Secure SCADAsupervisory control and data acquisitionPresenter: Tal  Ein-Habar, CISSPSecurity Architect
What is SCADA Network?Government ServicesTransportation (Road, rail, air, local public transportation, hazardous materials)Energy (Electrical utility transmission & distribution, oil and gas pipelines, nuclear materials & power)Water Controls (Dams, levees,reservoirs)Public Health (Hospitals, disease control)Emergency Services (Fire and police departments)Defense Industrial BaseCritical InfrastructuresChemicalIndustry (Petroleum, hazardous waste)State & Municipal Services (Safe water systems, waste disposal)Banking And Finance (Trading systems, automated clearinghouse network, ATM networks)Telecommunications (Broadcast television and radio)Postal & Shipping
Why Security Is An Issue ?Connections to IT networks are now the normNormal security maintenance causes disruptions and outagesRemote access suffers from wireless and radio communication vulnerabilitiesCritical asset information is unsecuredSecurity forensics are almost non-existentIdentification of cyber attacks is difficult to impossible>   1500 potential and existing regulations and standardsControl systems are on the hackers’ radarSpecific malware has already been created and downloadable Insiders pose biggest threat75-80% of incidents have been caused by current employees
Threat is changingCountries are looking at Cyber war as primary & legitimate way of Damaging their opponents The incentive for using cyberwar are:damage citizens to lead into chaos / changing political policy Acting from religious / political agendaCyberwar is intended to create fear on the remote populations
Attacks are here …דני יתום, לשעבר ראש המוסד, חושף:"ארגוני הטרור הגדולים מפעילים כיום אקדמיות לפיגועים מקוונים"ככל שמדינה מבססת יותר ויותר את תשתיותיה הלאומיות על רשת האינטרנט הציבורית והפתוחה - כך היא חושפת עצמה לסכנת טרור קיברנטי הולכת וגדלה, לפריצה ולשיבוש מערכות מוחלט"
מדינות בעולם מודעות לפגיעה אפשרית בתשתיות שלהן והן חוששות ממנה: תקשורת, בנקאות, חשמל, אנרגיה, נפט, שינוע גז, מים, תחבורה, שירותי חירום ושירותי ממשלה, "כולן יכולות לקרוס במקרה התקפה קיברנטית.Attacks are here …Russian Hackers Attack an Azerbaijani Energy PipelineAviation week reported that Russian hackers attacked servers controlling an energy pipeline carrying gas from Azerbaijan to Europe bypassing Russia. The hacker attacks caused suspension in the pipeline operations, forcing the operating company to redirect the oil through Baku-Novorossiysk Russian pipeline. Georgian websites claim that the attacks had the same IPs as those of Estonian websites DDos during the 2007 Estonian Cyber attacks.Information Security News 08/24/2009
Attacks are here … Cyber Terror“CIA Confirms Cyber Attack Caused Multi-City Power Outage: We have information that cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. We do not know who executed these attacks or why, butall involved intrusions through the Internet.”      (SANS Organization - January 18, 2008. ) Cyber CRIME“Federal prosecutors have charged 11 people with stealing more than 41 million credit and debit card  numbers, cracking what officials said on Tuesday appeared to be the largest hacking and identity theft ring ever exposed. … Once the thieves identified technical weaknesses in the networks, they installed so-called sniffer programs, obtained from collaborators overseas.”    (New York Times – 5 August 2008) Cyber WARFARE““While Russia and Estonia are embroiled in their worst dispute since the collapse of the Soviet Union, a row that erupted at the end of last month over the Estonians' removal of the Bronze Soldier Soviet war memorial in central Tallinn, the country has been subjected to a barrage of cyber warfare, disabling the websites of government ministries, political parties, newspapers, banks, and companies.(The Guardian, May 17, 2007)
Where is the problemWe divide the problem into several main segments:Connection between control networks & their sensor’sConnection between Control network & IT networkRemote management of critical Infrastructure
Sample Network Design
9 Critical Infrastructure Protection (CIP) StandardsAffected companies must be “auditably” compliance by mid-2010Compliance must be re-confirmed annuallyConsequence of non-compliance:Up to $1m USD per day
4 Design RequirementsSegment and Protect Critical Infrastructure Assets from Interconnected NetworksKnow Who Has Access and What They’re Doing in the Network Protect Information about Critical Infrastructure Assets from Data LeakageImplement Strong Security without Jeopardizing Availability, Integrity, and Reliability Requirements
Vendors
Waterfallפריסה של מערך שערים חד כיוונים לכל הקישורים לעולם החיצוני.
