Industrial control systems (ICS) are used to control industrial processes and manufacturing equipment. They face unique security challenges compared to traditional IT systems due to their real-time operation and custom hardware and software. This document discusses several past ICS cyber attacks and identifies vulnerabilities in ICS security architecture, configuration management, patch management, and change testing. Proper ICS security requires a cross-functional team approach and careful management of the specialized ICS environment.
Presented at ISACA's EuroCACS 2015 (Copenhaguen).
Understand the impact of Industrial Control Systems (ICS) on the security ecosystem.
Expand the knowledge on SCADA systems and how cyberattacks can have physical consequences, bridging the cyber and physical worlds.
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
• Why An Industrial Cybersecurity Standard
• What Is IEC 62443 About
• How It Impacts On You - The Security Lifecycle
• IEC 62443 Certificates
• Reference: Some Ongoing Projects
• Summary
Operational technology (OT) and information technology (IT) security protect devices, networks, systems, and users. Cybersecurity has long been critical in IT and helps organizations keep sensitive data safe, ensure users connect to the internet securely, and detect and prevent potential cyberattacks.
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
Donovan Tindall of Honeywell at the S4x15 Operations Technology Day (OTDay). A meaty, but practical technical session on how to use Active Directory to help manage and secure your ICS.
Presented at ISACA's EuroCACS 2015 (Copenhaguen).
Understand the impact of Industrial Control Systems (ICS) on the security ecosystem.
Expand the knowledge on SCADA systems and how cyberattacks can have physical consequences, bridging the cyber and physical worlds.
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020Jiunn-Jer Sun
• Why An Industrial Cybersecurity Standard
• What Is IEC 62443 About
• How It Impacts On You - The Security Lifecycle
• IEC 62443 Certificates
• Reference: Some Ongoing Projects
• Summary
Operational technology (OT) and information technology (IT) security protect devices, networks, systems, and users. Cybersecurity has long been critical in IT and helps organizations keep sensitive data safe, ensure users connect to the internet securely, and detect and prevent potential cyberattacks.
Active Directory in ICS: Lessons Learned From The FieldDigital Bond
Donovan Tindall of Honeywell at the S4x15 Operations Technology Day (OTDay). A meaty, but practical technical session on how to use Active Directory to help manage and secure your ICS.
Presented: September 21, 2017
At: CS2AI, Washington, DC
A decade ago, ISA99 published the first standard in what is now the ISA/IEC 62443 series. Since then, the series has coalesced into the current form consisting of 13 individual documents in various stages of completion, publication, and/or revision. Printing out all of the existing standards and drafts can easily use up more than a ream of paper. It can be a daunting task to try to apply it to an organization. So, what are you supposed to do? How are you supposed to proceed? In this talk, I’ll go over some of the lessons I’ve learned from helping customers develop and evaluate security programs within their organization.
Secure Systems Security and ISA99- IEC62443Yokogawa1
With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.
Topics Covered in this Seminar Include:
Overview Of Cyber Threat
Introduction - ISA IEC Industrial Control Security Standards
An Example - Advanced Persistent Threat (APT)
ISA/IEC 62443-3-2 Network Separation - An APT countermeasure
The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards
ISA/IEC 62443 Cybersecurity Standards Current Efforts
The Future of ISA/IEC 62443 Cybersecurity Standards
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
Senior Director of Business Development, Matt Cowell's, S4x20 presentation details how to build an effective OT security operations center and the tools and skills needed.
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
Find out the SOC Cyber Security at Steppa. Our SOC contains several capabilities like process and break down any PC translated information, assess and distinguish suspicious and maicious web and system activities, visualize and monitor all threats in real time.
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
With cybersecurity threats continuing to grow faster than security budgets, CISOs, CIOs and SecOps teams are left at a dangerous disadvantage.
Even enterprises running their own Security Operations Centers (SOCs) find the perennial shortage of skills, tools, and other resources stops them from realizing the full value of investments. Rather than struggle to find – and hang on to – top talent with hands-on experience across network and cloud security, mid-sized enterprises are instead opting for SOC-as-a-Service offerings.
Is your ICS breached? Are you sure? How do you know?
