Chapter 5 - 2016
 
Decision Matrix for IoT Product Development
Decision Matrix for IoT Product DevelopmentDecision Matrix for IoT Product Development
Decision Matrix for IoT Product Development
 
2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange
2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange
2013 OHSUG - Integration of Argus and Other Products Using the E2B Interchange
 
SCQAA-SF Meeting on May 21 2014
SCQAA-SF Meeting on May 21 2014 SCQAA-SF Meeting on May 21 2014
SCQAA-SF Meeting on May 21 2014
 
Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0
 
Automated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise ApplicationsAutomated Discovery of Performance Regressions in Enterprise Applications
Automated Discovery of Performance Regressions in Enterprise Applications
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
Software requirement and specification
Software requirement and specificationSoftware requirement and specification
Software requirement and specification
 
Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"Requirements Engineering - "Ch2 an introduction to requirements"
Requirements Engineering - "Ch2 an introduction to requirements"
 
The Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the CurveThe Security Policy Management Maturity Model: How to Move Up the Curve
The Security Policy Management Maturity Model: How to Move Up the Curve
 
University roll (Sub code).pptx
University roll (Sub code).pptxUniversity roll (Sub code).pptx
University roll (Sub code).pptx
 
Mis system analysis and system design
Mis   system analysis and system designMis   system analysis and system design
Mis system analysis and system design
 
Dealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation StyleDealing with Web Application Security, Regulation Style
Dealing with Web Application Security, Regulation Style
 
Unit ii
Unit ii  Unit ii
Unit ii
 
Information system audit
Information system audit Information system audit
Information system audit
 
6 Steps to Implementing a World Class Testing Ecosystem Final
6 Steps to Implementing a World Class Testing Ecosystem Final6 Steps to Implementing a World Class Testing Ecosystem Final
6 Steps to Implementing a World Class Testing Ecosystem Final
 

More from Jim Gilsinn

Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksJim Gilsinn
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMJim Gilsinn
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!Jim Gilsinn
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsJim Gilsinn
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance LabJim Gilsinn
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Jim Gilsinn
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSJim Gilsinn
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingJim Gilsinn
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze itJim Gilsinn
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerJim Gilsinn
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with WiresharkJim Gilsinn
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Jim Gilsinn
 

More from Jim Gilsinn (13)

Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Network Security: Protecting SOHO Networks
Network Security: Protecting SOHO NetworksNetwork Security: Protecting SOHO Networks
Network Security: Protecting SOHO Networks
 
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEMNetwork Reliability Monitoring for ICS: Going Beyond NSM and SIEM
Network Reliability Monitoring for ICS: Going Beyond NSM and SIEM
 
Cook Like a Hacker!
Cook Like a Hacker!Cook Like a Hacker!
Cook Like a Hacker!
 
Integrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of StandardsIntegrating the Alphabet Soup of Standards
Integrating the Alphabet Soup of Standards
 
ICS Performance Lab
ICS Performance LabICS Performance Lab
ICS Performance Lab
 
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...
 
Cyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICSCyber & Process Attack Scenarios for ICS
Cyber & Process Attack Scenarios for ICS
 
Low-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance TestingLow-Cost ICS Network Performance Testing
Low-Cost ICS Network Performance Testing
 
You name it, we analyze it
You name it, we analyze itYou name it, we analyze it
You name it, we analyze it
 
Wireshark Network Protocol Analyzer
Wireshark Network Protocol AnalyzerWireshark Network Protocol Analyzer
Wireshark Network Protocol Analyzer
 
Network Packet Analysis with Wireshark
Network Packet Analysis with WiresharkNetwork Packet Analysis with Wireshark
Network Packet Analysis with Wireshark
 
Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)Test Tool for Industrial Ethernet Network Performance (June 2009)
Test Tool for Industrial Ethernet Network Performance (June 2009)
 

