SlideShare a Scribd company logo
Deployment of a Secure Distributed SCADA (DSCADA) System
Using Data-diodes in a Self-contained Fiber-optic Network
Burlington Electric Department
Dorian Hernandez
Schneider Electric (Telvent)
Mark Atchley
Waterfall Security
Andrew Ginter
Made with LibreOffice and Ubuntu Linux
Overview
● How to share data from a high security net-
work (SCADA) to a lower security network
(business LAN).
● How to implement the best deployment
strategy to achieve the above.
● Problems encountered during deployment.
● Benefits and drawbacks.
Made with LibreOffice and Ubuntu Linux
Long-term goals
● To make implementation as permanent as pos-
sible.
● Improve bandwidth and redundancy depending
on traffic.
● Apply same methodology to other critical sys-
tems like PLCs, etc.
● Complete isolation while maintaining required
communications.
Made with LibreOffice and Ubuntu Linux
About BED
● Established in 1905 in
Burlington, Vermont.
● Approx. 20,000 customers.
● Largest municipally-owned
electric utility in Vermont.
● Power coming from sources
that include biomass, wind
and hydro.
● Smart Grid deployment.
● Smart Meter deployment.
Made with LibreOffice and Ubuntu Linux
Present Situation
● Current SCADA system uses firewalls for network
“segmentation”.
● Firewalls have their vulnerabilities.
● New SCADA system has to have best approach to
mitigate potential threats.
● Opportunity to build it from the ground up and be
integral part of the process.
● We want the best possible solution while not
breaking the bank.
Made with LibreOffice and Ubuntu Linux
Present Situation (cont.)
● Old way of doing things:
Made with LibreOffice and Ubuntu Linux
Present Situation (cont.)
● Constant monitoring of intrusion logs.
● Correct setup of rules and other settings.
● CPU may not scale to traffic demands.
● Costs incurred due to licensing.
● Multiple units to achieve redundancy.
● Life cycle, end-of-life.
Using firewalls
Made with LibreOffice and Ubuntu Linux
Present Situation (cont.)
● “TCP Split Handshake”
● “ACL Bypass”
● “ASDM Administrative Command Injection”
● “Cross-Site Scripting (XSS)”
● If payload is delivered via sneaker-net, outbound traffic
may be incorrectly treated as valid.
Potential Firewall Vulnerabilities
Made with LibreOffice and Ubuntu Linux
1) Phishing / drive-by-download – victim pulls your attack through firewall
2) Social engineering – steal a password / keystroke logger / shoulder surf
3) Compromise domain controller – create ICS host or firewall account / passwd
4) Attack exposed servers – SQL injection / DOS / b-overflow / default password
5) Attack exposed clients – compromise web servers / file servers / b-overflows
6) Session hijacking – man-in-the-middle / steal HTTP cookies / cmd-injection
7) Piggy-back on VPN – split tunneling / malware propagation
8) Firewall vulnerabilities – bugs / zero-days / default passwords / design vulns
9) Errors and omissions – bad firewall rules/configs / IT reaches through fwalls
10) Forge an IP address – most rules are IP-based / ARPSpoof to block real IP
11) Bypass network perimeter – rogue wireless / dial-up / complex topologies
12) Physical access to firewall – reset to factory defaults / local admin / wiring
13) Sneakernet – removable media / plug untrusted laptops into trusted network
13 Ways Through a Firewall
Present Situation (cont.)
Made with LibreOffice and Ubuntu Linux
Development up to present
● Starting from scratch with the latest Telvent Oasys
DNA SCADA solution.
● Applying the “Onion” model for security.
● Applying the “Pretender” model for data sharing.
● Deploying Telvent's Oasys DNA DSS
SCADA model solution.
● Deploying Waterfall For ICCP Uni-Directional Gateway.
Made with LibreOffice and Ubuntu Linux
Development up to present
● The “Onion” model approach.
● What's your high-
est priority in your
SCADA network?
● Don't be afraid to
be paranoid.
● Don't be afraid to
be a “control
freak”.
● T.N.O: “Trust No
One”.
Made with LibreOffice and Ubuntu Linux
Development to present (cont.)
Possible Solution Model
● Obfuscation of SCADA NETWORK by means of segmenting
networks via Uni-Directional Gateway AND “Pretender” systems.
Made with LibreOffice and Ubuntu Linux
Development to present (cont.)
● “Real” SCADA system is not exposed to external
networks.
● “Pretender” system handles all request from systems
needing data from it.
● “Pretender” system can be part of Honey-Pot system,
along with IDS/IPS systems to monitor for intrusion
attempts that get past BIZ-facing firewalls.
● DSS system should be easier to rebuild than “Real”
SCADA system.
Made with LibreOffice and Ubuntu Linux
Architected solution
Made with LibreOffice and Ubuntu Linux
Pros and Cons
● Secure network cannot be penetrated by less secure network.
● Data to be shared is passed to DSS system where it is an exact
replica of “Real” SCADA system.
● Isolation of possible intrusion to DSS zone.
● Controls cannot be modified at “Real' SCADA system.
● DSS can help in scanning for possible intrusion attempts.
● DSS easier to rebuild than “Real” SCADA system.
● Burden taken off “Real” SCADA system DB for queries, etc.
● Discrete architecture to compartmentalize connections.
● Almost “set-it-and-forget-it” design – peace of mind.
Pros:
Made with LibreOffice and Ubuntu Linux
Pros and Cons
● User needs to understand ICCP point assignment and al-
ways adhere to the rules.
● No “auto-magic” way to set up data sets: some manual la-
bor is required but this forces admin to really understand
setup.
● Double-the-work, double-the-fun. Need to set up ICCP on
both SECURE and DSS networks – not big deal.
● More devices to setup, maintain, and assure their up-time.
● Longer deployment time, but this could also result in better
understanding of system.
Cons:
Made with LibreOffice and Ubuntu Linux
Improvements
● Create a two-site configuration of the
Telvent Oasys DSS system for better re-
dundancy.
● Upgrade to Waterfall for ICCP High Avail-
ability solution for better redundancy.
● Upgrade BIZ-facing and DSS-facing fire-
walls to High-Availability systems.
Made with LibreOffice and Ubuntu Linux
Improvements
● Create a two-site configuration
of the Telvent Oasys DSS sys-
tem for better redundancy.
Made with LibreOffice and Ubuntu Linux
Improvements
● Upgrade to Waterfall for ICCP High Availability so-
lution for better redundancy.Upgrade to Waterfall
for ICCP High Availability solution for better redun-
dancy.
Made with LibreOffice and Ubuntu Linux
Other possibilities
● Protecting PLCs
Made with LibreOffice and Ubuntu Linux
Conclusion
● Because of the stringent cyber-security
requirements by the DOE, NERC, and other
entities, the Uni-Directional Gateway Data
Diode was the best solution to mitigate potential
threats and comply with existing and future
regulations (NERC CIP V5, etc.) and protect
SCADA systems against obsolescence and its
side effects.
Made with LibreOffice and Ubuntu Linux
Feedback
● Thank you for your time
Made with LibreOffice and Ubuntu Linux