The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available. In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation will show how NSM should be part of ICS defense and response strategy, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS security program. Free tools such as Security Onion, Snort IDS, Bro IDS, NetworkMiner, and Wireshark will be used to look at the ICS environment for anomalies. It will be helpful if attendees have read these books (but they aren't required): The Cuckoo's Egg by Cliff Stoll, The Practice of Network Security Monitoring by Richard Bejtlich, and Applied Network Security Monitoring by Chris Sanders and Jason Smith.
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
John Kendall, Security Program Director, Unisys Asia Pacific delivered this presentation at the 2013 Corporate Cyber Security Summit. The event examined cyber threats to Australia’s private sector and focused on solutions and counter cyber-attacks.
Presented: September 21, 2017
At: CS2AI, Washington, DC
A decade ago, ISA99 published the first standard in what is now the ISA/IEC 62443 series. Since then, the series has coalesced into the current form consisting of 13 individual documents in various stages of completion, publication, and/or revision. Printing out all of the existing standards and drafts can easily use up more than a ream of paper. It can be a daunting task to try to apply it to an organization. So, what are you supposed to do? How are you supposed to proceed? In this talk, I’ll go over some of the lessons I’ve learned from helping customers develop and evaluate security programs within their organization.
Secure Systems Security and ISA99- IEC62443Yokogawa1
With the new Industrial Network standards like ISA-IEC62443 companies are evolving their IT and OT networks to face evolving threats. This presentation will cover industrial networking best practices, secure architectures and segregation techniques that can be used by all businesses to prevent a minor business network breach from becoming an industrial catastrophe.
Topics Covered in this Seminar Include:
Overview Of Cyber Threat
Introduction - ISA IEC Industrial Control Security Standards
An Example - Advanced Persistent Threat (APT)
ISA/IEC 62443-3-2 Network Separation - An APT countermeasure
The next step in APT defenses System Certification to ISA/IEC 62443 Cybersecurity Standards
ISA/IEC 62443 Cybersecurity Standards Current Efforts
The Future of ISA/IEC 62443 Cybersecurity Standards
Vulnerability Assessment and Penetration Testing in online SCADA ICS Environm...PECB
This webinar will help you get more informed on PenTesting in SCADA and also best practices and methods used on risk assessment. Learning about the criticality in industry, makes you more flexible to boost the skills.
Main points covered:
• The SCADA ICS function in critical infrastructure industry
• Risk exposure of IT vs. SCADA ICS from Cyber Security Perspective
• Do's and don’ts of Vulnerability Assessment and Penetration Testing in SCADA ICS Environment
Presenter:
This webinar was presented by Pedro Putu Wirya, an IT and ICS Security Consultant with an extensive experience in ISMS, and PECB Certified Trainer.
Link of the recorded session published on YouTube: https://youtu.be/icq-RTwusZ8
Dragos S4x20: How to Build an OT Security Operations CenterDragos, Inc.
Senior Director of Business Development, Matt Cowell's, S4x20 presentation details how to build an effective OT security operations center and the tools and skills needed.
In today’s business environment, organizations have a responsibility to their employees, clients, and customers to ensure the confidentiality, integrity and availability of the critical data that is entrusted to them. Every network is vulnerable to some form of attack. However it is not enough to simply confirm that a technical vulnerability exists and implement countermeasures; it is critical to repeatedly verify that the countermeasures are in place and working properly throughout the secured network. During this webinar, David Hammarberg, Principal, IT Director, and leader of McKonly & Asbury’s Cybersecurity Practice will be joined by Partner, Michael Hoffner and they will lead a discussion on a Cybersecurity Risk Management Program including what it is and how it can prepare your organization for the future.
Find out the SOC Cyber Security at Steppa. Our SOC contains several capabilities like process and break down any PC translated information, assess and distinguish suspicious and maicious web and system activities, visualize and monitor all threats in real time.
To Build Or Not To Build: Can SOC-aaS Bridge Your Security Skills Gap?NetEnrich, Inc.
With cybersecurity threats continuing to grow faster than security budgets, CISOs, CIOs and SecOps teams are left at a dangerous disadvantage.
Even enterprises running their own Security Operations Centers (SOCs) find the perennial shortage of skills, tools, and other resources stops them from realizing the full value of investments. Rather than struggle to find – and hang on to – top talent with hands-on experience across network and cloud security, mid-sized enterprises are instead opting for SOC-as-a-Service offerings.