Recently uploaded

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3

  • 1. Evaluating System-Level Cyber Security vs. ANSI/ISA-62443-3-3 Jim Gilsinn Kenexis Consulting June 3-5, 2014 ICSJWG Spring 2014 1
  • 2. Jim Gilsinn • Senior Investigator, Cybersecurity @ Kenexis Consulting • International Society of Automation (ISA) • Co-Chair, ISA99 Committee • Co-Chair, ISA99 WG2, IACS Security Program • Liaison to ISO/IEC JTC1/SC27 WG1 & WG3 • Previously Electrical Engineer @ NIST June 3-5, 2014 ICSJWG Spring 2014 2
  • 3. Overview • Project Description • ANSI/ISA-62443-3-3 Organization • Step 1 – Defining the System Under Consideration • Step 2 – Determining Applicable Requirements • Step 2a – Develop Use Cases • Step 3 – Assess Requirements • Step 3a – Update Use Cases • Step 3b – Reassess Requirements • Step 4 – Report Results • Questions June 3-5, 2014 ICSJWG Spring 2014 3
  • 4. Project Description • Network segmentation vendor assembled system from various components • Hardware • Software • Web-Based Database • Wanted an assessment relative to ANSI/ISA-62443-3-3 • System-level cyber security • Capability requirements • Kenexis: • Conducted interviews • Reviewed manuals • Viewed system in lab environment June 3-5, 2014 ICSJWG Spring 2014 4
  • 5. ANSI/ISA-62443-3-3 Organization • Common Control System Constraints • Foundational Requirements (FRs) • Identification & Authentication Control (IAC) • Use Control (UC) • System Integrity (SI) • Data Confidentiality (DC) • Restricted Data Flow (RDF) • Timely Response to Events (TRE) • Resource Availability (RA) • System Requirements (SRs) • Base Requirement • Requirement Enhancements (REs) June 3-5, 2014 ICSJWG Spring 2014 5
  • 6. Step 1 – Defining the System Under Consideration Network Segmentation Device Web-Accessible Audit Logging Operating System Basic File Transfer System Basic Network Transfer System Application-Specific Network Transfer Application-Specific File Transfer Virus & Malware File Checking June 3-5, 2014 ICSJWG Spring 2014 6
  • 7. Step 1 – Defining the System Under Consideration Network Segmentation Device Web-Accessible Audit Logging Operating System Basic File Transfer System Basic Network Transfer System Application-Specific Network Transfer Application-Specific File Transfer Virus & Malware File Checking June 3-5, 2014 ICSJWG Spring 2014 7
  • 8. Step 2 – Determining Applicable Requirements • Not every requirement will apply for every system • Requirements in 62443-3-3 generally written from end-user perspective • For vendor product systems, some requirements… • Depend on end-user implementation • Apply to technology not implemented in or outside control of the SuC • Depends on way it is not implemented or outside control • Are out-of-scope per vendor documentation June 3-5, 2014 ICSJWG Spring 2014 8
  • 9. Step 2 – Determining Applicable Requirements • Example #1 (Not Applicable) – Wireless • System has no wireless interfaces itself • Same capabilities for network segmentation of wired and wireless devices connected through system • Example #2 (Applicable) – Multi-Factor Authentication • System provides a management interface with IAC and UC • System inherently has capability in operating system • Vendor has not been asked to implement by customers • Example #3 (Applicable) – Unified Account Management • System provides a management interface with IAC and UC • System inherently has capability in operating system • Vendor has not been asked to implement by customers June 3-5, 2014 ICSJWG Spring 2014 9
