SlideShare a Scribd company logo
ICS/IIOT 보안의 A~Z까지
보안연구실 이사
CISSP KOREA/유정훈
james.yoo@boanin.com
Before beginning
• What is the difference?
Before beginning
• Is there industrial scene safe?
용광로 제어시스템스마트 원자로 시스템
주유기 제어시스템 산업용 로봇 제어시스템
Agenda
• ICS/IIoT Definition & Security Standard
• Security CIA Triad
• ICS incident status [2000~2015]
• CyberX's ICS report summary
• Entry point of Attack
• ICS Hacking example
• Problems through Future Technology
• Future Considerations
What is ICS/IIOT ?
• ICS(Industrial Control System) is a general term that encompasses
several types of control systems and associated instrumentation
used for industrial process control. [ref. wikipedia]
• IIoT in manufacturing could generate so much business value that it will
eventually lead to the Fourth Industrial Revolution, also referred to
as Industry 4.0. The potential for growth from implementing IIoT may
generate $12 trillion of global GDP by 2030. [ref. wikipedia]
What is ICS/IIOT ?
ISA / IEC 62443 요구 사항 :
- ISA / IEC 62443-2-1, 산업 자동화 및 제어 시스템 보안
: 산업 자동화 및 제어 시스템 보안 프로그램 수립
- ISA / IEC 62443-3-3, 산업 보안
Security Standards /Frameworks
• Security Standards /Frameworks
What is ICS/IIOT ?
• Security Standards /Frameworks
표준기구/단체 설명제조 프로세스 산업용 데이터
출처: 중소기업스마트공장 안전과보안_韓 根熙
Security CIA Triad
• Priority by ICT vs ICS
ICS incident status [2000~2015]
• 5대 주요 ICS 취약점 : 5개의 주요 ICS 취약점은 주로 국가 관련 시설이며 특히, 이란 핵시설을
마비시키기 위해 미국과 이스라엘이 퍼뜨린 사이버 무기인 Stuxnet이나 우크라이나 정전 사고와
같이 그 중 4건은 정치지리학적 대상물과 관련됨
출처: 최근 15년간 ICS 취약점 추세(FireEye, 2016)
출처: risidata.com
CyberX's ICS report summary
CyberX는 850개 이상의 OT관점의 ICS 네트워크에서 네트워크
트래픽 데이터를 수집한후 독점적인 네트워크 분석 알고리즘
(NTA)을 사용하여 분석하여 ICS 환경의 취약점 존재 확인
• Existing Vulnerability Status
[출처] CyberX의 2019년 글로벌 ICS & IIoT 리스크 보고서
- ICS 네트워크 내 평문 패스워드와 같은 간단한 취약점 존재
Entry point of Attack
• Attack entry points
- Business LAN
- USB ports
- Mis-configured Firewalls
- External PLC networks
- Infected laptops
- Wireless access
- Infected Remote Support
- I/O networks
ICS Protocol Exposure Status
출처: shodan.io
What about the ICS scene in Korea?
비 공개
Examples of foreign subway hacking attacks
Ransomware는 San Francisco Municipal Transportation Agency PC 컴퓨터에서
네트워크를 통해 발권 부스로 이동하여 일시적으로 무료로 서비스를 실행
출처: cnbc.com (Metro transport systems eyed after hack attack in San Francisco)
Subway Vulnerability viewpoint
비 공개
ICS hacking example
Don’t hacking real system, But I DID.
However, I will proceed in a virtual environment.
Please, Just watch. If you follow me, You will go to jail.
Searching the Modbus protocol
ICS hacking example
슈나이더 일렉트릭 코리아
ICS hacking example
비 공개
Problems through Future Technology (1/2)
• 산업 현장 장비의 40%가 공용 네트워크에 직접 연결 되어 있음
=> 쇼단(Shodan) 같은 검색 도구를 이용하면 공격자들이 산업용
기기에 쉽게 찾아 접속 할 수 있음.
• 현장의 53%는 패치가 중단된 윈도우 시스템들이 다수 존재함
=> 산업 현장에는 운영체제를 바꾸기는 커녕 패치가 어려운 임베디드
시스템이 있는 경우가 많다.
또한, 새로운 취약성에 대한 패치가 없어 보안에 큰 구멍이 생길 수 있다.
• 현장 중 69%는 ICS 네트워크에 일반 텍스트로 된 비밀번호가 존재
=> 사이버X는 ICS 네트워크 중 69%에 일반 텍스트 비밀번호가
있다는 사실을 발견
=> 일반적으로 SNMP v3나 SFTP 같은 현대적이고 안전한
프로토콜을 지원하지 않는 구형 장비와 연관 되어 있음
Problems through Future Technology (2/2)
• 관심만 가지만 어둠의 통로가 쉽게 접근 할 수 있음
(Darkweb, Shodan, Censys, ZoomEYE 등)
• 소셜 엔지니어링(스피어피싱) 을 통한 공격가능
• OT환경에서의 데이터기반의 정보보호가 필요함
• 산업제어 시스템이 중단시 막대한 손해가 발생됨
Future Considerations
• 환경 변화와 조직의 문화 이해 필요(법, 기술 등)
• ICS 위험평가 및 관리감독이 필요함
• ICS Threat Intelligence 관점의 통합 관제 센터 구축 고려
• 실무자를 의한 인식제고 교육 필요
• 제조분야 관점에서 안전과 보안 측면에서의 점검 항목 개발 필요
• 스마트 공장 도입에 따른 정보보안 대책 필요
The End
평범하기보다는 유별나게
유별나기보다는 각별하게
각별하기보다는 특별하게
특별하기보다는 비범하게
비범하기보다는 나답게……
- [이창현's 울림 - 나 답게]