Is your ICS breached? Are you sure? How do you know?
The current state of security in Industrial Control Systems is a widely publicized issue, but fixes to ICS security issues are long cycle, with some systems and devices that will unfortunately never have patches available. In this environment, visibility into security threats to ICS is critical, and almost all of ICS monitoring has been focused on compliance, rather than looking for indicators/evidence of compromise. The non-intrusive nature of Network Security Monitoring (NSM) is a perfect fit for ICS. This presentation will show how NSM should be part of ICS defense and response strategy, various options for implementing NSM, and some of the capabilities that NSM can bring to an ICS security program. Free tools such as Security Onion, Snort IDS, Bro IDS, NetworkMiner, and Wireshark will be used to look at the ICS environment for anomalies. It will be helpful if attendees have read these books (but they aren't required): The Cuckoo's Egg by Cliff Stoll, The Practice of Network Security Monitoring by Richard Bejtlich, and Applied Network Security Monitoring by Chris Sanders and Jason Smith.
Potential Impact of Cyber Attacks on Critical InfrastructureUnisys Corporation
John Kendall, Security Program Director, Unisys Asia Pacific delivered this presentation at the 2013 Corporate Cyber Security Summit. The event examined cyber threats to Australia’s private sector and focused on solutions and counter cyber-attacks.
This presentation discusses why cybersecurity is an issue for safety instrumented systems and will examine example architectures when communicating with the SIS.
Robust Cyber Security for Power UtilitiesNir Cohen
The security of critical networks is at the center of attention of industry and government regulators alike. Check Point and RAD offer a joint end-to-end cyber security solution that protects any utility operational technology (OT) network by eliminating RTU and SCADA equipment vulnerabilities, as well as defends against cyber-attacks on the network’s control and data planes. This solution brief explains how the joint solution enables compliance with NERC-CIP directives, provides deep visibility and control of ICS/SCADA communications, and allows secure remote access into OT networks.
How Test Labs Reduce Cyber Security Threats to Industrial Control Systemse cy...Schneider Electric
Federal agencies are moving their industrial control systems (ICS) from operational business networks to separate, dedicated networks in order to enhance security. However, without a system to test the new equipment and software coming into these separate networks, security risks will persist. This paper explores the impact on security of instituting a sanctioned ICS test lab and recommends best practices for setting up and operating these labs.
Challenges and Solution to Mitigate the cyber-attack on Critical Infrastruct...Abhishek Goel
SCADA systems control some of the most vital infrastructure in industrial and energy sectors, from oil and gas pipelines to nuclear facilities to water treatment plants.
Critical infrastructure is defined as the physical and IT assets, networks and services that if disrupted or destroyed would have a serious impact on the health, security, or economic wellbeing of citizens and the efficient functioning of a country’s government.
Augmentation of a SCADA based firewall against foreign hacking devices IJECEIAES
An Industrial firewall is a system used to supervise and regulate traffic to and from a network for the purpose of securing appliances on a network. It analyzes the data passing through it to an already defined surveillance criteria or protocols, discarding data that does not meet the protocol’s requirements. In effect, it is a filter preventing undesirable network traffic and selectively limiting the type of transmission that occurs between a secured transmission line. In this research paper a SCADA based Firewall is implemented for protection of the data transmission to a PLC, against external hacking devices. This firewall is virtually exposed to several external hackers and the degree of vulnerability is carefully studied, in order to develop an ideal Firewall.
The Nozomi Networks solution improves ICS cyber resiliency and provides real-time operational visibility. Major customers have improved reliability, cybersecurity and operational efficiency using our technology. Learn more about our solutions and technology here and how they can bring immediate benefit to your industrial control system (ICS)
Slides from panel talk at the annual IEEE Power and Energy Society meeting on Power System Cybersecurity.
After a 8 hour tutorial and a panel talk, there were a number of consistent themes and challenges that surfaced. The two that concern me the most are: a) blocking engineers from discussing security approaches at technical conferences and b) treating power system cybersecurity as only a compliance issue for the IT, legal, and compliance departments. With the hopes that this sparks a bigger conversation, I’m sharing a copy of my slides from our panel talk. Thoughts and comments are welcomed.