ניתן למנף את יכולות השערים הללו לשם ביצוע בבטחון מלא , של :
שליחת סטטוס שוטף למרכזי ניטור ובקרה מרוחקים.
שליחת נתוני ייצור לרשת הארגונית.
ניהול מבוקר של פעולות תחזוקה בחומרות המפוקחות.
יתרונות השיטה -  A Win-Win situation :
הפרדה חלקית / קישור חלקי.
הדרישות העסקיות באות על סיפוקן ( הגישה המסורתית) .
בטחון ברמה הגבוהה ביותר ( הגישה הקפדנית ) .T
Waterfallקישור חד כיווני מוחלט בין רשתות בעלות סיווג / רגישות שונה זו מזוהמערכת הינה חד כיוונית לחלוטין על בסיס תקשורת אופטית .

Scada Security

  • 1.
    Secure SCADAsupervisory controland data acquisitionPresenter: Tal Ein-Habar, CISSPSecurity Architect
  • 2.
    What is SCADANetwork?Government ServicesTransportation (Road, rail, air, local public transportation, hazardous materials)Energy (Electrical utility transmission & distribution, oil and gas pipelines, nuclear materials & power)Water Controls (Dams, levees,reservoirs)Public Health (Hospitals, disease control)Emergency Services (Fire and police departments)Defense Industrial BaseCritical InfrastructuresChemicalIndustry (Petroleum, hazardous waste)State & Municipal Services (Safe water systems, waste disposal)Banking And Finance (Trading systems, automated clearinghouse network, ATM networks)Telecommunications (Broadcast television and radio)Postal & Shipping
  • 3.
    Why Security IsAn Issue ?Connections to IT networks are now the normNormal security maintenance causes disruptions and outagesRemote access suffers from wireless and radio communication vulnerabilitiesCritical asset information is unsecuredSecurity forensics are almost non-existentIdentification of cyber attacks is difficult to impossible> 1500 potential and existing regulations and standardsControl systems are on the hackers’ radarSpecific malware has already been created and downloadable Insiders pose biggest threat75-80% of incidents have been caused by current employees
  • 4.
    Threat is changingCountriesare looking at Cyber war as primary & legitimate way of Damaging their opponents The incentive for using cyberwar are:damage citizens to lead into chaos / changing political policy Acting from religious / political agendaCyberwar is intended to create fear on the remote populations
  • 5.
    Attacks are here…דני יתום, לשעבר ראש המוסד, חושף:"ארגוני הטרור הגדולים מפעילים כיום אקדמיות לפיגועים מקוונים"ככל שמדינה מבססת יותר ויותר את תשתיותיה הלאומיות על רשת האינטרנט הציבורית והפתוחה - כך היא חושפת עצמה לסכנת טרור קיברנטי הולכת וגדלה, לפריצה ולשיבוש מערכות מוחלט"
  • 6.
    מדינות בעולם מודעותלפגיעה אפשרית בתשתיות שלהן והן חוששות ממנה: תקשורת, בנקאות, חשמל, אנרגיה, נפט, שינוע גז, מים, תחבורה, שירותי חירום ושירותי ממשלה, "כולן יכולות לקרוס במקרה התקפה קיברנטית.Attacks are here …Russian Hackers Attack an Azerbaijani Energy PipelineAviation week reported that Russian hackers attacked servers controlling an energy pipeline carrying gas from Azerbaijan to Europe bypassing Russia. The hacker attacks caused suspension in the pipeline operations, forcing the operating company to redirect the oil through Baku-Novorossiysk Russian pipeline. Georgian websites claim that the attacks had the same IPs as those of Estonian websites DDos during the 2007 Estonian Cyber attacks.Information Security News 08/24/2009
  • 7.
    Attacks are here… Cyber Terror“CIA Confirms Cyber Attack Caused Multi-City Power Outage: We have information that cyber attacks have been used to disrupt power equipment in several regions outside the United States. In at least one case, the disruption caused a power outage affecting multiple cities. We do not know who executed these attacks or why, butall involved intrusions through the Internet.” (SANS Organization - January 18, 2008. ) Cyber CRIME“Federal prosecutors have charged 11 people with stealing more than 41 million credit and debit card numbers, cracking what officials said on Tuesday appeared to be the largest hacking and identity theft ring ever exposed. … Once the thieves identified technical weaknesses in the networks, they installed so-called sniffer programs, obtained from collaborators overseas.” (New York Times – 5 August 2008) Cyber WARFARE““While Russia and Estonia are embroiled in their worst dispute since the collapse of the Soviet Union, a row that erupted at the end of last month over the Estonians' removal of the Bronze Soldier Soviet war memorial in central Tallinn, the country has been subjected to a barrage of cyber warfare, disabling the websites of government ministries, political parties, newspapers, banks, and companies.(The Guardian, May 17, 2007)
  • 8.