More Related Content

Featured

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
Marius Sescu
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
Expeed Software
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
Pixeldarts
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 

Featured (20)

2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot2024 State of Marketing Report – by Hubspot
2024 State of Marketing Report – by Hubspot
 
Everything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPTEverything You Need To Know About ChatGPT
Everything You Need To Know About ChatGPT
 
Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 

From a to z of ics iiot security

  • 1. ICS/IIOT 보안의 A~Z까지 보안연구실 이사 CISSP KOREA/유정훈 james.yoo@boanin.com
  • 2. Before beginning • What is the difference?
  • 3. Before beginning • Is there industrial scene safe? 용광로 제어시스템스마트 원자로 시스템 주유기 제어시스템 산업용 로봇 제어시스템
  • 4. Agenda • ICS/IIoT Definition & Security Standard • Security CIA Triad • ICS incident status [2000~2015] • CyberX's ICS report summary • Entry point of Attack • ICS Hacking example • Problems through Future Technology • Future Considerations
  • 5. What is ICS/IIOT ? • ICS(Industrial Control System) is a general term that encompasses several types of control systems and associated instrumentation used for industrial process control. [ref. wikipedia] • IIoT in manufacturing could generate so much business value that it will eventually lead to the Fourth Industrial Revolution, also referred to as Industry 4.0. The potential for growth from implementing IIoT may generate $12 trillion of global GDP by 2030. [ref. wikipedia]
  • 6. What is ICS/IIOT ? ISA / IEC 62443 요구 사항 : - ISA / IEC 62443-2-1, 산업 자동화 및 제어 시스템 보안 : 산업 자동화 및 제어 시스템 보안 프로그램 수립 - ISA / IEC 62443-3-3, 산업 보안 Security Standards /Frameworks • Security Standards /Frameworks
  • 7. What is ICS/IIOT ? • Security Standards /Frameworks 표준기구/단체 설명제조 프로세스 산업용 데이터 출처: 중소기업스마트공장 안전과보안_韓 根熙
  • 8. Security CIA Triad • Priority by ICT vs ICS