Using Cyber-Vulnerability Assessment (CVA) to Optimize Control System Upgrade...Jim Gilsinn
Presented @ Emerson Exchange
October 7, 2014
Industrial control systems (ICS) are large information technology (IT) systems. Office IT systems, failure of ICS can cause plant outages and even physical damage. Management of ICS needs to be different and smarter. IT vendors frequently recommend patches and configuration changes. Most have no impact to the ICS, which cannot implement changes in real time. ICS typically get one chance every few years to make changes - the turnaround. This paper describes optimization of ISC turnaround work, using cyber-vulnerability assessment to focus turnaround work to only what is necessary.
Understanding Cyber Industrial Controls in the Manufacturing and Utilities En...Dawn Yankeelov
"Understanding Cyber Industrial Controls in the Manufacturing and Utilities Environment," By Dr. John Naber, Co-Founder & Partner in True Secure SCADA, which is KY-based and holds 2 key patents in this area. This was given at the TALK Cybersecurity Summit 2018 in Louisville, KY.
In today’s connected world, cyber security is a topic that nobody can afford to ignore. In recent years the number and frequency of attacks on industrial devices and other critical infrastructure has risen dramatically. Recent news stories about hackers shutting down critical infrastructure have left many companies wondering if they are vulnerable to similar attacks. In this webinar we will discuss the most common security threats and unique challenges in securing industrial networks. We will introduce the current standards and share some useful resources and best practices for addressing industrial cyber security.
Key Takeaways:
1. Gain perspective regarding common security threats facing industrial networks.
2. Learn about the relevant standards governing industrial cyber security.
3. Increase understanding of some best practices for securing industrial networks.
2. What is Industrial Control Systems ?
•Industrial Control System (ICS) is a general term that encompasses several types
of control systems used in industrial process control for production and
manufacture, including SCADA, DCS and PLC systems
•ICS’s are typically used in industries such as oil & gas production, power
generation and nuclear installations. ICS’s are specifically designed and
manufactured for the industrial environment, they are designed to be installed
Industrial Control Systems cyber Security
manufactured for the industrial environment, they are designed to be installed
for offshore and onshore applications.
Typical examples of ICS
3. What is Cyber security ?
Cyber-security is the body of technologies, processes and practices designed to protect
networks, computers, programs and data from attack, damage or unauthorized access. In
a computing context, security includes both cyber-security and physical security.
Industrial Control Systems cyber Security
Do we really need this in the industrial process control network ? ?
4. To simply answer this question, history says it all !!
Do we really need this in the industrial process control network ?
Incident Description
2000 Maroochy Water
Treatment ,Australia
( SCADA system)
A disgruntled former
employee hacked into the
system, took control of 150
pumping stations and releasedpumping stations and released
1 million liters of raw sewage
into local parks, rivers and
even the grounds of a Hyatt
Regency hotel over a 3 month
period.
Observations •Radio communications commonly used in SCADA systems are often
insecure or improperly configured
•SCADA devices and software should be secured to the extent possible using
physical and logical controls
•Difficult to differentiate attacks from malfunctions
•Also recommended : Anti-virus , Firewall protection, Appropriate use of
encryption , Upgrade-able SCADA systems (from a security perspective) ,
Proper staff training and Security auditing and control.
5. 2000 Maroochy Water Treatment
•There was no active protection not even a properly configured firewall .
6. Famous ICS cyber attacks !!
Incident Description
2003 PDVSA Oil Terminal , Venezuela
( PLC Controller)
Details of the cyber attacks on PDVSA’s systems
were slow to emerge, but it seemed that
hackers were able to penetrate the SCADA
system responsible for tanker loading at a
marine terminal in eastern Venezuela. Once
inside, the hackers erased the programs in the
programmable logic controllers (PLCs)
operating the facility, preventing tanker
loading for eight hours. Fortunately for PDVSA,
the tactics of attackers were unsophisticated,the tactics of attackers were unsophisticated,
making detection of the problem relatively
easy, and backups of the PLC programs were
unaffected, making recovery straightforward.
Observations •Internal surveys at several major oil companies indicated that managers
often misunderstand the situation they face when it comes to SCADA
security. First, many believe that the Information Technology (IT) group
automatically looks after SCADA security
•While IT departments are very good at providing security for systems they
understand, such as Windows® servers and accounting databases, the
critical control systems that run the pipelines and refineries day in and day
out are forbidding beasts to the IT professional .