  • 10. Step 2 – Determining Applicable Requirements • Example #4 (Not Applicable) – Protection of Time Source Integrity • System can utilize an existing time source on network • System has no time source capability itself (can’t act as stratum clock) • Network traffic from time source treated no differently • Example #5 (Not Applicable) – PKI and Certificates • System doesn’t use PKI or certificate authorities • Example #6 (Not Applicable) – Session Integrity • No TCP session information is transmitted through device • Device specifically designed to act as protocol break • Strips header information and rebuilds packets on other side June 3-5, 2014 ICSJWG Spring 2014 10
  • 11. Step 2a – Develop Use Cases • Use cases are a useful tool when conducting assessments • Describe how different components in system interact • Help to determine when requirements apply • Use cases should represent realistic situations • Adaptations of real cases are the best • Generalizations are necessary • ANSI/ISA-62443-3-3 has two as a starting point • Chlorine truck loading station • Manufacturing assembly line June 3-5, 2014 ICSJWG Spring 2014 11
  • 12. Step 2a – Develop Use Cases June 3-5, 2014 ICSJWG Spring 2014 12
  • 13. Step 2a – Develop Use Cases • Elements adapted from ANSI/ISA-62443-3-3 • Business Network • Control Center • Control System • Safety System • Modifications from ANSI/ISA-62443-3-3 use cases • Vendor System Replaces DMZ • Added Production Server Network • Expansion of Business Server Network June 3-5, 2014 ICSJWG Spring 2014 13
  • 14. Step 2a – Develop Use Cases June 3-5, 2014 ICSJWG Spring 2014 14
  • 15. Step 2a – Develop Use Cases • Elements adapted from ANSI/ISA-62443-3-3 • Business Network • Robot Cells • Modifications from ANSI/ISA-62443-3-3 use cases • Vendor System Replaces DMZ • Added Production Server and Device Networks • Expansion of Business Server Network • Added Inspection Station June 3-5, 2014 ICSJWG Spring 2014 15
  • 16. Step 3 – Assess Requirements • Is the requirement met by any single component in the system? • If multiple components are needed to fulfill the requirement, do they act in a way that violates that requirement? • In order for the component(s) to meet the requirement, do they violate other requirements? • Are their optional configurations that allow the requirements to be met? June 3-5, 2014 ICSJWG Spring 2014 16
  • 17. Step 3a – Revise Use Cases • It is probable that the use cases will need to be revised • During the requirements assessment, component features or configurations may be uncovered that change the use cases in some way • Final use cases should follow as closely as possible real system configurations June 3-5, 2014 ICSJWG Spring 2014 17
  • 18. Step 3b – Reassess Requirements • It is possible that the system developer may have changed/added features during the assessment • The system developer may want some of the requirements reassessed given the most recent features and/or configuration June 3-5, 2014 ICSJWG Spring 2014 18
  • 19. Step 4 – Report Results • Reporting should include, at a minimum: • Requirement pass/fail values • Requirement pass/fail justification • Other good things to add: • Use cases • Low-hanging fruit and longer-term changes • Potential issues that may be uncovered through use cases June 3-5, 2014 ICSJWG Spring 2014 19
  • 20. Questions • Jim Gilsinn • Senior Investigator, Cybersecurity • Kenexis Consulting, http://www.Kenexis.com • Phone: +1-614-323-2254 • Email: Jim.Gilsinn@Kenexis.com • Twitter: @JimGilsinn • LinkedIn: http://www.linkedin.com/in/jimgilsinn/ • SlideShare: http://www.slideshare.net/gilsinnj June 3-5, 2014 ICSJWG Spring 2014 20