More Related Content

What's hot

Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
SDNRG ITB
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization Overlays
Adam Johnson
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualizationRabah GUEDREZ
 
SDN, com fer-ho realitat i quins avantatges puc treure-hi
SDN, com fer-ho realitat i quins avantatges puc treure-hiSDN, com fer-ho realitat i quins avantatges puc treure-hi
SDN, com fer-ho realitat i quins avantatges puc treure-hi
CSUC - Consorci de Serveis Universitaris de Catalunya
 
MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-
Midokura
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Emulex Corporation
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network Virtualization
Pavan Hasabnis
 
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICsLF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK
 
Midokura Enterprise MidoNet Overview
Midokura Enterprise MidoNet Overview Midokura Enterprise MidoNet Overview
Midokura Enterprise MidoNet Overview
Midokura
 
Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
OPNFV
 
Firewall
FirewallFirewall
FirewallApo
 
LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...
LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...
LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...
LF_DPDK
 
Sdn nfv-day-2016
Sdn nfv-day-2016Sdn nfv-day-2016
Sdn nfv-day-2016
Eueung Mulyana
 
Atf 3 q15-6 - solutions for scaling the cloud computing network infrastructure
Atf 3 q15-6 - solutions for scaling the cloud computing network infrastructureAtf 3 q15-6 - solutions for scaling the cloud computing network infrastructure
Atf 3 q15-6 - solutions for scaling the cloud computing network infrastructure
Mason Mei
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
Novosco
 
Technology Innovation That Matters
Technology Innovation That MattersTechnology Innovation That Matters
Technology Innovation That Matters
MarketingArrowECS_CZ
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
Basim Aly (JNCIP-SP, JNCIP-ENT)
 
Qnx os
Qnx os Qnx os
Qnx os
Student
 
네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성
NAIM Networks, Inc.
 