7. Incident Description
2006 Brown’s Ferry Nuclear
Plant , USA
( PLC Controller and VFD)
•Unit 3 was manually shutdown after the failure of both reactor
recirculation pumps and the condensate demineralizer controller.
The condensate demineralizer used a programmable logic
controller (PLC); the recirculation pumps depend on variable
frequency drives (VFD) to modulate motor speed.
• Both kinds of devices have embedded microprocessors that can
communicate data over the Ethernet LAN. However, both devices
are prone to failure in high traffic environments. A device using
Famous ICS cyber attacks !!
are prone to failure in high traffic environments. A device using
Ethernet broadcasts data packets to every other device
connected to the network. Receiving devices must examine each
packet to determine which ones are addressed to them and to
ignore those that are not.
• It appears the Browns Ferry control network produced more
traffic than the PLC and VFD controllers could handle; it is also
possible that the PLC malfunctioned and flooded the Ethernet
with spurious traffic, disabling the VFD controllers; tests
conducted after the incident were inconclusive.
8. Incident Description
2010 Iran Nuclear
Processing, Iran ( PLC
Controller and DCS)
•Stuxnet specifically targets programmable logic controllers
(PLCs), which allow the automation of electromechanical
processes such as those used to control machinery on factory
assembly lines, amusement rides, or centrifuges for separating
nuclear material. Exploiting four zero-day flaws, Stuxnet
functions by targeting machines using the Microsoft
Windows operating system and networks, then seeking
out Siemens Step7 software.
Famous ICS cyber attacks !!
out Siemens Step7 software.
•Stuxnet is typically introduced to the target environment via an
infected USB flash drive. The worm then propagates across the
network, scanning for Siemens Step7 software on computers
controlling a PLC. In the absence of either criterion, Stuxnet
becomes dormant inside the computer. If both the conditions are
fulfilled, Stuxnet introduces the infected rootkit onto the PLC and
Step7 software, modifying the codes and giving unexpected
commands to the PLC while returning a loop of normal
operations system values feedback to the users
10. •Managers often misunderstand the situation they face when it comes to ICS security.
First, many believe that the Information Technology (IT) group automatically looks
after ICS security
IT system Vs ICS system
Category Information Technology System Industrial Control System
Performance Requirements •Non-real-time
•Response must be consistent
•Tightly restricted access control
can be implemented to the
degree necessary for security
•Real-time
•Response is time-critical
•Access to ICS should be
strictly controlled, but should
not hamper or interfere with
human-machine interactionhuman-machine interaction
System Operation •Systems are designed for use
with typical operating systems
•Upgrades are straightforward
with the availability of
automated deployment tools
•Differing and possibly
proprietary operating systems,
often without security
capabilities built in
•Software changes must be
carefully made, usually by
software vendors, because of
the specialized control
algorithms and perhaps
modified hardware and
software involved
11. IT system Vs ICS system
Category Information Technology System Industrial Control System
Communications •Standard communications
protocols
•Primarily wired networks with
some localized wireless capabilities
•Typical IT networking practices
•Many proprietary and standard
communication protocols.
•Several types of communications
media used including dedicated
wire and wireless (radio and
satellite)
•Networks are complex and
sometimes require the expertise
of control engineersof control engineers
Managed Support •Allow for diversified support styles •Service support is usually via a
single vendor
Component Lifetime •Lifetime on the order of 3 to 5
years
•Lifetime on the order of 10 to 15
years
Conclusion :
•The operational and risk differences between ICS and IT systems create the need for increased
sophistication in applying cybersecurity and operational strategies.
• A cross-functional team of control engineers, control system operators and IT security
professionals needs to work closely to understand the possible implications of the installation,
operation, and maintenance of security solutions
13. Identifying Possible hazards and Vulnerable points
Vulnerability Description
Inadequate
incorporation of
security into
architecture and
design.
Incorporating security into the ICS architecture, design must start with
budget, and schedule of the ICS. The security architecture is part of
the Enterprise Architecture. The architectures must address the
identification and authorization of users, access control mechanism,
network topologies, and system configuration and integrity
mechanisms.