  • 9. ICS incident status [2000~2015] • 5대 주요 ICS 취약점 : 5개의 주요 ICS 취약점은 주로 국가 관련 시설이며 특히, 이란 핵시설을 마비시키기 위해 미국과 이스라엘이 퍼뜨린 사이버 무기인 Stuxnet이나 우크라이나 정전 사고와 같이 그 중 4건은 정치지리학적 대상물과 관련됨 출처: 최근 15년간 ICS 취약점 추세(FireEye, 2016) 출처: risidata.com
  • 10. CyberX's ICS report summary CyberX는 850개 이상의 OT관점의 ICS 네트워크에서 네트워크 트래픽 데이터를 수집한후 독점적인 네트워크 분석 알고리즘 (NTA)을 사용하여 분석하여 ICS 환경의 취약점 존재 확인 • Existing Vulnerability Status [출처] CyberX의 2019년 글로벌 ICS & IIoT 리스크 보고서 - ICS 네트워크 내 평문 패스워드와 같은 간단한 취약점 존재
  • 11. Entry point of Attack • Attack entry points - Business LAN - USB ports - Mis-configured Firewalls - External PLC networks - Infected laptops - Wireless access - Infected Remote Support - I/O networks
  • 12. ICS Protocol Exposure Status 출처: shodan.io
  • 13. What about the ICS scene in Korea? 비 공개
  • 14. Examples of foreign subway hacking attacks Ransomware는 San Francisco Municipal Transportation Agency PC 컴퓨터에서 네트워크를 통해 발권 부스로 이동하여 일시적으로 무료로 서비스를 실행 출처: cnbc.com (Metro transport systems eyed after hack attack in San Francisco)
  • 16. ICS hacking example Don’t hacking real system, But I DID. However, I will proceed in a virtual environment. Please, Just watch. If you follow me, You will go to jail.
  • 17. Searching the Modbus protocol ICS hacking example
  • 18. 슈나이더 일렉트릭 코리아 ICS hacking example 비 공개
  • 19. Problems through Future Technology (1/2) • 산업 현장 장비의 40%가 공용 네트워크에 직접 연결 되어 있음 => 쇼단(Shodan) 같은 검색 도구를 이용하면 공격자들이 산업용 기기에 쉽게 찾아 접속 할 수 있음. • 현장의 53%는 패치가 중단된 윈도우 시스템들이 다수 존재함 => 산업 현장에는 운영체제를 바꾸기는 커녕 패치가 어려운 임베디드 시스템이 있는 경우가 많다. 또한, 새로운 취약성에 대한 패치가 없어 보안에 큰 구멍이 생길 수 있다. • 현장 중 69%는 ICS 네트워크에 일반 텍스트로 된 비밀번호가 존재 => 사이버X는 ICS 네트워크 중 69%에 일반 텍스트 비밀번호가 있다는 사실을 발견 => 일반적으로 SNMP v3나 SFTP 같은 현대적이고 안전한 프로토콜을 지원하지 않는 구형 장비와 연관 되어 있음
  • 20. Problems through Future Technology (2/2) • 관심만 가지만 어둠의 통로가 쉽게 접근 할 수 있음 (Darkweb, Shodan, Censys, ZoomEYE 등) • 소셜 엔지니어링(스피어피싱) 을 통한 공격가능 • OT환경에서의 데이터기반의 정보보호가 필요함 • 산업제어 시스템이 중단시 막대한 손해가 발생됨
  • 21. Future Considerations • 환경 변화와 조직의 문화 이해 필요(법, 기술 등) • ICS 위험평가 및 관리감독이 필요함 • ICS Threat Intelligence 관점의 통합 관제 센터 구축 고려 • 실무자를 의한 인식제고 교육 필요 • 제조분야 관점에서 안전과 보안 측면에서의 점검 항목 개발 필요 • 스마트 공장 도입에 따른 정보보안 대책 필요
  • 22. The End 평범하기보다는 유별나게 유별나기보다는 각별하게 각별하기보다는 특별하게 특별하기보다는 비범하게 비범하기보다는 나답게…… - [이창현's 울림 - 나 답게]