    Where is theproblemWe divide the problem into several main segments:Connection between control networks & their sensor’sConnection between Control network & IT networkRemote management of critical Infrastructure
  • 9.
  • 10.
    9 Critical InfrastructureProtection (CIP) StandardsAffected companies must be “auditably” compliance by mid-2010Compliance must be re-confirmed annuallyConsequence of non-compliance:Up to $1m USD per day
  • 11.
    4 Design RequirementsSegmentand Protect Critical Infrastructure Assets from Interconnected NetworksKnow Who Has Access and What They’re Doing in the Network Protect Information about Critical Infrastructure Assets from Data LeakageImplement Strong Security without Jeopardizing Availability, Integrity, and Reliability Requirements
  • 12.
  • 13.
    Waterfallפריסה של מערךשערים חד כיוונים לכל הקישורים לעולם החיצוני.
  • 14.
    ניתן למנף אתיכולות השערים הללו לשם ביצוע בבטחון מלא , של :
  • 15.
    שליחת סטטוס שוטףלמרכזי ניטור ובקרה מרוחקים.
  • 16.
    שליחת נתוני ייצורלרשת הארגונית.
  • 17.
    ניהול מבוקר שלפעולות תחזוקה בחומרות המפוקחות.
  • 18.
    יתרונות השיטה - A Win-Win situation :
  • 19.
    הפרדה חלקית /קישור חלקי.
  • 20.
    הדרישות העסקיות באותעל סיפוקן ( הגישה המסורתית) .
  • 21.
    בטחון ברמה הגבוההביותר ( הגישה הקפדנית ) .T
  • 22.
    Waterfallקישור חד כיוונימוחלט בין רשתות בעלות סיווג / רגישות שונה זו מזוהמערכת הינה חד כיוונית לחלוטין על בסיס תקשורת אופטית .
  • 23.
    שני רכיבי חומרהאחד לשליחה בלבד –TX והשני לקבלה בלבד –RX .
  • 24.
    הרכיבים שונים זהמזה ברמת החומרה , לא ניתן להפוך ליחידת שידור ליחידת קליטה וההיפך .
  • 25.
    הפרוטוקול הינו חדכיווני בתיכנונו כך שאינו מחייב ACKs אינו מצטריך תהליך ראשוני של Hand Shake ואינו פונה בבקשת מיידע לאחור בשום מקרה שהוא.
  • 26.
    המוצר תומך בכלשיטות העברת הקבצים הקיימות =ביכולתו להעבירכל מיידע באשר הוא המוגדר כקובץ . בין אם מדובר במיידע מוצפן , קבצי ZIP , קבצי דואר , קבצים שמקורם בעברת FTP , וכו'ReceiverTransmitterHardware Based One-Way Data-Flow GateLaser – Transmit OnlyPhotocell– Receive Only
  • 27.
    Waterfallפתרון קל להטמעה: העברת פקטות מידע ( UDP , TCP ) .
  • 28.
    העברת קבצים (כולל תקיית עצים ) .
  • 29.
    העברת Stream ( קול , וידאו ) .
  • 30.
  • 31.
    תמיכה ב Historians:OSISOFT , Siemens,GE .
  • 32.
    תמיכה בפרוטוקולים תעשייתיםמובילים כמו :Modbus, OPC, DNP3, Profibus, ICCP
  • 33.
    WaterfallWaterfall One-Way™ includesconnectors for :Leading Industrial Applications/HistoriansOSISoft PI, GE iHistorian, GE iFIX
  • 34.
    GE OSM, SiemensWinTS, SINAUTLeading IT Monitoring ApplicationsLog Transfer, SNMP, SYSLOG
  • 35.
    CA Unicenter, CASIM, HP OpenView
  • 36.
    Matrikon Alert ManagerFile/FolderMirroringFolder, tree mirroring, remote folders (CIFS)
  • 37.
    FTP/FTFP/SFTP/TFPS/RCPRemove Screen View™Unidirectionaltransfer of real-time screen display captureLeading Industrial ProtocolsModbus, OPC (DA, HDA, A&&E)
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
    Remote Print serverWaterfallניטור מרחוק – הפתרון :הקישור מבוצע באמצעות שער חד כיווני.
  • 44.