What's hot (20)

Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
Cisco SDN/NVF Innovations (SDN NVF Day ITB 2016)
 
Improving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization OverlaysImproving performance and efficiency with Network Virtualization Overlays
Improving performance and efficiency with Network Virtualization Overlays
 
Network virtualization
Network virtualizationNetwork virtualization
Network virtualization
 
SDN, com fer-ho realitat i quins avantatges puc treure-hi
SDN, com fer-ho realitat i quins avantatges puc treure-hiSDN, com fer-ho realitat i quins avantatges puc treure-hi
SDN, com fer-ho realitat i quins avantatges puc treure-hi
 
MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-MidoNet Future -ミドネットの未来-
MidoNet Future -ミドネットの未来-
 
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber ThreatsUsing NetFlow to Streamline Security Analysis and Response to Cyber Threats
Using NetFlow to Streamline Security Analysis and Response to Cyber Threats
 
Evolution of Network Virtualization
Evolution of Network VirtualizationEvolution of Network Virtualization
Evolution of Network Virtualization
 
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICsLF_DPDK17_Accelerating Packet Processing with FPGA NICs
LF_DPDK17_Accelerating Packet Processing with FPGA NICs
 
Midokura Enterprise MidoNet Overview
Midokura Enterprise MidoNet Overview Midokura Enterprise MidoNet Overview
Midokura Enterprise MidoNet Overview
 
Securing your telco cloud
Securing your telco cloud Securing your telco cloud
Securing your telco cloud
 
Firewall
FirewallFirewall
Firewall
 
LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...
LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...
LF_DPDK17_Accelerating NFV with VMware's Enhanced Network Stack (ENS) and Int...
 
Sdn nfv-day-2016
Sdn nfv-day-2016Sdn nfv-day-2016
Sdn nfv-day-2016
 
Atf 3 q15-6 - solutions for scaling the cloud computing network infrastructure
Atf 3 q15-6 - solutions for scaling the cloud computing network infrastructureAtf 3 q15-6 - solutions for scaling the cloud computing network infrastructure
Atf 3 q15-6 - solutions for scaling the cloud computing network infrastructure
 
Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017Software Defined Networking - Huawei, June 2017
Software Defined Networking - Huawei, June 2017
 
Ccna courses
Ccna coursesCcna courses
Ccna courses
 
Technology Innovation That Matters
Technology Innovation That MattersTechnology Innovation That Matters
Technology Innovation That Matters
 
Introduction to SDN and NFV
Introduction to SDN and NFVIntroduction to SDN and NFV
Introduction to SDN and NFV
 
Qnx os
Qnx os Qnx os
Qnx os
 
네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성네트워크 가상화 보안현황 및 보안연관성
네트워크 가상화 보안현황 및 보안연관성
 

Viewers also liked

Hector miguel soto hernández
Hector miguel soto hernándezHector miguel soto hernández
Hector miguel soto hernández
Mc Hector Sotington
 
Pitchdeck Tradertwit
Pitchdeck TradertwitPitchdeck Tradertwit
Pitchdeck Tradertwit
José Luis Cases Lozano
 
updated resume
updated resumeupdated resume
updated resumeJose Ramos
 
Quien quiere salir conmigo final pptx
Quien quiere salir conmigo final pptxQuien quiere salir conmigo final pptx
Quien quiere salir conmigo final pptx
Ana Luis Duran
 
National Policy Guidelines for Prevention and Control
National Policy Guidelines for Prevention and ControlNational Policy Guidelines for Prevention and Control
National Policy Guidelines for Prevention and ControlAlfred Muli
 
The Golden 20's
The Golden 20'sThe Golden 20's
The Golden 20'sALM1234
 
BethelRoc Announcements May 3, 2015
BethelRoc Announcements May 3, 2015BethelRoc Announcements May 3, 2015
BethelRoc Announcements May 3, 2015
Gregory Kayne
 
Manual Handling Refresher
Manual Handling RefresherManual Handling Refresher
Manual Handling Refresher
Gabrielle McBriarty
 
Presentation global education
Presentation global educationPresentation global education
Presentation global education
Ana Luis Duran
 
Eco club presntation
Eco club presntationEco club presntation
Eco club presntation
mohamed abdi
 