Hardware, firmware,
and software not
The organization doesn’t know what it has, what versions it has, where
they are, or what their patch status is, resulting in an inconsistent, andand software not
under configuration
management.
they are, or what their patch status is, resulting in an inconsistent, and
ineffective defense posture. A process for controlling modifications to
hardware, firmware, software, and documentation should be
implemented to ensure an ICS is protected against inadequate or
improper modifications before, during, and after system
implementation. A lack of configuration change management
procedures can lead to security oversights, exposures, and risks. To
properly secure an ICS, there should be an accurate listing of the
assets in the system and their current configurations. These
procedures are critical to executing business continuity and disaster
recovery plans.
14. Identifying Possible hazards and Vulnerable points
Vulnerability Description
OS and application
security patches are
not maintained or
vendor declines to
patch vulnerability
Out-of-date OSs and applications may contain newly discovered
vulnerabilities that could be exploited. Documented procedures should
be developed for how security patches will be maintained. Security
patch support may not even be available for ICS that use outdated OSs,
so procedures should include contingency plans for mitigating
vulnerabilities where patches may never be available.
Inadequate testing of
security changes
Modifications to hardware, firmware, and software deployed without
testing could compromise normal operation of the ICS. Documentedsecurity changes testing could compromise normal operation of the ICS. Documented
procedures should be developed for testing all changes for security
impact. The live operational systems should never be used for testing.
The testing of system modifications may need to be coordinated with
system vendors and integrators
Poor remote access
controls
There are many reasons why an ICS may need to be remotely
accessed, including vendors and system integrators performing system
maintenance functions, and also ICS engineers accessing
geographically remote system components. Remote access capabilities
must be adequately controlled to prevent unauthorized individuals
from gaining access to the ICS.
15. Identifying Possible hazards and Vulnerable points
Vulnerability Description
Critical configurations
are not stored or
backed up
Procedures should be available for restoring ICS configuration settings
in the event of accidental or adversary-initiated configuration changes
to maintain system availability and prevent loss of data. Documented
procedures should be developed for maintaining ICS configuration
settings.
Improper data linking ICS data storage systems may be linked with non-ICS data sources. An
example of this is database links, which allow data from one database
to be automatically replicated to others. Data linkage may create ato be automatically replicated to others. Data linkage may create a
vulnerability if it is not properly configured and may allow
unauthorized data access or manipulation
Malware protection
not installed or up to
date
Installation of malicious software, or malware, is a common attack.
Malware protection software, such as antivirus software, must be kept
current in a very dynamic environment. Outdated malware protection
software and definitions leave the system open to new malware
threats.
16. Identifying Possible hazards and Vulnerable points
Vulnerability Description
Denial of service (DoS) ICS software could be vulnerable to DoS attacks, resulting in the
prevention of authorized access to a system resource or delaying
system operations and functions.
Logs not maintained Without proper and accurate logs, it might be impossible to determine
what caused a security event to occur
Unauthorized
personnel have
Physical access to ICS equipment should be restricted to only the
necessary personnel, taking into account safety requirements, such aspersonnel have
physical access to
equipment
necessary personnel, taking into account safety requirements, such as
emergency shutdown or restarts. Improper access to ICS equipment
can lead to any of the following:
Physical theft of data and hardware
Physical damage or destruction of data and hardware
Unauthorized changes to the functional environment (e.g., data
connections, unauthorized use of removable media, adding/removing
resources)
Disconnection of physical data links
Undetectable interception of data (keystroke and other input
logging)
17. Identifying Possible hazards and Vulnerable points
Vulnerability Description
Radio frequency,
electromagnetic pulse
(EMP), static discharge,
brownouts and voltage
spikes
The hardware used for control systems is vulnerable to radio frequency
and electro-magnetic pulses (EMP), static discharge, brownouts and
voltage spikes.. The impact can range from temporary disruption of
command and control to permanent damage to circuit boards. Proper
shielding, grounding, power conditioning, and/or surge suppression is
recommended
Lack of backup power Without backup power to critical assets, a general loss of power will
shut down the ICS and could create an unsafe situation. Loss of power
could also lead to insecure default settings.could also lead to insecure default settings.
Unsecured physical
ports
Unsecured universal serial bus (USB) and PS/2 ports could allow
unauthorized connection of thumb drives, keystroke loggers, etc.