    הנכסים היקרים מאובטחיםלחלוטין – אין יכולת כלשהי להגעה אליהם.Waterfallמוצר חדש להעברת "מסכים": טופולוגיה אופיינית לחדר בקרהחדר בקרהרשת חיצוניתWaterfall RSV שומר על הפרדה פיסית בין רשתות הבקרה לרשתות חיצוניות ומונע כל גישה "מבחוץ".External/publicnetworkWaterfall Tx serverWaterfall RxserverStandard Browser
  • 45.
    McAfee is atrusted partner to many civil, military, and intelligence customersSecure Firewall (Sidewinder) is used in many sensitive and highly important networks around the world.Governments having deployments include:United States
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.
    McAfee - Trust= Positive Security + Reputation Positive Secure Model:Everything is bad EXCEPT what is EXPLICITLY determined to be goodIn-depth understanding of individuals In-depth understanding of malicious practicesIn-depth understanding of applicationsProtects from both known, and zero-hour unknown attacksInbound AccessControlsOutbound Access ControlsStop KnownThreatsStop UnknownThreatsIPSVirus &Malware PreventionIntelligent Application InspectionReputation ServicesNetwork Access Rules Auth & Role-based accessNetwork Access RulesAuth & Role-based access
  • 53.
  • 54.
    McAfee - ApplicationVisibility & Control Case StudiesMany customers depend upon the positive model & application proxies to protect critical apps and data:Database - Oracle & MS-SQLDOD– protects all Human Resources records (several million) held in OracleWeb App – HTTP/SInsurance–protects all in/out Web traffic using SidewinderRetail– largest vacation travel provider uses for protecting inbound web traffic & PCI complianceRemote Access for CitrixFinance–protects the Citrix-delivered trading infrastructure of the largest stock exchangeVOIP (SIP), DNS, FTP, etc.Finance – protects data transfers (FTP)Plant CML – largest worldwide 911 network MSP protects all VoIPClassified Agencies – secure imaging and intelligence data using the IIOP proxyInfrastructure/SCADAMultiple Utilities –segment their network & control systems2 of out the 3 Largest Energy Producers –NERC CIP regulations

Editor's Notes

  • #4 So security for critical infrastructure is now an issue around the world. Because these systems are no longer isolated, they need to be protected from Internet-borne threats that can come in through the corporate IT network.Typical IT security products rely heavily on the need to take down the network on a regular basis for maintenance, security patches, and signature updates. While a signature file update can only take a few minutes, in a controlled system like the power grid, that would constitute a denial of service, causing outages and service disruptions.Non-employees are now being given access to the control networks as well. Separate entities, like the Independent Systems Operators, need to aggregate power between multiple companies.Remote access poses its own security risks and hacking into wired or wireless communications is fairly routine.Since critical systems were never designed with security in mind, it can be extremely difficult to diagnose an attack. In a famous case in Australia in 2000, an attacker was able to penetrate a water treatment plant over 20 times before they even realized they were under attack. The hacker was caught after his 46th infiltration, but it was already too late. His hacking caused a pumping station to overflow, dumping raw sewage into a residential neighborhood and tidal canal.In addition, there are about 1500 potential regulations and standards that these industries could be subject to. It’s almost a guarantee that every company is out of compliance with SOMETHING.And don’t think that the hacker community hasn’t been aware of these vulnerabilities. Chatter on hacker sites using “control systems” or “scada” as key words has grown astronomically over the last 2 years. And it only takes one talented hacker … or one disgruntled employee … to give away the keys to the kingdom to every miscreant on the planet.
  • #11 Here are the 9 CIP standards. Secure Computing can provide solutions for almost every CIP standard. The only one that we can’t help with is physical security.These regulations have some real teeth in them, too. While it might seem like the target date to be “auditably” compliant is far off, it really isn’t based on the amount of thought and planning that needs to go into making critical infrastructure really secure. And that planning will pay off. Companies who meet the deadlines will be spared the fines of up to $1 million US per day.Now let’s discuss the four most critical ones where Secure Computing can help you meet and exceed CIP requirements.
  • #12 The first is to protect the critical network from everything else … whether it’s the IT corporate network or an independent systems’ operator … the control network must be segmented and secured.The second is to control users … everything from allowing access to monitoring their behaviour in the network. Insiders pose the greatest risks … the best protection is monitoring and control.The third is protection of critical asset information. If network schematics or topologies were to fall into the wrong hands, serious damage could ensue.And lastly, these all need to be done without jeopardizing the business reasons for the networks’ existence .. Availability, integrity and reliability.