Securing Control Systems An introduction to security techniques for use in  Control System Networks
Introduction Crispin Harris Security Specialist [email_address] 10 th  May, 2010
Overview Part 1 – Understanding What is a Control System?
Why they are different?
Key attributes
Understanding the risks Part 2 – Protection Design & Network
Hosts & Operating Systems
Applications & Vendors
Vulnerability Management Part 4 - Summary Review & summary
Web Resources
Aus Gov Resources
US Gov Resources Part 3 – Governance Policy & Process
(Penetration) Testing
Vendor Relationships
Information/Software stores
Learning Objectives Be able to identify: Key attributes of a Control System
Strengths and weaknesses of normal CS design
Useful non-technical controls
Safe & useful technical controls Be able to  Find further resources But most importantly: Be able to Knowledgeably discuss Control System security
Intro to Control Systems Security PART 1 – UNDERSTANDING  CONTROL SYSTEMS
What is a Control System? A Control System is any computerised or automated system that is used to control, monitor, support or operate a known process.  Most Control Systems manage an Industrial Process such as: Manufacturing, Energy, Water, Gas,  But they are also found where other repeatable processes occur: Rail & Air Transportation, Healthcare, Finance,
Road Infrastructure, Fleet Management, etc
What is a “Control System”? A “Control System” (“Industrial Control System”) is an umbrella term that refers to a broad set of control systems.  These include: SCADA (Supervisory Control and Data Acquisition)
DCS (Distributed Control System)
PCS (Process Control System)
EMS (Emergency Management System)
AS (Automated System)
SIS (Safety Instrumentation System) And any other automated control system.
Why are ICS networks special? Control Systems are designed to provide day-in, day-out management of a  well known process.   The integrity and continued operation of this process frequently has key safety or financial impact. Control Systems need: INTEGRITY
AVAILABILITY And a bit of: CONFIDENTIALITY
Attributes of ICS networks Constant & Unchanging
Stable
Well documented
Old & un-patched systems
Isolated*
Internally redundant

Securing control systems v0.4

Editor's Notes

  • #8 Talk briefly about the different types of control systems, and w
  • #10 A quick review of the sensitivities that Control Systems have to Impact & Change
  • #16 Firewalls, IPS, Anti-Virus, Structural Separation,
  • #29 See StuxNet & the public knowledge/understanding of attacks against Firmware. How safe is YOUR firmware library