Do not go gentle into that good night nh (1)
Do not go gentle into that good night   nh (1)Do not go gentle into that good night   nh (1)
Do not go gentle into that good night nh (1)
Nazneen Sultana
 
Environmental control organization ( presentation )
Environmental control organization ( presentation )Environmental control organization ( presentation )
Environmental control organization ( presentation )
mohamed abdi
 

Viewers also liked (15)

Hector miguel soto hernández
Hector miguel soto hernándezHector miguel soto hernández
Hector miguel soto hernández
 
Pitchdeck Tradertwit
Pitchdeck TradertwitPitchdeck Tradertwit
Pitchdeck Tradertwit
 
updated resume
updated resumeupdated resume
updated resume
 
CV_(CMA & CTP)
CV_(CMA & CTP)CV_(CMA & CTP)
CV_(CMA & CTP)
 
Quien quiere salir conmigo final pptx
Quien quiere salir conmigo final pptxQuien quiere salir conmigo final pptx
Quien quiere salir conmigo final pptx
 
Artful Dining
Artful DiningArtful Dining
Artful Dining
 
National Policy Guidelines for Prevention and Control
National Policy Guidelines for Prevention and ControlNational Policy Guidelines for Prevention and Control
National Policy Guidelines for Prevention and Control
 
The Golden 20's
The Golden 20'sThe Golden 20's
The Golden 20's
 
BethelRoc Announcements May 3, 2015
BethelRoc Announcements May 3, 2015BethelRoc Announcements May 3, 2015
BethelRoc Announcements May 3, 2015
 
Manual Handling Refresher
Manual Handling RefresherManual Handling Refresher
Manual Handling Refresher
 
Presentation global education
Presentation global educationPresentation global education
Presentation global education
 
perforacion diamantinA
perforacion diamantinAperforacion diamantinA
perforacion diamantinA
 
Eco club presntation
Eco club presntationEco club presntation
Eco club presntation
 
Do not go gentle into that good night nh (1)
Do not go gentle into that good night   nh (1)Do not go gentle into that good night   nh (1)
Do not go gentle into that good night nh (1)
 
Environmental control organization ( presentation )
Environmental control organization ( presentation )Environmental control organization ( presentation )
Environmental control organization ( presentation )
 

Similar to Distributech_Presentation DTECH_2013

2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
Mike Svoboda
 
Ansible for networks
Ansible for networksAnsible for networks
Ansible for networks
Scott van Kalken
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SAMeh Zaghloul
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
LF Events
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
MayaData Inc
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot Aymeric Weinbach
 
Edge Computing: A Unified Infrastructure for all the Different Pieces
Edge Computing: A Unified Infrastructure for all the Different PiecesEdge Computing: A Unified Infrastructure for all the Different Pieces
Edge Computing: A Unified Infrastructure for all the Different Pieces
Cloudify Community
 
Cloud computing components
Cloud computing componentsCloud computing components
Cloud computing components
PSG College of Technology
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
Jay Bryant
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
SDN Hub
 
Resilient Network Design Concepts Educat
Resilient Network Design Concepts EducatResilient Network Design Concepts Educat
Resilient Network Design Concepts Educat
SamGrandprix
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs
Cisco Canada
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
nicholas njoroge
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Brocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDCBrocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDC
EMC Nederland
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
OWASP Delhi
 
Ocpeu14
Ocpeu14Ocpeu14
Ocpeu14
KALRAY
 
Build the network of the future on your terms today
Build the network of the future on your terms todayBuild the network of the future on your terms today
Build the network of the future on your terms today
Dell World
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
ratthaslip ranokphanuwat
 

Similar to Distributech_Presentation DTECH_2013 (20)

2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)2017 - LISA - LinkedIn's Distributed Firewall (DFW)
2017 - LISA - LinkedIn's Distributed Firewall (DFW)
 
Ansible for networks
Ansible for networksAnsible for networks
Ansible for networks
 
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
SDN 101: Software Defined Networking Course - Sameh Zaghloul/IBM - 2014
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storageWebinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
Webinar: OpenEBS - Still Free and now FASTEST Kubernetes storage
 
Gab 2015 aymeric weinbach azure iot
Gab   2015 aymeric weinbach azure iot Gab   2015 aymeric weinbach azure iot
Gab 2015 aymeric weinbach azure iot
 
Edge Computing: A Unified Infrastructure for all the Different Pieces
Edge Computing: A Unified Infrastructure for all the Different PiecesEdge Computing: A Unified Infrastructure for all the Different Pieces
Edge Computing: A Unified Infrastructure for all the Different Pieces
 