Inadequate
authentication,
privileges, and access
control in software
Unauthorized access to configuration and programming software could
provide the ability to corrupt a device.
Firewalls nonexistent
or improperly
configured
A lack of properly configured firewalls could permit unnecessary data
to pass between networks, such as control and corporate networks,
allowing attacks and malware to spread between networks, making
sensitive data susceptible to monitoring/eavesdropping, and providing
individuals with unauthorized access to systems
18. Security means access control
To secure the ICS network we must
•Control data flow and access
Between each two layers
•Control direct access to the hardware•Control direct access to the hardware
In the control network layer We need
Control
Who and
What will
Pass through
But how ? Also we
must
control
who gets
access
19. Security means access control
•What is a Firewall?
•Types of Firewalls
•Classes of Firewalls
•Overall Security Goals of ICS network Firewalls
Firewalls
•Overall Security Goals of ICS network Firewalls
•Common ICS network Segregation Architectures
20. Security means access control
•What is a Firewall?
Firewalls
A firewall is a mechanism used to control and monitor traffic to and from a network
for the purpose of protecting devices on the network. It compares the traffic passing
through it to a predefined security criteria or policy, discarding messages that do not
meet the policy’smeet the policy’s
21. Security means access control
•Types of Firewalls
Firewalls
A firewall can come in many different designs and configurations
1. It can be a separate hardware device
physically connected to a network
(such as the Cisco ASA® or
the Symantec Security Gateway® firewalls)
2. a completely host-based software solution
installed directly on the workstation
to be protected
(such as Norton Personal Firewall® or Sygate Personal Firewall®).
22. Security means access control
•Classes of Firewalls
Firewalls
•Packet Filter Firewalls
•Stateful Firewalls
•Application Proxy Firewalls
•Deep Packet Inspection Firewalls
As an Automation engineer all you need to know
Network traffic is sent in discrete groups of bits, called a packet. Each packet
typically contains a number of separate pieces of information, including (but
not limited to) items such as the:
• Sender's identity (Source Address).
• Recipient's identity (Destination Address).
• Service to which the packet pertains (Port Number).
• Network operation and status flags.
• Actual payload of data to be delivered to the service.
A firewall, determines what action to take with the packet, These decisions are
based on a series of rules commonly referred to as Access Control Lists (ACLs).
As an Automation engineer all you need to know
23. Security means access control
Firewalls
•Overall Security Goals of ICS network Firewalls
Ideally, a process control or SCADA network would be a closed system, accessible only
by trusted internal components such as the Human Machine Interface (HMI) stations
and data historians.
But
the need for external access from both corporate users and selected 3rd parties
exists
•production and maintenance management information needs to be relayed to
computers and users outside of the plant floor for management purposes
•vendors may need to access controllers for support purposes. Implicitly this means
that some network paths exist from the outside
24. Security means access control
Firewalls
•Overall Security Goals of ICS network Firewalls
The goal of the firewall, simply stated, is to minimize the risk of unauthorized access
(or network traffic) to internal components on the ICS systems. Such a risk
minimization strategy will typically include the following general objectives.
1. No direct connections from the Internet to the PCN/SCADA network and viceversa.1. No direct connections from the Internet to the PCN/SCADA network and viceversa.
2. Restricted access from the enterprise network to the control network.
3. Unrestricted (but only authorized) access from the enterprise network to shared
PCN/enterprise servers
4. Secure methods for authorized remote support of control systems.
5. Secure connectivity for wireless devices (if used).
6. Monitoring of traffic attempting to enter and on the PCN.
25. Security means access control
Firewalls
•Common ICS network Segregation Architectures.
1. Dual-Homed Computers .
2. Dual-Homed Server with Personal Firewall Software .
3. Packet Filtering Router/Layer-3 Switch between PCN and EN.3. Packet Filtering Router/Layer-3 Switch between PCN and EN.
4. Two-Port Firewall between PCN and EN.
5. Router/Firewall Combination between PCN and EN .
6. Firewall with Demilitarized Zones between PCN and EN .
7. Paired Firewalls between PCN and EN .
26. Common ICS network Segregation Architectures
1.Dual-Homed Computers.
Observations •A computer without proper security controls could pose additional threats
•All connections between the control network and the corporate network
should be through a firewall. This configuration provides no security
improvement and should not be used to bridge networks (e.g., ICS and
corporate networks).