Editor's Notes

  1. Good Morning. My name is Jim Gilsinn, and I work for Kenexis Consulting. We recently conducted an evaluation of a customers products to assess how well they met the capability requirements described in ANSI/ISA-62443-3-3. I’m here today to talk to you all about the methodology that Kenexis used to conduct this assessment.
  2. First, a little bit about myself. I joined Kenexis Consulting as a Senior Investigator for Cybersecurity in late 2012. We specialize in taking a system-wide approach to assessing, designing, and validating ICS networks and security. I am also the current Co-Chair of the ISA99 committee, the Co-Chair of the working group developing the 62443-2-1 standard on an ICS security program, and the liaison to the ISO/IEC committee developing the 2700x series of standards. Previously, I spent 20 years in the Engineering Laboratory at NIST working on a variety of projects from ICS network performance tests and tools, wireless sensors, embedded sensor design, software design, robotics, and controls.
  3. This is an overview of my talk today. I’ll start by giving you a little bit of information about our project. I’ll then go over a brief description of how the 62443-3-3 standard is organized, for those that aren’t familiar with it. Then, I’ll move on to describing the steps in our methodology. Step 1 – The first step in the project was to determine what constituted the System under Consideration Step 2 – The next step was to determine the requirements that were applicable to the system. As part of this step, some basic use cases were developed to help determine which requirements should be excluded. Step 3 – The third major step was to actually conduct the assessment. After the primary assessment was complete, the use cases were updated to reflect any additional information gained while conducting the assessment. As a final part to this step, it may be necessary to reassess some of the requirements if new information becomes available. Step 4 – The final step in the process is reporting the results. I should have time for questions at the end of my talk.
  4. A vendor of network segmentation products approached Kenexis to conduct an assessment of one of their devices against 62443-3-3. After some discussion, we reached the conclusion that it would be better to evaluate a series of products including the hardware device itself, some of the related software products, and an accompanying web-based database instead of just the hardware device itself. This system actually matched up better to how their customers were purchasing and implementing their products. They wanted to assess their system of products against the ANSI/ISA-62443-3-3 standard. It describes capability requirements that need to be implemented in industrial control systems. The method we used to collect data for the project is similar to many other consulting projects, we conducted interviews with staff members from the customer, we reviewed the product manuals, and we observed and interacted with the system in a lab environment.
  5. I’m not going to go deeply into the ANSI/ISA-62443-3-3 standard or the other documents in the 62443 series. I just wanted to explain how the requirements are broken down to those not familiar with it and explain how that affected our process. The first clause with requirements in the standard are what are called “Common Control System Constraints” These generally deal with issues that cross over all the different Foundational Requirements. The Common Constraints are also generally associated with security not affecting safety or other essential functions for the control system. The majority of the requirements in the requirements in -3-3 are contained within each of the Foundational Requirements sections. Each of these sections represents a different aspect of cybersecurity. It goes above and beyond the normal CIA since there are more aspects to ICS cybersecurity that don’t relate to the normal IT categories. Also, aspects like Identification and Authentication and Use Control are extremely important with a large number of requirements, but arguably have no direct correlation to CIA aspects. Within each of the FRs, there are individual System Requirements consisting of a base requirement and zero or more requirement enhancements. The REs allow the standard to expand its required capabilities depending on the level of capability the system is built to attain.
  6. Now, getting into the actual steps we took to conduct the assessment. The first step was to decide what components actually constituted the system under consideration for the -3-3 assessment. The vendor gave us a list of 6 different products that they sell. A hardware network segmentation device A software module to securely transfer files across the zone boundary A web-based database for audit logging and monitoring And 3 application-specific file and network traffic transfer software packages Inside the hardware component there were some additional components that were base components for the network segmentation A secure Linux-based operating system A network data transfer system A basic file transfer system And a virus and malware checking system
  7. The core features that were considered part of the system related to the capability to: Control access to the different components Transfer network traffic and files in a controlled manner across the network zone boundary Prevent malicious network traffic and files from spreading across the zone boundary Provide some measure of audit logging and monitoring Features like moving specific types of network traffic or files were not relevant to the cyber security aspect of the system, so they were removed from the assessment. These were kept as good use cases for consideration as part of the project. But, they didn’t represent a core feature that would affect the overall cyber security aspects of the capability requirements. One thing to realize is that this was strictly a cyber security feature capability assessment. Kenexis was not asked to do a code review or detailed vulnerability assessment of the system. Those get into the actual implementation of the hardware and software components and were outside the scope of a functional capability assessment.
  8. Out of the 110 requirements and requirement enhancements contained within -3-3, some will not apply to the system under consideration for various reasons. Many of the requirements in -3-3 were written with an end-user implementation focus. In this case, we were evaluating a vendor’s system of components. Some of the reasons that requirements were eliminated from consideration were: They had to do with end-user implementation of the product and were not something that the system would be capable of implementing They applied to technology that was not implemented at all within the system It related to technology that was outside the control of the system under consideration Were out of scope based upon specific user documentation recommending against using the system in that way. I understand that people always take things and implement them in ways that the vendor probably didn’t anticipate, but when the vendor expressly tells the user not to implement their products in a certain way, then the user is assuming the risk for any associated weaknesses they introduce into the system. I’ll explain a little bit more about the implementation and outside control with some examples, which may make it easier to understand.