Cloud computing components
Cloud computing componentsCloud computing components
Cloud computing components
 
Automated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge CloudsAutomated Deployment and Management of Edge Clouds
Automated Deployment and Management of Edge Clouds
 
Understanding network and service virtualization
Understanding network and service virtualizationUnderstanding network and service virtualization
Understanding network and service virtualization
 
Resilient Network Design Concepts Educat
Resilient Network Design Concepts EducatResilient Network Design Concepts Educat
Resilient Network Design Concepts Educat
 
NCS: NEtwork Control System Hands-on Labs
NCS:  NEtwork Control System Hands-on Labs NCS:  NEtwork Control System Hands-on Labs
NCS: NEtwork Control System Hands-on Labs
 
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case StudyCisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
Cisco Standard Network Platform (SNP) - Catholic Relief Services Case Study
 
Nozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-SheetNozomi Networks SCADAguardian - Data-Sheet
Nozomi Networks SCADAguardian - Data-Sheet
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Brocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDCBrocade Ethernet Fabrics and the ODDC
Brocade Ethernet Fabrics and the ODDC
 
ICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep SinghICS Security 101 by Sandeep Singh
ICS Security 101 by Sandeep Singh
 
Ocpeu14
Ocpeu14Ocpeu14
Ocpeu14
 
Build the network of the future on your terms today
Build the network of the future on your terms todayBuild the network of the future on your terms today
Build the network of the future on your terms today
 