27. Common ICS network Segregation Architectures
2.Dual-Homed Server with Personal Firewall Software .
Observations •The first issue with this solution is that it will only provide a mechanism to
allow the sharing of server data. If there is any other traffic that needs to
traverse the PCN to EN boundary (such as remote maintenance access to a
controller) then this architecture will either completely block that traffic or
leave the PCN poorly secured.
28. Common ICS network Segregation Architectures
3. Packet Filtering Router/Layer-3 Switch between PCN and EN.
Observations •This type of packet filter design is only secure if the enterprise network is
known to be highly secure in its own right and is not generally subject to
attacks.
29. Common ICS network Segregation Architectures
4.Two-Port Firewall between PCN and EN.
30. Common ICS network Segregation Architectures
4.Two-Port Firewall between PCN and EN.
Observations •this communication occurs at the application layer as Structured Query
Language (SQL) or Hypertext Transfer Protocol (HTTP) requests. Flaws in the
historian’s application layer code could result in a compromised historian
•if HTTP packets are allowed through the firewall, then Trojan horse
software accidentally introduced on an HMI or control network laptop could
be controlled by a remote entity and send data .
•while this architecture is a significant improvement over a non-segregated
network, it requires the use of firewall rules that allow direct
communications between the corporate network and control network
devices. This can result in possible security breaches if not very carefully
designed and monitored
31. Common ICS network Segregation Architectures
5.Router/Firewall Combination between PCN and EN .
32. Common ICS network Segregation Architectures
5.Router/Firewall Combination between PCN and EN .
Observations •The use of a router/firewall combination. The router sits in front of the
firewall and offers basic packet filtering services, while the firewall handles
the more complex issues using either stateful inspection or proxy
techniques. This type of design is very popular in Internet-facing firewalls
because it allows the faster router to handle the bulk of the incoming
packets, especially in the case of DoS attacks, and reduces the load on the
firewall. It also offers improved defense-in-depth because there are two
different devices an adversary must bypassdifferent devices an adversary must bypass
33. Common ICS network Segregation Architectures
6.Firewall with Demilitarized Zones between PCN and EN .
34. Common ICS network Segregation Architectures
6.Firewall with Demilitarized Zones between PCN and EN .
Observations •By placing corporate-accessible components in the DMZ, no direct
communication paths are required from the corporate network to the
control network; each path effectively ends in the DMZ. Most firewalls can
allow for multiple DMZs, and can specify what type of traffic may be
forwarded between zones.
•If a patch management server, an antivirus server, or other security server
is to be used for the control network, it should be located directly on theis to be used for the control network, it should be located directly on the
DMZ. Both functions could reside on a single server. Having patch
management and antivirus management
•The primary security risk in this type of architecture is that if a computer in
the DMZ is compromised, then it can be used to launch an attack against
the control network via application traffic permitted from the DMZ to the
control network
35. Common ICS network Segregation Architectures
7.Paired Firewalls between PCN and EN .
36. Common ICS network Segregation Architectures
7.Paired Firewalls between PCN and EN .
Observations •If firewalls from two different manufacturers are used, then this solution
may offer a “defence in depth” advantage. It also allows process control
groups and the IT groups to have clearly separated device responsibility
since each can manage a firewall on its own. In fact it is the study team’s
understanding that this design is recommended in the Federal Energy
Regulatory Commission (FERC) Proposal for Security Standards for this
reason
38. Industrial Control Systems cyber Security
references
1. "NRC Information Notice 2003-14: Potential Vulnerability of Plant Computer
Network to Worm Infection", United States Nuclear Regulatory Commission,
Washington, DC, August 29, 2003
2. “Process Control Network Reference Architecture v 1.0”, Invensys Inc., January
2004, pg. 2, 5
3. “Experion PKS Network and Security Planning Guide EP-DSX173, Release 210”,
Honeywell Limited Australia, October 2004
4. “Presentation: Securing SIMATIC PCS7 and SIMATIC IT in Networks”, Siemens,
2003
39. Industrial Control Systems cyber Security
Prepared by: Ahmed Shitta
Automation Section Head at Egyptian Projects Operation and
Maintenance (EPROM)
Email: ahmedshitta@gmail.com