IoT meets Big Data
IoT meets Big DataIoT meets Big Data
IoT meets Big Data
 

Distributech_Presentation DTECH_2013

  • 1. Deployment of a Secure Distributed SCADA (DSCADA) System Using Data-diodes in a Self-contained Fiber-optic Network Burlington Electric Department Dorian Hernandez Schneider Electric (Telvent) Mark Atchley Waterfall Security Andrew Ginter Made with LibreOffice and Ubuntu Linux
  • 2. Overview ● How to share data from a high security net- work (SCADA) to a lower security network (business LAN). ● How to implement the best deployment strategy to achieve the above. ● Problems encountered during deployment. ● Benefits and drawbacks. Made with LibreOffice and Ubuntu Linux
  • 3. Long-term goals ● To make implementation as permanent as pos- sible. ● Improve bandwidth and redundancy depending on traffic. ● Apply same methodology to other critical sys- tems like PLCs, etc. ● Complete isolation while maintaining required communications. Made with LibreOffice and Ubuntu Linux
  • 4. About BED ● Established in 1905 in Burlington, Vermont. ● Approx. 20,000 customers. ● Largest municipally-owned electric utility in Vermont. ● Power coming from sources that include biomass, wind and hydro. ● Smart Grid deployment. ● Smart Meter deployment. Made with LibreOffice and Ubuntu Linux
  • 5. Present Situation ● Current SCADA system uses firewalls for network “segmentation”. ● Firewalls have their vulnerabilities. ● New SCADA system has to have best approach to mitigate potential threats. ● Opportunity to build it from the ground up and be integral part of the process. ● We want the best possible solution while not breaking the bank. Made with LibreOffice and Ubuntu Linux
  • 6. Present Situation (cont.) ● Old way of doing things: Made with LibreOffice and Ubuntu Linux
  • 7. Present Situation (cont.) ● Constant monitoring of intrusion logs. ● Correct setup of rules and other settings. ● CPU may not scale to traffic demands. ● Costs incurred due to licensing. ● Multiple units to achieve redundancy. ● Life cycle, end-of-life. Using firewalls Made with LibreOffice and Ubuntu Linux
  • 8. Present Situation (cont.) ● “TCP Split Handshake” ● “ACL Bypass” ● “ASDM Administrative Command Injection” ● “Cross-Site Scripting (XSS)” ● If payload is delivered via sneaker-net, outbound traffic may be incorrectly treated as valid. Potential Firewall Vulnerabilities Made with LibreOffice and Ubuntu Linux
  • 9. 1) Phishing / drive-by-download – victim pulls your attack through firewall 2) Social engineering – steal a password / keystroke logger / shoulder surf 3) Compromise domain controller – create ICS host or firewall account / passwd 4) Attack exposed servers – SQL injection / DOS / b-overflow / default password 5) Attack exposed clients – compromise web servers / file servers / b-overflows 6) Session hijacking – man-in-the-middle / steal HTTP cookies / cmd-injection 7) Piggy-back on VPN – split tunneling / malware propagation 8) Firewall vulnerabilities – bugs / zero-days / default passwords / design vulns 9) Errors and omissions – bad firewall rules/configs / IT reaches through fwalls 10) Forge an IP address – most rules are IP-based / ARPSpoof to block real IP 11) Bypass network perimeter – rogue wireless / dial-up / complex topologies 12) Physical access to firewall – reset to factory defaults / local admin / wiring 13) Sneakernet – removable media / plug untrusted laptops into trusted network 13 Ways Through a Firewall Present Situation (cont.) Made with LibreOffice and Ubuntu Linux
  • 10. Development up to present ● Starting from scratch with the latest Telvent Oasys DNA SCADA solution. ● Applying the “Onion” model for security. ● Applying the “Pretender” model for data sharing. ● Deploying Telvent's Oasys DNA DSS SCADA model solution. ● Deploying Waterfall For ICCP Uni-Directional Gateway. Made with LibreOffice and Ubuntu Linux
  • 11. Development up to present ● The “Onion” model approach. ● What's your high- est priority in your SCADA network? ● Don't be afraid to be paranoid. ● Don't be afraid to be a “control freak”. ● T.N.O: “Trust No One”. Made with LibreOffice and Ubuntu Linux
  • 12. Development to present (cont.) Possible Solution Model ● Obfuscation of SCADA NETWORK by means of segmenting networks via Uni-Directional Gateway AND “Pretender” systems. Made with LibreOffice and Ubuntu Linux
  • 13. Development to present (cont.) ● “Real” SCADA system is not exposed to external networks. ● “Pretender” system handles all request from systems needing data from it. ● “Pretender” system can be part of Honey-Pot system, along with IDS/IPS systems to monitor for intrusion attempts that get past BIZ-facing firewalls. ● DSS system should be easier to rebuild than “Real” SCADA system. Made with LibreOffice and Ubuntu Linux
  • 14. Architected solution Made with LibreOffice and Ubuntu Linux
  • 15. Pros and Cons ● Secure network cannot be penetrated by less secure network. ● Data to be shared is passed to DSS system where it is an exact replica of “Real” SCADA system. ● Isolation of possible intrusion to DSS zone. ● Controls cannot be modified at “Real' SCADA system. ● DSS can help in scanning for possible intrusion attempts. ● DSS easier to rebuild than “Real” SCADA system. ● Burden taken off “Real” SCADA system DB for queries, etc. ● Discrete architecture to compartmentalize connections. ● Almost “set-it-and-forget-it” design – peace of mind. Pros: Made with LibreOffice and Ubuntu Linux
  • 16. Pros and Cons ● User needs to understand ICCP point assignment and al- ways adhere to the rules. ● No “auto-magic” way to set up data sets: some manual la- bor is required but this forces admin to really understand setup. ● Double-the-work, double-the-fun. Need to set up ICCP on both SECURE and DSS networks – not big deal. ● More devices to setup, maintain, and assure their up-time. ● Longer deployment time, but this could also result in better understanding of system. Cons: Made with LibreOffice and Ubuntu Linux
  • 17. Improvements ● Create a two-site configuration of the Telvent Oasys DSS system for better re- dundancy. ● Upgrade to Waterfall for ICCP High Avail- ability solution for better redundancy. ● Upgrade BIZ-facing and DSS-facing fire- walls to High-Availability systems. Made with LibreOffice and Ubuntu Linux
  • 18. Improvements ● Create a two-site configuration of the Telvent Oasys DSS sys- tem for better redundancy. Made with LibreOffice and Ubuntu Linux
  • 19. Improvements ● Upgrade to Waterfall for ICCP High Availability so- lution for better redundancy.Upgrade to Waterfall for ICCP High Availability solution for better redun- dancy. Made with LibreOffice and Ubuntu Linux
  • 20. Other possibilities ● Protecting PLCs Made with LibreOffice and Ubuntu Linux
  • 21. Conclusion ● Because of the stringent cyber-security requirements by the DOE, NERC, and other entities, the Uni-Directional Gateway Data Diode was the best solution to mitigate potential threats and comply with existing and future regulations (NERC CIP V5, etc.) and protect SCADA systems against obsolescence and its side effects. Made with LibreOffice and Ubuntu Linux
  • 22. Feedback ● Thank you for your time Made with LibreOffice and Ubuntu Linux